Mock Version: 1.2.17 ENTER ['do'](['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --target armv7hl --nodeps /builddir/build/SPECS/nss.spec'], chrootPath='/var/lib/mock/c71611-updates-armhfp-ae62047a2c49aa33d1550bf08b36aab296290b0b/root'shell=FalseprintOutput=Falseenv={'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'}gid=135user='mockbuild'timeout=0logger=uid=995) Executing command: ['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --target armv7hl --nodeps /builddir/build/SPECS/nss.spec'] with env {'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'} and shell False Building target platforms: armv7hl Building for target armv7hl Wrote: /builddir/build/SRPMS/nss-3.28.2-1.6.el7.src.rpm Child return code was: 0 ENTER ['do'](['bash', '--login', '-c', u'/usr/bin/rpmbuild -bb --target armv7hl --nodeps /builddir/build/SPECS/nss.spec'], chrootPath='/var/lib/mock/c71611-updates-armhfp-ae62047a2c49aa33d1550bf08b36aab296290b0b/root'shell=Falseuid=995env={'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'}gid=135user='mockbuild'timeout=0private_network=Truelogger=printOutput=False) Executing command: ['bash', '--login', '-c', u'/usr/bin/rpmbuild -bb --target armv7hl --nodeps /builddir/build/SPECS/nss.spec'] with env {'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'} and shell False Building target platforms: armv7hl Building for target armv7hl Executing(%prep): /bin/sh -e /var/tmp/rpm-tmp.dWTef8 + umask 022 + cd /builddir/build/BUILD + cd /builddir/build/BUILD + rm -rf nss-3.28.2 + /usr/bin/gzip -dc /builddir/build/SOURCES/nss-3.28.2.tar.gz + /usr/bin/tar -xf - + STATUS=0 + '[' 0 -ne 0 ']' + cd nss-3.28.2 + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . + /usr/bin/cp /builddir/build/SOURCES/PayPalEE.cert -f ./nss/tests/libpkix/certs + /usr/bin/cp /builddir/build/SOURCES/TestCA.ca.cert -f ./nss/tests/libpkix/certs + /usr/bin/cp /builddir/build/SOURCES/TestUser50.cert -f ./nss/tests/libpkix/certs + /usr/bin/cp /builddir/build/SOURCES/TestUser51.cert -f ./nss/tests/libpkix/certs + /usr/bin/cp /builddir/build/SOURCES/PayPalRootCA.cert -f ./nss/tests/libpkix/certs + /usr/bin/cp /builddir/build/SOURCES/PayPalICA.cert -f ./nss/tests/libpkix/certs + cd /builddir/build/BUILD + cd nss-3.28.2 + /usr/bin/bzip2 -dc /builddir/build/SOURCES/nss-pem-20140125.tar.bz2 + /usr/bin/tar -xf - + STATUS=0 + '[' 0 -ne 0 ']' + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . Patch #2 (add-relro-linker-option.patch): + echo 'Patch #2 (add-relro-linker-option.patch):' + /usr/bin/cat /builddir/build/SOURCES/add-relro-linker-option.patch + /usr/bin/patch -p0 -b --suffix .relro --fuzz=0 patching file nss/coreconf/Linux.mk Hunk #1 succeeded at 189 (offset 15 lines). Patch #3 (renegotiate-transitional.patch): + echo 'Patch #3 (renegotiate-transitional.patch):' + /usr/bin/cat /builddir/build/SOURCES/renegotiate-transitional.patch + /usr/bin/patch -p0 -b --suffix .transitional --fuzz=0 patching file nss/lib/ssl/sslsock.c Hunk #1 succeeded at 65 (offset -7 lines). Patch #6 (nss-enable-pem.patch): + echo 'Patch #6 (nss-enable-pem.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-enable-pem.patch + /usr/bin/patch -p0 -b --suffix .libpem --fuzz=0 patching file nss/lib/ckfw/manifest.mn + echo 'Patch #16 (nss-539183.patch):' Patch #16 (nss-539183.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-539183.patch + /usr/bin/patch -p0 -b --suffix .539183 --fuzz=0 patching file nss/cmd/httpserv/httpserv.c Hunk #1 succeeded at 974 (offset -2 lines). patching file nss/cmd/selfserv/selfserv.c Hunk #1 succeeded at 1683 (offset -48 lines). Patch #25 (nsspem-use-system-freebl.patch): + echo 'Patch #25 (nsspem-use-system-freebl.patch):' + /usr/bin/cat /builddir/build/SOURCES/nsspem-use-system-freebl.patch + /usr/bin/patch -p0 -b --suffix .systemfreebl --fuzz=0 patching file nss/lib/ckfw/pem/config.mk patching file nss/lib/ckfw/pem/Makefile patching file nss/lib/ckfw/pem/manifest.mn Patch #40 (nss-3.14.0.0-disble-ocsp-test.patch): + echo 'Patch #40 (nss-3.14.0.0-disble-ocsp-test.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.14.0.0-disble-ocsp-test.patch + /usr/bin/patch -p0 -b --suffix .noocsptest --fuzz=0 patching file nss/tests/chains/scenarios/scenarios Hunk #1 succeeded at 18 (offset -32 lines). Patch #47 (utilwrap-include-templates.patch): + echo 'Patch #47 (utilwrap-include-templates.patch):' + /usr/bin/cat /builddir/build/SOURCES/utilwrap-include-templates.patch + /usr/bin/patch -p0 -b --suffix .templates --fuzz=0 patching file nss/lib/nss/config.mk Patch #49 (nss-skip-bltest-and-fipstest.patch): + echo 'Patch #49 (nss-skip-bltest-and-fipstest.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-skip-bltest-and-fipstest.patch + /usr/bin/patch -p0 -b --suffix .skipthem --fuzz=0 patching file nss/cmd/Makefile Patch #50 (iquote.patch): + echo 'Patch #50 (iquote.patch):' + /usr/bin/cat /builddir/build/SOURCES/iquote.patch + /usr/bin/patch -p0 -b --suffix .iquote --fuzz=0 patching file ./nss/cmd/certutil/Makefile patching file ./nss/cmd/httpserv/Makefile patching file ./nss/cmd/lib/Makefile patching file ./nss/cmd/modutil/Makefile Hunk #1 succeeded at 37 (offset -4 lines). patching file ./nss/cmd/selfserv/Makefile patching file ./nss/cmd/ssltap/Makefile patching file ./nss/cmd/strsclnt/Makefile patching file ./nss/cmd/tstclnt/Makefile patching file ./nss/cmd/vfyserv/Makefile patching file ./nss/coreconf/location.mk patching file ./nss/lib/certhigh/Makefile patching file ./nss/lib/cryptohi/Makefile patching file ./nss/lib/libpkix/pkix/checker/Makefile patching file ./nss/lib/nss/Makefile patching file ./nss/lib/ssl/Makefile Hunk #1 succeeded at 56 (offset 7 lines). patching file ./nss/gtests/ssl_gtest/Makefile Hunk #1 succeeded at 53 (offset 16 lines). Patch #51 (pem-compile-with-Werror.patch): + echo 'Patch #51 (pem-compile-with-Werror.patch):' + /usr/bin/cat /builddir/build/SOURCES/pem-compile-with-Werror.patch + /usr/bin/patch -p1 -b --suffix -Werror --fuzz=0 patching file nss/lib/ckfw/pem/ckpem.h patching file nss/lib/ckfw/pem/pinst.c patching file nss/lib/ckfw/pem/pobject.c patching file nss/lib/ckfw/pem/rsawrapr.c patching file nss/lib/ckfw/pem/util.c ~/build/BUILD/nss-3.28.2/nss ~/build/BUILD/nss-3.28.2 Patch #52 (Bug-1001841-disable-sslv2-libssl.patch): + pushd nss + echo 'Patch #52 (Bug-1001841-disable-sslv2-libssl.patch):' + /usr/bin/cat /builddir/build/SOURCES/Bug-1001841-disable-sslv2-libssl.patch + /usr/bin/patch -p1 -b --suffix .disableSSL2libssl --fuzz=0 patching file lib/ssl/config.mk patching file lib/ssl/sslsock.c Patch #53 (Bug-1001841-disable-sslv2-tests.patch): + echo 'Patch #53 (Bug-1001841-disable-sslv2-tests.patch):' + /usr/bin/cat /builddir/build/SOURCES/Bug-1001841-disable-sslv2-tests.patch + /usr/bin/patch -p1 -b --suffix .disableSSL2tests --fuzz=0 patching file tests/ssl/ssl.sh Patch #55 (enable-fips-when-system-is-in-fips-mode.patch): + echo 'Patch #55 (enable-fips-when-system-is-in-fips-mode.patch):' + /usr/bin/cat /builddir/build/SOURCES/enable-fips-when-system-is-in-fips-mode.patch + /usr/bin/patch -p1 -b --suffix .852023_enable_fips_when_in_fips_mode --fuzz=0 patching file lib/pk11wrap/pk11pars.c patching file lib/pk11wrap/pk11util.c patching file lib/pk11wrap/secmodi.h Patch #56 (p-ignore-setpolicy.patch): + echo 'Patch #56 (p-ignore-setpolicy.patch):' + /usr/bin/cat /builddir/build/SOURCES/p-ignore-setpolicy.patch + /usr/bin/patch -p1 -b --suffix .1026677_ignore_set_policy --fuzz=0 patching file lib/ssl/sslsock.c Hunk #1 succeeded at 1379 (offset -12 lines). Hunk #2 succeeded at 1390 (offset -12 lines). Patch #62 (nss-fix-deadlock-squash.patch): + echo 'Patch #62 (nss-fix-deadlock-squash.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-fix-deadlock-squash.patch + /usr/bin/patch -p1 -b --suffix .fix_deadlock --fuzz=0 patching file lib/pki/tdcache.c Patch #99 (ssl-server-min-key-sizes.patch): + echo 'Patch #99 (ssl-server-min-key-sizes.patch):' + /usr/bin/cat /builddir/build/SOURCES/ssl-server-min-key-sizes.patch + /usr/bin/patch -p1 -b --suffix .min_key_sizes --fuzz=0 patching file lib/nss/nssoptions.h patching file lib/ssl/ssl3con.c Patch #100 (fix-min-library-version-in-SSLVersionRange.patch): + echo 'Patch #100 (fix-min-library-version-in-SSLVersionRange.patch):' + /usr/bin/cat /builddir/build/SOURCES/fix-min-library-version-in-SSLVersionRange.patch + /usr/bin/patch -p0 -b --suffix .1171318 --fuzz=0 patching file ./lib/ssl/sslsock.c Hunk #1 succeeded at 90 (offset -2 lines). Patch #113 (disable-extended-master-secret-with-old-softoken.patch): + echo 'Patch #113 (disable-extended-master-secret-with-old-softoken.patch):' + /usr/bin/cat /builddir/build/SOURCES/disable-extended-master-secret-with-old-softoken.patch + /usr/bin/patch -p1 -b --suffix .disable-ems --fuzz=0 patching file lib/ssl/sslsock.c Patch #115 (nss-prevent-abi-issue.patch): + echo 'Patch #115 (nss-prevent-abi-issue.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-prevent-abi-issue.patch + /usr/bin/patch -p1 -b --suffix .abi_lib --fuzz=0 patching file lib/ssl/sslinfo.c Hunk #1 succeeded at 90 (offset 16 lines). patching file lib/ssl/sslt.h Hunk #1 succeeded at 258 (offset 70 lines). Patch #116 (nss-tests-prevent-abi-issue.patch): + echo 'Patch #116 (nss-tests-prevent-abi-issue.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-tests-prevent-abi-issue.patch + /usr/bin/patch -p1 -b --suffix .abi_tests --fuzz=0 patching file cmd/selfserv/selfserv.c Hunk #1 succeeded at 385 (offset -40 lines). patching file cmd/tstclnt/tstclnt.c Hunk #1 succeeded at 132 (offset 3 lines). patching file gtests/ssl_gtest/tls_agent.cc Hunk #1 succeeded at 688 (offset 117 lines). Patch #74 (race.patch): + echo 'Patch #74 (race.patch):' + /usr/bin/cat /builddir/build/SOURCES/race.patch + /usr/bin/patch -p1 -b --suffix .race --fuzz=0 patching file lib/pk11wrap/pk11util.c ~/build/BUILD/nss-3.28.2 Patch #94 (nss-3.16-token-init-race.patch): + popd + echo 'Patch #94 (nss-3.16-token-init-race.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.16-token-init-race.patch + /usr/bin/patch -p0 -b --suffix .init-token-race --fuzz=0 patching file nss/lib/pk11wrap/dev3hack.c patching file nss/lib/pk11wrap/pk11auth.c patching file nss/lib/pk11wrap/pk11slot.c patching file nss/lib/pk11wrap/pk11util.c Patch #106 (nss-old-pkcs11-num.patch): + echo 'Patch #106 (nss-old-pkcs11-num.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-old-pkcs11-num.patch + /usr/bin/patch -p0 -b --suffix .old_pkcs11_num --fuzz=0 patching file nss/lib/ssl/ssl3con.c Hunk #1 succeeded at 11068 (offset 14 lines). Patch #108 (nss-sni-c-v-fix.patch): + echo 'Patch #108 (nss-sni-c-v-fix.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-sni-c-v-fix.patch + /usr/bin/patch -p0 -b --suffix .sni_c_v_fix --fuzz=0 patching file ./nss/tests/ssl/sslauth.txt ~/build/BUILD/nss-3.28.2/nss ~/build/BUILD/nss-3.28.2 Patch #122 (disable-ems-gtests.patch): + pushd nss + echo 'Patch #122 (disable-ems-gtests.patch):' + /usr/bin/cat /builddir/build/SOURCES/disable-ems-gtests.patch + /usr/bin/patch -p1 -b --suffix .disable_ems_gtests --fuzz=0 patching file gtests/pk11_gtest/pk11_prf_unittest.cc patching file gtests/ssl_gtest/manifest.mn Patch #123 (nss-skip-util-gtest.patch): + echo 'Patch #123 (nss-skip-util-gtest.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-skip-util-gtest.patch + /usr/bin/patch -p1 -b --suffix .skip-util-gtests --fuzz=0 patching file gtests/manifest.mn patching file gtests/ssl_gtest/manifest.mn patching file tests/gtests/gtests.sh Patch #124 (nss-disable-curve25519.patch): + echo 'Patch #124 (nss-disable-curve25519.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-disable-curve25519.patch + /usr/bin/patch -p1 -b --suffix .disable-curve25519 --fuzz=0 patching file lib/ssl/sslsock.c Patch #126 (nss-reorder-cipher-suites.patch): + echo 'Patch #126 (nss-reorder-cipher-suites.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-reorder-cipher-suites.patch + /usr/bin/patch -p1 -b --suffix .reorder-cipher-suites --fuzz=0 patching file lib/ssl/ssl3con.c patching file lib/ssl/sslenum.c Patch #127 (nss-disable-cipher-suites.patch): + echo 'Patch #127 (nss-disable-cipher-suites.patch):' + /usr/bin/patch -p1 -b --suffix .disable-cipher-suites --fuzz=0 + /usr/bin/cat /builddir/build/SOURCES/nss-disable-cipher-suites.patch patching file lib/ssl/ssl3con.c Patch #128 (nss-enable-cipher-suites.patch): + echo 'Patch #128 (nss-enable-cipher-suites.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-enable-cipher-suites.patch + /usr/bin/patch -p1 -b --suffix .enable-cipher-suites --fuzz=0 patching file lib/ssl/ssl3con.c Patch #129 (moz-1320932.patch): + echo 'Patch #129 (moz-1320932.patch):' + /usr/bin/cat /builddir/build/SOURCES/moz-1320932.patch + /usr/bin/patch -p1 -b --suffix .fix_ssl_sh_typo --fuzz=0 patching file tests/ssl/ssl.sh Hunk #1 succeeded at 1026 (offset 20 lines). Patch #130 (disable-pss.patch): + echo 'Patch #130 (disable-pss.patch):' + /usr/bin/cat /builddir/build/SOURCES/disable-pss.patch + /usr/bin/patch -p1 -b --suffix .disable_pss --fuzz=0 patching file lib/ssl/ssl3con.c Hunk #1 succeeded at 183 (offset 6 lines). Hunk #2 succeeded at 4634 (offset 6 lines). patching file lib/ssl/sslcert.c Patch #131 (nss-ecpoint-encoding.patch): + echo 'Patch #131 (nss-ecpoint-encoding.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-ecpoint-encoding.patch + /usr/bin/patch -p1 -b --suffix .ecpoint-encoding --fuzz=0 patching file lib/cryptohi/keyi.h patching file lib/cryptohi/keythi.h patching file lib/cryptohi/seckey.c patching file lib/pk11wrap/pk11akey.c patching file lib/pk11wrap/pk11skey.c patching file lib/ssl/ssl3ecc.c Patch #132 (nss-tstclnt-optspec.patch): + echo 'Patch #132 (nss-tstclnt-optspec.patch):' + /usr/bin/patch -p1 -b --suffix .tstclnt-optspec --fuzz=0 + /usr/bin/cat /builddir/build/SOURCES/nss-tstclnt-optspec.patch patching file cmd/tstclnt/tstclnt.c Hunk #1 succeeded at 1487 (offset -22 lines). Patch #200 (nss-disable-curve25519-gtests.patch): + echo 'Patch #200 (nss-disable-curve25519-gtests.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-disable-curve25519-gtests.patch + /usr/bin/patch -p1 -b --suffix .disable-curve25519-gtests --fuzz=0 patching file gtests/ssl_gtest/ssl_ecdh_unittest.cc Patch #201 (nss-disable-curve25519-tests.patch): + echo 'Patch #201 (nss-disable-curve25519-tests.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-disable-curve25519-tests.patch + /usr/bin/patch -p1 -b --suffix .disable-curve25519-tests --fuzz=0 patching file tests/ec/ectest.sh Patch #202 (nss-disable-chacha20-gtests.patch): + echo 'Patch #202 (nss-disable-chacha20-gtests.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-disable-chacha20-gtests.patch + /usr/bin/patch -p1 -b --suffix .disable-chacha20-gtests --fuzz=0 patching file gtests/pk11_gtest/manifest.mn patching file gtests/ssl_gtest/ssl_ciphersuite_unittest.cc patching file gtests/ssl_gtest/ssl_drop_unittest.cc patching file gtests/ssl_gtest/ssl_ecdh_unittest.cc Patch #203 (nss-disable-chacha20-tests.patch): + echo 'Patch #203 (nss-disable-chacha20-tests.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-disable-chacha20-tests.patch + /usr/bin/patch -p1 -b --suffix .disable-chacha20-tests --fuzz=0 patching file tests/ssl/sslcov.txt Patch #204 (nss-disable-pss-gtests.patch): + echo 'Patch #204 (nss-disable-pss-gtests.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-disable-pss-gtests.patch + /usr/bin/patch -p1 -b --suffix .disable-pss-gtests --fuzz=0 patching file gtests/ssl_gtest/ssl_ecdh_unittest.cc Patch #205 (nss-disable-unsupported-gtests.patch): + echo 'Patch #205 (nss-disable-unsupported-gtests.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-disable-unsupported-gtests.patch + /usr/bin/patch -p1 -b --suffix .disable-unsupported-gtests --fuzz=0 patching file gtests/pk11_gtest/pk11_export_unittest.cc patching file gtests/pk11_gtest/pk11_pbkdf2_unittest.cc Patch #206 (nss-disable-unsupported-tests.patch): + echo 'Patch #206 (nss-disable-unsupported-tests.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-disable-unsupported-tests.patch + /usr/bin/patch -p1 -b --suffix .disable-unsupported-tests --fuzz=0 patching file tests/ec/ectest.sh ~/build/BUILD/nss-3.28.2 + popd + pemNeedsFromSoftoken='lowkeyi lowkeyti softoken softoknt' + for file in '${pemNeedsFromSoftoken}' + /usr/bin/cp ./nss/lib/softoken/lowkeyi.h ./nss/lib/ckfw/pem/ + for file in '${pemNeedsFromSoftoken}' + /usr/bin/cp ./nss/lib/softoken/lowkeyti.h ./nss/lib/ckfw/pem/ + for file in '${pemNeedsFromSoftoken}' + /usr/bin/cp ./nss/lib/softoken/softoken.h ./nss/lib/ckfw/pem/ + for file in '${pemNeedsFromSoftoken}' + /usr/bin/cp ./nss/lib/softoken/softoknt.h ./nss/lib/ckfw/pem/ + /usr/bin/cp ./nss/lib/softoken/lowkeyi.h ./nss/cmd/rsaperf + /usr/bin/cp ./nss/lib/softoken/lowkeyti.h ./nss/cmd/rsaperf + /usr/bin/mv ./nss/lib/util/verref.h ./nss/verref.h + /usr/bin/rm -rf ./nss/lib/freebl + /usr/bin/rm -rf ./nss/lib/softoken + /usr/bin/rm -rf ./nss/lib/util + /usr/bin/rm -rf ./nss/cmd/bltest + /usr/bin/rm -rf ./nss/cmd/fipstest + /usr/bin/rm -rf ./nss/cmd/rsaperf_low ~/build/BUILD/nss-3.28.2/nss/tests/ssl ~/build/BUILD/nss-3.28.2 + pushd nss/tests/ssl + cat sslcov.txt + sed -r 's/^([^#].*EXPORT|^[^#].*SSL2)/#disabled \1/' + cat sslstress.txt + sed -r 's/^([^#].*EXPORT|^[^#].*SSL2)/#disabled \1/' ~/build/BUILD/nss-3.28.2 + popd + exit 0 Executing(%build): /bin/sh -e /var/tmp/rpm-tmp.fgcVk9 + umask 022 + cd /builddir/build/BUILD + cd nss-3.28.2 + export NSS_NO_SSL2=1 + NSS_NO_SSL2=1 + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + export BUILD_OPT=1 + BUILD_OPT=1 + XCFLAGS='-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard' + export XCFLAGS + PKG_CONFIG_ALLOW_SYSTEM_LIBS=1 + PKG_CONFIG_ALLOW_SYSTEM_CFLAGS=1 + export PKG_CONFIG_ALLOW_SYSTEM_LIBS + export PKG_CONFIG_ALLOW_SYSTEM_CFLAGS ++ /usr/bin/pkg-config --cflags-only-I nspr ++ sed s/-I// + NSPR_INCLUDE_DIR='/usr/include/nspr4 ' + NSPR_LIB_DIR=/usr/lib + export NSPR_INCLUDE_DIR + export NSPR_LIB_DIR ++ /usr/bin/pkg-config --cflags-only-I nss-util ++ sed s/-I// + export 'NSSUTIL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' + NSSUTIL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' + export NSSUTIL_LIB_DIR=/usr/lib + NSSUTIL_LIB_DIR=/usr/lib ++ /usr/bin/pkg-config --cflags-only-I nss-softokn ++ sed s/-I// + export 'FREEBL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' + FREEBL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' + export FREEBL_LIB_DIR=/usr/lib + FREEBL_LIB_DIR=/usr/lib + export USE_SYSTEM_FREEBL=1 + USE_SYSTEM_FREEBL=1 + export NSS_USE_SYSTEM_FREEBL=1 + NSS_USE_SYSTEM_FREEBL=1 ++ /usr/bin/pkg-config --libs nss-softokn + export 'FREEBL_LIBS=-L/usr/lib -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl ' + FREEBL_LIBS='-L/usr/lib -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl ' + export SOFTOKEN_LIB_DIR=/usr/lib + SOFTOKEN_LIB_DIR=/usr/lib + export USE_SYSTEM_NSSUTIL=1 + USE_SYSTEM_NSSUTIL=1 + export USE_SYSTEM_SOFTOKEN=1 + USE_SYSTEM_SOFTOKEN=1 + export NSS_BUILD_WITHOUT_SOFTOKEN=1 + NSS_BUILD_WITHOUT_SOFTOKEN=1 + NSS_USE_SYSTEM_SQLITE=1 + export NSS_USE_SYSTEM_SQLITE + export NSS_ALLOW_SSLKEYLOGFILE=1 + NSS_ALLOW_SSLKEYLOGFILE=1 + export IN_TREE_FREEBL_HEADERS_FIRST=1 + IN_TREE_FREEBL_HEADERS_FIRST=1 + export NSS_BLTEST_NOT_AVAILABLE=1 + NSS_BLTEST_NOT_AVAILABLE=1 + /usr/bin/make -C ./nss/coreconf make: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/coreconf' cd nsinstall; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/coreconf/nsinstall' make[1]: Nothing to be done for `export'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/coreconf/nsinstall' cd nsinstall; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/coreconf/nsinstall' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nsinstall.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pathsub.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pathsub.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pathsub.o -Wl,-z,relro -lpthread -ldl -lc true -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[1]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/coreconf/nsinstall' make: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/coreconf' + /usr/bin/make -C ./nss/lib/dbm make: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm' cd include; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm/include' Creating ../../../../dist/public/dbm ../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 mcom_db.h ncompat.h winfile.h ../../../../dist/public/dbm Creating ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 hsearch.h page.h extern.h queue.h hash.h search.h ../../../../dist/private/dbm make[1]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm/include' cd src; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm/src' make[1]: Nothing to be done for `export'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm/src' cd include; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm/include' make[1]: Nothing to be done for `libs'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm/include' cd src; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm/src' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/db.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard db.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/h_bigkey.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_bigkey.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/h_func.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_func.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/h_log2.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_log2.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/h_page.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_page.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/hash.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/hash_buf.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash_buf.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/mktemp.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mktemp.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/dirent.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dirent.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/db.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/h_bigkey.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/h_func.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/h_log2.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/h_page.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/hash.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/hash_buf.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/mktemp.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/dirent.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a ../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a ../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[1]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm/src' make: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm' + /usr/bin/mkdir -p ./dist/private/nss + /usr/bin/mv ./nss/verref.h ./dist/private/nss/verref.h + /usr/bin/make -C ./nss make: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss' cd coreconf; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/coreconf' cd nsinstall; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/coreconf/nsinstall' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/coreconf/nsinstall' cd nsinstall; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/coreconf/nsinstall' true -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/coreconf/nsinstall' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/coreconf' cd lib; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib' cd dbm; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm' cd include; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm/include' ../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 mcom_db.h ncompat.h winfile.h ../../../../dist/public/dbm ../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 hsearch.h page.h extern.h queue.h hash.h search.h ../../../../dist/private/dbm make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm/include' cd src; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm/src' make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm/src' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm' cd base; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/base' Creating ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssbaset.h nssbase.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 baset.h base.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/base' cd dev; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dev' ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckhelper.h devm.h devtm.h devt.h dev.h nssdevt.h nssdev.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dev' cd pki; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/pki' ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pki.h pkit.h nsspkit.h nsspki.h pkistore.h pki3hack.h pkitm.h pkim.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/pki' cd libpkix; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix' cd include; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/include' ../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/include' cd pkix; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/checker' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/params' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/results' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/store' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/top' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/util' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/util' cd certsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/checker' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/params' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/results' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/store' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/top' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/util' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/module' cd pki; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss' cd include; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/include' ../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/include' cd pkix; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/checker' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/params' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/results' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/store' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/top' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/util' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss' There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix' cd certdb; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/certdb' ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cert.h certt.h certdb.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 genname.h xconst.h certxutl.h certi.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/certdb' cd certhigh; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/certhigh' ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocsp.h ocspt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspti.h ocspi.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/certhigh' cd pk11wrap; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/pk11wrap' ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmod.h secmodt.h secpkcs5.h pk11func.h pk11pub.h pk11priv.h pk11sdr.h pk11pqg.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodi.h dev3hack.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/cryptohi' ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cryptohi.h cryptoht.h key.h keyhi.h keyt.h keythi.h sechash.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 keyi.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/cryptohi' cd nss; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/nss' ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssrenam.h nssoptions.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/nss' cd ssl; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/ssl' ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ssl.h sslt.h sslerr.h sslproto.h preenc.h ../../../dist/public/nss There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/ssl' cd pkcs7; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/pkcs7' ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmime.h secpkcs7.h pkcs7t.h ../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/pkcs7' cd pkcs12; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/pkcs12' ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h pkcs12.h p12plcy.h p12.h p12t.h ../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/pkcs12' cd smime; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/smime' ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cms.h cmst.h smime.h cmsreclist.h ../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/smime' cd crmf; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/crmf' ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmf.h crmft.h cmmf.h cmmft.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmfi.h crmfit.h cmmfi.h cmmfit.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/crmf' cd jar; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/jar' ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jar.h jar-ds.h jarfile.h ../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/jar' cd ckfw; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/ckfw' cd builtins; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/ckfw/builtins' ../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/ckfw/builtins' cd pem; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/ckfw/pem' ../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nsspem.h ../../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/ckfw/pem' ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssck.api nssckepv.h nssckft.h nssckfw.h nssckfwc.h nssckfwt.h nssckg.h nssckmdt.h nssckt.h ../../../dist/public/nss cd builtins; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/ckfw/builtins' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/ckfw/builtins' cd pem; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/ckfw/pem' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/ckfw/pem' ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ck.h ckfw.h ckfwm.h ckfwtm.h ckmd.h ckt.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/ckfw' cd sysinit; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/sysinit' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/sysinit' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib' cd cmd; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd' cd lib; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/lib' ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 basicutil.h secutil.h pk11table.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/lib' cd shlibsign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/shlibsign' cd mangle; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/shlibsign/mangle' make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/shlibsign/mangle' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/shlibsign' cd addbuiltin; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/addbuiltin' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/addbuiltin' cd atob; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/atob' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/atob' cd btoa; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/btoa' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/btoa' cd certcgi; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/certcgi' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/certcgi' cd certutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/certutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/certutil' cd chktest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/chktest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/chktest' cd crlutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/crlutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/crlutil' cd crmftest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/crmftest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/crmftest' cd dbtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/dbtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/dbtest' cd derdump; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/derdump' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/derdump' cd digest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/digest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/digest' cd httpserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/httpserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/httpserv' cd listsuites; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/listsuites' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/listsuites' cd makepqg; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/makepqg' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/makepqg' cd multinit; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/multinit' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/multinit' cd ocspclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/ocspclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/ocspclnt' cd ocspresp; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/ocspresp' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/ocspresp' cd oidcalc; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/oidcalc' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/oidcalc' cd p7content; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/p7content' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/p7content' cd p7env; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/p7env' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/p7env' cd p7sign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/p7sign' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/p7sign' cd p7verify; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/p7verify' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/p7verify' cd pk12util; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pk12util' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pk12util' cd pk11ectest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pk11ectest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pk11ectest' cd pk11gcmtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pk11gcmtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pk11gcmtest' cd pk11mode; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pk11mode' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pk11mode' cd pk1sign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pk1sign' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pk1sign' cd pp; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pp' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pp' cd pwdecrypt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pwdecrypt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pwdecrypt' cd rsaperf; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/rsaperf' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/sdrtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/sdrtest' cd selfserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/selfserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/selfserv' cd signtool; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/signtool' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/signtool' cd signver; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/signver' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/signver' cd smimetools; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/smimetools' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/smimetools' cd ssltap; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/ssltap' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/ssltap' cd strsclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/strsclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/symkeyutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/symkeyutil' cd tests; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/tests' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/tests' cd tstclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/tstclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/tstclnt' cd vfychain; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/vfychain' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/vfychain' cd vfyserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/vfyserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/vfyserv' cd modutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/modutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/modutil' cd pkix-errcodes; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pkix-errcodes' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pkix-errcodes' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd' cd gtests; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests' cd google_test; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/google_test' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/google_test' cd common; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/common' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/common' cd der_gtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/der_gtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/der_gtest' cd pk11_gtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/pk11_gtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/pk11_gtest' cd ssl_gtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/ssl_gtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/ssl_gtest' cd nss_bogo_shim; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/nss_bogo_shim' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/nss_bogo_shim' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests' cd coreconf; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/coreconf' cd nsinstall; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/coreconf/nsinstall' true -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/coreconf/nsinstall' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/coreconf' cd lib; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib' cd dbm; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm' cd include; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm/include' make[3]: Nothing to be done for `libs'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm/include' cd src; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm/src' ../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a ../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm/src' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dbm' cd base; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/base' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/arena.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard arena.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/error.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard error.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/errorval.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard errorval.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/hashops.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hashops.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libc.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard libc.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tracker.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tracker.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/item.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard item.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/utf8.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard utf8.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/list.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard list.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/hash.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnssb.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnssb.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/arena.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/error.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/errorval.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/hashops.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libc.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tracker.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/item.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/utf8.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/list.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/hash.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnssb.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnssb.a ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnssb.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/base' cd dev; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dev' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/devslot.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard devslot.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/devtoken.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard devtoken.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/devutil.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard devutil.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ckhelper.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ckhelper.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnssdev.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnssdev.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/devslot.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/devtoken.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/devutil.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ckhelper.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnssdev.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnssdev.a ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnssdev.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/dev' cd pki; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/pki' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/asymmkey.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard asymmkey.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certificate.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certificate.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cryptocontext.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cryptocontext.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/symmkey.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard symmkey.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/trustdomain.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard trustdomain.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tdcache.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tdcache.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certdecode.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certdecode.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkistore.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkistore.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkibase.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkibase.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pki3hack.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pki3hack.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnsspki.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnsspki.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/asymmkey.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certificate.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cryptocontext.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/symmkey.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/trustdomain.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tdcache.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certdecode.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkistore.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkibase.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pki3hack.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnsspki.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnsspki.a ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnsspki.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/pki' cd libpkix; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix' cd include; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/include' make[3]: Nothing to be done for `libs'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/include' cd pkix; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/certsel' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_certselector.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_certselector.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_comcertselparams.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_certselector.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/crlsel' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlselector.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_crlselector.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_comcrlselparams.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlselector.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/checker' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_basicconstraintschecker.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_certchainchecker.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlchecker.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_crlchecker.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_ekuchecker.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_expirationchecker.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_namechainingchecker.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_nameconstraintschecker.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_ocspchecker.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_revocationmethod.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_revocationchecker.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_policychecker.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_policychecker.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_signaturechecker.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_targetcertchecker.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlchecker.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_policychecker.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/params' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_trustanchor.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_trustanchor.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_procparams.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_procparams.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_valparams.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_valparams.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_resourcelimits.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixparams.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixparams.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_trustanchor.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_procparams.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_valparams.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixparams.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/results' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_buildresult.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_buildresult.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_policynode.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_policynode.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_valresult.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_valresult.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_verifynode.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_verifynode.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixresults.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixresults.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_buildresult.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_policynode.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_valresult.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_verifynode.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixresults.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/store' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_store.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_store.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixstore.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixstore.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_store.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixstore.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/top' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_validate.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_validate.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_lifecycle.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_lifecycle.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_build.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_build.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixtop.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixtop.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_validate.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_lifecycle.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_build.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixtop.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/util' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_tools.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_tools.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_error.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_error.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_logger.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_logger.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_list.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_list.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_errpaths.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_errpaths.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixutil.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixutil.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_tools.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_error.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_logger.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_list.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_errpaths.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixutil.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix/util' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/pki' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_basicconstraints.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_cert.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_cert.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_certpolicyinfo.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_certpolicymap.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_certpolicyqualifier.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crl.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_crl.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_crldp.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_crlentry.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_date.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_date.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_generalname.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_infoaccess.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_nameconstraints.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ocsprequest.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ocspresponse.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_publickey.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_x500name.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ocspcertid.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixpki.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixpki.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_cert.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crl.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_date.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixpki.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/system' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_bigint.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_bytearray.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_common.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_common.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_error.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_error.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_hashtable.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_lifecycle.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mem.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_mem.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_monitorlock.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_mutex.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_object.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_object.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_oid.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_oid.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_primhash.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_rwlock.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_string.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_string.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_common.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_error.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mem.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_object.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_oid.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_string.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/module' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_aiamgr.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_colcertstore.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_httpcertstore.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_httpdefaultclient.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldaptemplates.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldapcertstore.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldapresponse.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldaprequest.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldapdefaultclient.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_nsscontext.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_pk11certstore.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_socket.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_socket.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss/module' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix/pkix_pl_nss' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/libpkix' cd certdb; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/certdb' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/alg1485.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard alg1485.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certdb.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certdb.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certv3.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certv3.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certxutl.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certxutl.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crl.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crl.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/genname.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard genname.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/stanpcertdb.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard stanpcertdb.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/polcyxtn.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard polcyxtn.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/secname.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secname.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/xauthkid.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xauthkid.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/xbsconst.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xbsconst.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/xconst.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xconst.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libcertdb.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libcertdb.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/alg1485.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certdb.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certv3.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certxutl.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crl.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/genname.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/stanpcertdb.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/polcyxtn.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/secname.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/xauthkid.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/xbsconst.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/xconst.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libcertdb.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libcertdb.a ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libcertdb.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/certdb' cd certhigh; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/certhigh' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certhtml.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certhtml.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certreq.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certreq.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crlv2.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlv2.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ocsp.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocsp.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ocspsig.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocspsig.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certhigh.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certhigh.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certvfy.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certvfy.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certvfypkix.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certvfypkix.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/xcrldist.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xcrldist.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libcerthi.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libcerthi.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certhtml.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certreq.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crlv2.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ocsp.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ocspsig.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certhigh.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certvfy.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certvfypkix.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/xcrldist.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libcerthi.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libcerthi.a ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libcerthi.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/certhigh' cd pk11wrap; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/pk11wrap' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/dev3hack.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dev3hack.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11akey.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11akey.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11auth.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11auth.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11cert.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11cert.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11cxt.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11cxt.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11err.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11err.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11kea.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11kea.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11list.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11list.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11load.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11load.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11mech.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11mech.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11merge.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11merge.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11nobj.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11nobj.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11obj.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11obj.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11pars.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pars.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11pbe.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pbe.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11pk12.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pk12.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11pqg.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pqg.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11sdr.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11sdr.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11skey.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11skey.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11slot.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11slot.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11util.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11util.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/dev3hack.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11akey.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11auth.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11cert.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11cxt.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11err.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11kea.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11list.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11load.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11mech.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11merge.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11nobj.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11obj.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11pars.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11pbe.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11pk12.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11pqg.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11sdr.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11skey.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11slot.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11util.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/cryptohi' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sechash.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sechash.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/seckey.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard seckey.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/secsign.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secsign.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/secvfy.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secvfy.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/dsautil.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dsautil.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libcryptohi.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libcryptohi.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sechash.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/seckey.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/secsign.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/secvfy.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/dsautil.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libcryptohi.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libcryptohi.a ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libcryptohi.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/cryptohi' cd nss; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/nss' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nssinit.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nssinit.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nssoptions.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nssoptions.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nssver.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nssver.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/utilwrap.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard utilwrap.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnss.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnss.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nssinit.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nssoptions.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nssver.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/utilwrap.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnss.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnss.a grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nss.def rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnss3.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnss3.so -Wl,--version-script,Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nss.def -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnss3.so Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nssinit.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nssoptions.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nssver.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/utilwrap.o ../certhigh/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certhtml.o ../certhigh/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certreq.o ../certhigh/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crlv2.o ../certhigh/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ocsp.o ../certhigh/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ocspsig.o ../certhigh/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certhigh.o ../certhigh/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certvfy.o ../certhigh/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certvfypkix.o ../certhigh/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/xcrldist.o ../cryptohi/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sechash.o ../cryptohi/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/seckey.o ../cryptohi/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/secsign.o ../cryptohi/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/secvfy.o ../cryptohi/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/dsautil.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/dev3hack.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11akey.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11auth.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11cert.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11cxt.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11err.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11kea.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11list.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11load.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11mech.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11merge.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11nobj.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11obj.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11pars.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11pbe.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11pk12.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11pqg.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11sdr.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11skey.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11slot.o ../pk11wrap/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11util.o ../certdb/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/alg1485.o ../certdb/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certdb.o ../certdb/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certv3.o ../certdb/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certxutl.o ../certdb/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crl.o ../certdb/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/genname.o ../certdb/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/stanpcertdb.o ../certdb/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/polcyxtn.o ../certdb/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/secname.o ../certdb/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/xauthkid.o ../certdb/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/xbsconst.o ../certdb/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/xconst.o ../pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/asymmkey.o ../pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certificate.o ../pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cryptocontext.o ../pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/symmkey.o ../pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/trustdomain.o ../pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tdcache.o ../pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certdecode.o ../pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkistore.o ../pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkibase.o ../pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pki3hack.o ../dev/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/devslot.o ../dev/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/devtoken.o ../dev/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/devutil.o ../dev/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ckhelper.o ../base/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/arena.o ../base/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/error.o ../base/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/errorval.o ../base/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/hashops.o ../base/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libc.o ../base/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tracker.o ../base/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/item.o ../base/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/utf8.o ../base/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/list.o ../base/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnss3.so ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnss.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnss3.so ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/nss' cd ssl; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/ssl' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/dtlscon.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dtlscon.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/prelib.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard prelib.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl3con.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3con.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl3gthr.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3gthr.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslauth.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslauth.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslcon.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslcon.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssldef.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssldef.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslenum.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslenum.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslerr.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslerr.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslerrstrs.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslerrstrs.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslinit.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslinit.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl3ext.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3ext.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl3exthandle.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3exthandle.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslmutex.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslmutex.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslnonce.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslnonce.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslreveal.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslreveal.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslsecur.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslsecur.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslsnce.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslsnce.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslsock.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslsock.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssltrace.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssltrace.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslver.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslver.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/authcert.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard authcert.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmpcert.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmpcert.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslinfo.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslinfo.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl3ecc.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3ecc.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tls13con.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tls13con.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tls13exthandle.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tls13exthandle.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tls13hkdf.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tls13hkdf.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslcert.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslcert.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslgrp.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslgrp.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/unix_err.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -DNSS_DISABLE_TLS_1_3 -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard unix_err.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libssl.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libssl.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/dtlscon.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/prelib.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl3con.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslauth.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslcon.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssldef.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslenum.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslerr.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslinit.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl3ext.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl3exthandle.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslmutex.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslnonce.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslreveal.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslsecur.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslsnce.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslsock.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssltrace.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslver.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/authcert.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmpcert.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslinfo.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tls13con.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tls13exthandle.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tls13hkdf.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslcert.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslgrp.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/unix_err.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libssl.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libssl.a grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl.def rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libssl3.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libssl3.so -Wl,--version-script,Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl.def -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libssl3.so Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/dtlscon.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/prelib.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl3con.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslauth.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslcon.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssldef.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslenum.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslerr.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslinit.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl3ext.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl3exthandle.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslmutex.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslnonce.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslreveal.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslsecur.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslsnce.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslsock.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssltrace.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslver.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/authcert.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmpcert.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslinfo.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tls13con.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tls13exthandle.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tls13hkdf.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslcert.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sslgrp.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/unix_err.o -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz chmod +x Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libssl3.so ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libssl.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libssl3.so ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/ssl' cd pkcs7; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/pkcs7' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certread.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certread.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7common.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7common.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7create.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7create.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7decode.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7decode.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7encode.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7encode.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7local.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7local.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/secmime.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secmime.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkcs7.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkcs7.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certread.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7common.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7create.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7decode.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7encode.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7local.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/secmime.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkcs7.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkcs7.a ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkcs7.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/pkcs7' cd pkcs12; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/pkcs12' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12local.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12local.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12creat.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12creat.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12dec.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12dec.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12plcy.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12plcy.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12tmpl.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12tmpl.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12e.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12e.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12d.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12d.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkcs12.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkcs12.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12local.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12creat.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12dec.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12plcy.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12tmpl.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12e.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12d.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkcs12.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkcs12.a ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libpkcs12.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/pkcs12' cd smime; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/smime' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsarray.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsarray.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsasn1.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsasn1.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsattr.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsattr.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmscinfo.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmscinfo.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmscipher.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmscipher.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsdecode.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsdecode.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsdigdata.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsdigdata.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsdigest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsdigest.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsencdata.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsencdata.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsencode.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsencode.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsenvdata.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsenvdata.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsmessage.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsmessage.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmspubkey.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmspubkey.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsrecinfo.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsrecinfo.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsreclist.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsreclist.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmssigdata.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmssigdata.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmssiginfo.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmssiginfo.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsudf.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsudf.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsutil.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsutil.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/smimemessage.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard smimemessage.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/smimeutil.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard smimeutil.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/smimever.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard smimever.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libsmime.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libsmime.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsarray.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsasn1.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsattr.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmscinfo.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmscipher.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsdecode.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsdigest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsencdata.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsencode.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsmessage.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmspubkey.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsreclist.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmssigdata.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsudf.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsutil.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/smimemessage.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/smimeutil.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/smimever.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libsmime.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libsmime.a grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/smime.def rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libsmime3.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libsmime3.so -Wl,--version-script,Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/smime.def -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libsmime3.so Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsarray.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsasn1.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsattr.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmscinfo.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmscipher.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsdecode.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsdigest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsencdata.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsencode.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsmessage.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmspubkey.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsreclist.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmssigdata.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsudf.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsutil.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/smimemessage.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/smimeutil.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/smimever.o ../pkcs12/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12local.o ../pkcs12/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12creat.o ../pkcs12/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12dec.o ../pkcs12/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12plcy.o ../pkcs12/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12tmpl.o ../pkcs12/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12e.o ../pkcs12/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p12d.o ../pkcs7/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certread.o ../pkcs7/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7common.o ../pkcs7/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7create.o ../pkcs7/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7decode.o ../pkcs7/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7encode.o ../pkcs7/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7local.o ../pkcs7/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/secmime.o -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libsmime3.so ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libsmime.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libsmime3.so ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/smime' cd crmf; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/crmf' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crmfenc.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfenc.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crmftmpl.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmftmpl.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crmfreq.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfreq.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crmfpop.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfpop.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crmfdec.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfdec.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crmfget.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfget.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crmfcont.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfcont.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmmfasn1.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfasn1.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmmfresp.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfresp.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmmfrec.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfrec.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmmfchal.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfchal.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/servget.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard servget.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/encutil.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard encutil.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/respcli.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard respcli.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/respcmn.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard respcmn.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/challcli.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard challcli.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/asn1cmn.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard asn1cmn.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libcrmf.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libcrmf.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crmfenc.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crmftmpl.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crmfreq.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crmfpop.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crmfdec.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crmfget.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crmfcont.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmmfasn1.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmmfresp.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmmfrec.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmmfchal.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/servget.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/encutil.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/respcli.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/respcmn.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/challcli.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/asn1cmn.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libcrmf.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libcrmf.a ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libcrmf.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/crmf' cd jar; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/jar' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/jarver.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarver.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/jarsign.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarsign.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/jar.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jar.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/jar-ds.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jar-ds.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/jarfile.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarfile.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/jarint.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarint.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libjar.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libjar.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/jarver.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/jarsign.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/jar.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/jar-ds.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/jarfile.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/jarint.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libjar.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libjar.a ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libjar.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/jar' cd ckfw; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/ckfw' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crypto.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crypto.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/find.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard find.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/hash.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/instance.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard instance.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/mutex.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mutex.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/object.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard object.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/session.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard session.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sessobj.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sessobj.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/slot.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard slot.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/token.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard token.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/wrap.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard wrap.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/mechanism.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mechanism.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnssckfw.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crypto.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/find.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/hash.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/instance.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/mutex.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/object.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/session.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sessobj.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/slot.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/token.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/wrap.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/mechanism.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnssckfw.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib cd builtins; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/ckfw/builtins' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/anchor.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard anchor.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/constants.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard constants.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bfind.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bfind.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/binst.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard binst.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bobject.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bobject.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bsession.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bsession.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bslot.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bslot.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/btoken.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard btoken.c perl certdata.perl certdata.txt Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certdata.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certdata.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certdata.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ckbiver.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ckbiver.c grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nssckbi.def rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnssckbi.so -Wl,--version-script,Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nssckbi.def -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi.so Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/anchor.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/constants.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bfind.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/binst.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bobject.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bsession.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bslot.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/btoken.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certdata.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ckbiver.o ../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a ../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/ckfw/builtins' cd pem; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/ckfw/pem' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/anchor.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard anchor.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/constants.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard constants.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pargs.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pargs.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pfind.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pfind.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pinst.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pinst.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pobject.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pobject.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/prsa.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard prsa.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/psession.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard psession.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pslot.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pslot.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ptoken.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ptoken.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ckpemver.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ckpemver.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/rsawrapr.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard rsawrapr.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/util.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard util.c grep -v ';-' nsspem.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsspem.def rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnsspem.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnsspem.so -Wl,--version-script,Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsspem.def -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnsspem.so Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/anchor.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/constants.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pargs.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pfind.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pinst.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pobject.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/prsa.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/psession.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pslot.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ptoken.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ckpemver.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/rsawrapr.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/util.o ../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a ../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lnssutil3 -lfreebl3 -L../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lnssckfw -lnssb -lplc4 -lplds4 -L../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -lfreebl3 -lsoftokn3 -lpthread -ldl -lc -L/usr/lib -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl chmod +x Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnsspem.so ../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnsspem.so ../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/ckfw/pem' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/ckfw' cd sysinit; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/sysinit' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsssysinit.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nsssysinit.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsssysinit.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnsssysinit.so -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsssysinit.o -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib/sysinit' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/lib' cd cmd; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd' cd lib; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/lib' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/basicutil.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard basicutil.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/secutil.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secutil.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/secpwd.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secpwd.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/derprint.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard derprint.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/moreoids.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard moreoids.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pppolicy.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pppolicy.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ffs.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ffs.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11table.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11table.c rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libsectool.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libsectool.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/basicutil.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/secutil.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/secpwd.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/derprint.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/moreoids.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pppolicy.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ffs.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11table.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libsectool.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libsectool.a ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libsectool.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/lib' cd shlibsign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/shlibsign' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/shlibsign.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard shlibsign.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/shlibsign -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/shlibsign.o -Wl,-z,relro -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/shlibsign ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin cd mangle; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/shlibsign/mangle' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/mangle.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mangle.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/mangle -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/mangle.o -Wl,-z,relro -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/mangle ../../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/shlibsign/mangle' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/shlibsign' cd addbuiltin; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/addbuiltin' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/addbuiltin.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard addbuiltin.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/addbuiltin -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/addbuiltin.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/addbuiltin ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/addbuiltin' cd atob; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/atob' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/atob.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard atob.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/atob -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/atob.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/atob ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/atob' cd btoa; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/btoa' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/btoa.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard btoa.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/btoa -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/btoa.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/btoa ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/btoa' cd certcgi; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/certcgi' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certcgi.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certcgi.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certcgi -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certcgi.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certcgi ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/certcgi' cd certutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/certutil' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certext.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certext.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certutil.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certutil.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/keystuff.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard keystuff.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certutil -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certext.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certutil.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/keystuff.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certutil ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/certutil' cd chktest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/chktest' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/chktest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard chktest.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/chktest -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/chktest.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/chktest ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/chktest' cd crlutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/crlutil' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crlgen_lex.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlgen_lex.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crlgen.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlgen.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crlutil.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlutil.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crlutil -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crlgen_lex.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crlgen.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crlutil.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crlutil ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/crlutil' cd crmftest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/crmftest' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/testcrmf.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard testcrmf.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crmftest -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/testcrmf.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/crmftest ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/crmftest' cd dbtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/dbtest' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/dbtest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dbtest.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/dbtest -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/dbtest.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/dbtest ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/dbtest' cd derdump; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/derdump' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/derdump.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard derdump.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/derdump -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/derdump.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/derdump ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/derdump' cd digest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/digest' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/digest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard digest.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/digest -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/digest.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/digest ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/digest' cd httpserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/httpserv' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/httpserv.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard httpserv.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/httpserv -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/httpserv.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/httpserv ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/httpserv' cd listsuites; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/listsuites' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/listsuites.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard listsuites.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/listsuites -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/listsuites.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/listsuites ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/listsuites' cd makepqg; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/makepqg' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/makepqg.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard makepqg.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/makepqg -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/makepqg.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/makepqg ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/makepqg' cd multinit; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/multinit' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/multinit.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard multinit.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/multinit -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/multinit.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/multinit ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/multinit' cd ocspclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/ocspclnt' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ocspclnt.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocspclnt.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ocspclnt -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ocspclnt.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ocspclnt ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/ocspclnt' cd ocspresp; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/ocspresp' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ocspresp.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocspresp.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ocspresp -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ocspresp.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ocspresp ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/ocspresp' cd oidcalc; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/oidcalc' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/oidcalc.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard oidcalc.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/oidcalc -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/oidcalc.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/oidcalc ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/oidcalc' cd p7content; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/p7content' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7content.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7content.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7content -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7content.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7content ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/p7content' cd p7env; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/p7env' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7env.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7env.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7env -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7env.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7env ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/p7env' cd p7sign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/p7sign' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7sign.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7sign.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7sign -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7sign.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7sign ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/p7sign' cd p7verify; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/p7verify' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7verify.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7verify.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7verify -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7verify.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/p7verify ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/p7verify' cd pk12util; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pk12util' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk12util.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk12util.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk12util -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk12util.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk12util ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pk12util' cd pk11ectest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pk11ectest' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11ectest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11ectest.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11ectest -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11ectest.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11ectest ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pk11ectest' cd pk11gcmtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pk11gcmtest' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11gcmtest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11gcmtest.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11gcmtest -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11gcmtest.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11gcmtest ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pk11gcmtest' cd pk11mode; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pk11mode' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11mode.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11mode.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11mode -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11mode.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11mode ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pk11mode' cd pk1sign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pk1sign' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk1sign.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk1sign.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk1sign -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk1sign.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk1sign ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pk1sign' cd pp; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pp' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pp.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pp.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pp -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pp.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pp ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pp' cd pwdecrypt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pwdecrypt' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pwdecrypt.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pwdecrypt.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pwdecrypt -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pwdecrypt.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pwdecrypt ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pwdecrypt' cd rsaperf; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/rsaperf' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/rsaperf.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard rsaperf.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/defkey.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard defkey.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/rsaperf -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/rsaperf.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/defkey.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/rsaperf ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/sdrtest' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sdrtest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sdrtest.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sdrtest -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sdrtest.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sdrtest ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/sdrtest' cd selfserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/selfserv' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/selfserv.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard selfserv.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/selfserv -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/selfserv.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/selfserv ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/selfserv' cd signtool; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/signtool' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/signtool.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard signtool.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certgen.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certgen.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/javascript.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard javascript.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/list.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard list.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sign.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sign.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/util.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard util.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/verify.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard verify.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/zip.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard zip.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/signtool -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/signtool.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/certgen.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/javascript.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/list.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/sign.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/util.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/verify.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/zip.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/signtool ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/signtool' cd signver; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/signver' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/signver.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard signver.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk7print.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk7print.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/signver -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/signver.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk7print.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/signver ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/signver' cd smimetools; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/smimetools' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsutil.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsutil.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsutil -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsutil.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/cmsutil ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/smimetools' cd ssltap; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/ssltap' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssltap.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssltap.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssltap -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssltap.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssltap ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/ssltap' cd strsclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/strsclnt' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/strsclnt.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard strsclnt.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/strsclnt -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/strsclnt.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/strsclnt ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/symkeyutil' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/symkeyutil.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard symkeyutil.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/symkeyutil -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/symkeyutil.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/symkeyutil ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/symkeyutil' cd tests; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/tests' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/baddbdir.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard baddbdir.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/baddbdir -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/baddbdir.o \ -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/conflict.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard conflict.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/conflict -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/conflict.o \ -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/dertimetest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dertimetest.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/dertimetest -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/dertimetest.o \ -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/encodeinttest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard encodeinttest.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/encodeinttest -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/encodeinttest.o \ -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nonspr10.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nonspr10.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nonspr10 -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nonspr10.o \ -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/remtest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard remtest.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/remtest -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/remtest.o \ -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/secmodtest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secmodtest.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/secmodtest -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/secmodtest.o \ -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/baddbdir Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/conflict Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/dertimetest Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/encodeinttest Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nonspr10 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/remtest Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/secmodtest ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/tests' cd tstclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/tstclnt' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tstclnt.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tstclnt.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tstclnt -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tstclnt.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tstclnt ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/tstclnt' cd vfychain; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/vfychain' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/vfychain.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard vfychain.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/vfychain -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/vfychain.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/vfychain ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/vfychain' cd vfyserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/vfyserv' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/vfyserv.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard vfyserv.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/vfyutil.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard vfyutil.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/vfyserv -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/vfyserv.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/vfyutil.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/vfyserv ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/vfyserv' cd modutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/modutil' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/modutil.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard modutil.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/instsec.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard instsec.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/install.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard install.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/installparse.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard installparse.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/install-ds.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard install-ds.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard lex.Pk11Install_yy.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/modutil -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/modutil.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/instsec.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/install.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/installparse.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/install-ds.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/modutil ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/modutil' cd pkix-errcodes; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pkix-errcodes' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix-errcodes.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix-errcodes.c cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix-errcodes -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix-errcodes.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pkix-errcodes ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd/pkix-errcodes' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/cmd' cd gtests; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests' cd google_test; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/google_test' if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/gtest/src; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/gtest/src; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/gtest/src; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -Igtest/include/ -Igtest -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/gtest -I../../../dist/private/gtest -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -std=c++0x gtest/src/gtest-all.cc rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libgtest.a ar cr Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libgtest.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o echo Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libgtest.a Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libgtest.a rm -f Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libgtest1.so g++ -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libgtest1.so Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc chmod +x Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libgtest1.so ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libgtest.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libgtest1.so ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/google_test' cd common; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/common' if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/gtests.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/gtest -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -std=c++0x gtests.cc g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/gtests -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/gtest -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/gtests.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/gtests ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/common' cd der_gtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/der_gtest' if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/der_getint_unittest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -std=c++0x der_getint_unittest.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/der_private_key_import_unittest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -std=c++0x der_private_key_import_unittest.cc g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/der_gtest -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/der_getint_unittest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/der_private_key_import_unittest.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a ../common/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/gtests.o ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/der_gtest ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/der_gtest' cd pk11_gtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/pk11_gtest' if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11_aeskeywrap_unittest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -std=c++0x pk11_aeskeywrap_unittest.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11_export_unittest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -std=c++0x pk11_export_unittest.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11_pbkdf2_unittest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -std=c++0x pk11_pbkdf2_unittest.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11_prf_unittest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -std=c++0x pk11_prf_unittest.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11_prng_unittest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -std=c++0x pk11_prng_unittest.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11_rsapss_unittest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -std=c++0x pk11_rsapss_unittest.cc g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11_gtest -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11_aeskeywrap_unittest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11_export_unittest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11_pbkdf2_unittest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11_prf_unittest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11_prng_unittest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11_rsapss_unittest.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a ../common/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/gtests.o ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/pk11_gtest ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/pk11_gtest' cd ssl_gtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/ssl_gtest' cc -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libssl_internals.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -DNSS_DISABLE_TLS_1_3 libssl_internals.c if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_0rtt_unittest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -DNSS_DISABLE_TLS_1_3 -std=c++0x ssl_0rtt_unittest.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_cert_ext_unittest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -DNSS_DISABLE_TLS_1_3 -std=c++0x ssl_cert_ext_unittest.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_ciphersuite_unittest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -DNSS_DISABLE_TLS_1_3 -std=c++0x ssl_ciphersuite_unittest.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_dhe_unittest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -DNSS_DISABLE_TLS_1_3 -std=c++0x ssl_dhe_unittest.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_drop_unittest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -DNSS_DISABLE_TLS_1_3 -std=c++0x ssl_drop_unittest.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_ecdh_unittest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -DNSS_DISABLE_TLS_1_3 -std=c++0x ssl_ecdh_unittest.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_exporter_unittest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -DNSS_DISABLE_TLS_1_3 -std=c++0x ssl_exporter_unittest.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_gtest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -DNSS_DISABLE_TLS_1_3 -std=c++0x ssl_gtest.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_record_unittest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -DNSS_DISABLE_TLS_1_3 -std=c++0x ssl_record_unittest.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_skip_unittest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -DNSS_DISABLE_TLS_1_3 -std=c++0x ssl_skip_unittest.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_staticrsa_unittest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -DNSS_DISABLE_TLS_1_3 -std=c++0x ssl_staticrsa_unittest.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/test_io.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -DNSS_DISABLE_TLS_1_3 -std=c++0x test_io.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tls_agent.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -DNSS_DISABLE_TLS_1_3 -std=c++0x tls_agent.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tls_connect.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -DNSS_DISABLE_TLS_1_3 -std=c++0x tls_connect.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tls_hkdf_unittest.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -DNSS_DISABLE_TLS_1_3 -std=c++0x tls_hkdf_unittest.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tls_filter.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -DNSS_DISABLE_TLS_1_3 -std=c++0x tls_filter.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tls_parser.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -DNSS_DISABLE_TLS_1_3 -std=c++0x tls_parser.cc g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_gtest -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -DNSS_DISABLE_TLS_1_3 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/libssl_internals.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_0rtt_unittest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_cert_ext_unittest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_ciphersuite_unittest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_dhe_unittest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_drop_unittest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_ecdh_unittest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_exporter_unittest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_gtest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_record_unittest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_skip_unittest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_staticrsa_unittest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/test_io.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tls_agent.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tls_connect.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tls_hkdf_unittest.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tls_filter.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/tls_parser.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a -lsoftokn3 ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/ssl_gtest ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/ssl_gtest' cd nss_bogo_shim; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/nss_bogo_shim' if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/config.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -std=c++0x -std=c++0x config.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsskeys.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -std=c++0x -std=c++0x nsskeys.cc if test ! -d Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nss_bogo_shim.o -c -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -std=c++0x -std=c++0x nss_bogo_shim.cc g++ -o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nss_bogo_shim -O2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/config.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsskeys.o Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nss_bogo_shim.o -Wl,-z,relro ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/nss_bogo_shim ../../../dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests/nss_bogo_shim' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/gtests' make: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss' ~/build/BUILD/nss-3.28.2/nss ~/build/BUILD/nss-3.28.2 + unset NSS_BLTEST_NOT_AVAILABLE + pushd ./nss + /usr/bin/make clean_docs build_docs /usr/bin/make -C ./doc clean make[1]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/doc' rm -f date.xml version.xml *.tar.bz2 rm -f html/*.proc rm -fr nss-man ascii make[1]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/doc' /usr/bin/make -C ./doc make[1]: Entering directory `/builddir/build/BUILD/nss-3.28.2/nss/doc' date +"%e %B %Y" | tr -d '\n' > date.xml echo -n > version.xml mkdir -p html mkdir -p nroff make[1]: Leaving directory `/builddir/build/BUILD/nss-3.28.2/nss/doc' + popd ~/build/BUILD/nss-3.28.2 + /usr/bin/mkdir -p ./dist/doc/nroff + /usr/bin/cp ./nss/doc/nroff/certutil.1 ./nss/doc/nroff/cmsutil.1 ./nss/doc/nroff/crlutil.1 ./nss/doc/nroff/derdump.1 ./nss/doc/nroff/modutil.1 ./nss/doc/nroff/pk12util.1 ./nss/doc/nroff/pp.1 ./nss/doc/nroff/signtool.1 ./nss/doc/nroff/signver.1 ./nss/doc/nroff/ssltap.1 ./nss/doc/nroff/vfychain.1 ./nss/doc/nroff/vfyserv.1 ./dist/doc/nroff + /usr/bin/mkdir -p ./dist/pkgconfig + /usr/bin/cat /builddir/build/SOURCES/nss.pc.in + sed -e s,%libdir%,/usr/lib,g -e s,%prefix%,/usr,g -e s,%exec_prefix%,/usr,g -e s,%includedir%,/usr/include/nss3,g -e s,%NSS_VERSION%,3.28.2,g -e s,%NSPR_VERSION%,4.13.1,g -e s,%NSSUTIL_VERSION%,3.28.2,g -e s,%SOFTOKEN_VERSION%,3.16.2.3,g ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMAJOR' ++ awk '{print $3}' + NSS_VMAJOR=3 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMINOR' ++ awk '{print $3}' + NSS_VMINOR=28 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VPATCH' ++ awk '{print $3}' + NSS_VPATCH=1 + export NSS_VMAJOR + export NSS_VMINOR + export NSS_VPATCH + /usr/bin/cat /builddir/build/SOURCES/nss-config.in + sed -e s,@libdir@,/usr/lib,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss3,g -e s,@MOD_MAJOR_VERSION@,3,g -e s,@MOD_MINOR_VERSION@,28,g -e s,@MOD_PATCH_VERSION@,1,g + chmod 755 ./dist/pkgconfig/nss-config + /usr/bin/cat /builddir/build/SOURCES/setup-nsssysinit.sh + chmod 755 ./dist/pkgconfig/setup-nsssysinit.sh + /usr/bin/cp ./nss/lib/ckfw/nssck.api ./dist/private/nss/ + date '+%e %B %Y' + tr -d '\n' + echo -n 3.28.2 + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/nss-config.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/setup-nsssysinit.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/pkcs11.txt.xml . + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man nss-config.xml Note: Writing nss-config.1 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man setup-nsssysinit.xml Note: Writing setup-nsssysinit.1 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man pkcs11.txt.xml Note: Writing pkcs11.txt.5 + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/cert8.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/cert9.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/key3.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/key4.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/secmod.db.xml . + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man cert8.db.xml Note: Writing cert8.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man cert9.db.xml Note: Writing cert9.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man key3.db.xml Note: Writing key3.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man key4.db.xml Note: Writing key4.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man secmod.db.xml Note: Writing secmod.db.5 + exit 0 Executing(%install): /bin/sh -e /var/tmp/rpm-tmp.59vIJE + umask 022 + cd /builddir/build/BUILD + '[' /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm '!=' / ']' + rm -rf /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm ++ dirname /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm + mkdir -p /builddir/build/BUILDROOT + mkdir /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm + cd nss-3.28.2 + /usr/bin/rm -rf /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3/templates + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/bin + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib/nss/unsupported-tools + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib/pkgconfig + mkdir -p /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man1 + mkdir -p /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man5 + touch /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/lib/libnssckbi.so + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib/nss/libnssckbi.so + for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib + for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib + for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib + for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib + for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//etc/pki/nssdb + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert8.db /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//etc/pki/nssdb/cert8.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key3.db /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//etc/pki/nssdb/key3.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-secmod.db /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//etc/pki/nssdb/secmod.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert9.db /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//etc/pki/nssdb/cert9.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key4.db /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//etc/pki/nssdb/key4.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/system-pkcs11.txt /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//etc/pki/nssdb/pkcs11.txt + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/certutil /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/cmsutil /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/crlutil /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/modutil /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/signtool /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/signver /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/ssltap /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/bin + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/atob /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/btoa /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/derdump /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/listsuites /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/ocspclnt /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pp /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/selfserv /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/strsclnt /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/symkeyutil /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/tstclnt /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/vfyserv /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/vfychain /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib/nss/unsupported-tools + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cert.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/certdb.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/certt.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmmf.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmmft.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cms.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmsreclist.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmst.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/crmf.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/crmft.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cryptohi.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cryptoht.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jar-ds.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jar.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jarfile.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/key.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keyhi.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keyt.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keythi.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nss.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssbase.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssbaset.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckbi.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckepv.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckft.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfw.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfwc.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfwt.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckg.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckmdt.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckt.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nsspem.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ocsp.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ocspt.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12plcy.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12t.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11func.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11pqg.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11priv.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11pub.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11sdr.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs12.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs12t.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs7t.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/preenc.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sechash.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmime.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmod.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmodt.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secpkcs5.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secpkcs7.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/smime.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ssl.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslerr.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslproto.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslt.h /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3 + for file in dist/private/nss/nssck.api + /usr/bin/install -p -m 644 dist/private/nss/nssck.api /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/include/nss3/templates + /usr/bin/install -p -m 644 ./dist/pkgconfig/nss.pc /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/lib/pkgconfig/nss.pc + /usr/bin/install -p -m 755 ./dist/pkgconfig/nss-config /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/bin/nss-config + /usr/bin/install -p -m 755 ./dist/pkgconfig/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/bin/setup-nsssysinit.sh + ln -r -s -f /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/bin/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm//usr/bin/setup-nsssysinit + for f in nss-config setup-nsssysinit + install -c -m 644 nss-config.1 /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man1/nss-config.1 + for f in nss-config setup-nsssysinit + install -c -m 644 setup-nsssysinit.1 /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man1/setup-nsssysinit.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/certutil.1 /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man1/certutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/cmsutil.1 /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man1/cmsutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/crlutil.1 /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man1/crlutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/derdump.1 /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man1/derdump.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/modutil.1 /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man1/modutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/pk12util.1 /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man1/pk12util.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/pp.1 /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man1/pp.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/signtool.1 /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man1/signtool.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/signver.1 /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man1/signver.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/ssltap.1 /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man1/ssltap.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/vfychain.1 /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man1/vfychain.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/vfyserv.1 /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man1/vfyserv.1 + for f in pkcs11.txt + install -c -m 644 pkcs11.txt.5 /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man5/pkcs11.txt.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 cert8.db.5 /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man5/cert8.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 cert9.db.5 /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man5/cert9.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 key3.db.5 /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man5/key3.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 key4.db.5 /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man5/key4.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 secmod.db.5 /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/share/man/man5/secmod.db.5 + /usr/lib/rpm/find-debuginfo.sh --strict-build-id -m --run-dwz --dwz-low-mem-die-limit 10000000 --dwz-max-die-limit 50000000 /builddir/build/BUILD/nss-3.28.2 extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/bin/certutil extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/bin/modutil extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/bin/ssltap extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/bin/cmsutil extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/bin/crlutil extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/bin/pk12util extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/bin/signtool extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/bin/signver extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/lib/libsmime3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/lib/libnsssysinit.so extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/lib/libssl3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/lib/libnsspem.so extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/lib/nss/unsupported-tools/listsuites extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/lib/nss/unsupported-tools/symkeyutil extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/lib/nss/unsupported-tools/derdump extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/lib/nss/unsupported-tools/pp extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/lib/nss/unsupported-tools/tstclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/lib/nss/unsupported-tools/atob extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/lib/nss/unsupported-tools/btoa extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/lib/nss/unsupported-tools/strsclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/lib/nss/unsupported-tools/ocspclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/lib/nss/unsupported-tools/vfychain extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/lib/nss/unsupported-tools/selfserv extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/lib/nss/unsupported-tools/vfyserv extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/lib/nss/libnssckbi.so extracting debug info from /builddir/build/BUILDROOT/nss-3.28.2-1.6.el7.arm/usr/lib/libnss3.so /usr/lib/rpm/sepdebugcrcfix: Updated 26 CRC32s, 0 CRC32s did match. cpio: nss-3.28.2/nss/cmd/modutil/lex.Pk11Install_yy.cpp: Cannot stat: No such file or directory cpio: nss-3.28.2/nss/cmd/modutil/ytab.c: Cannot stat: No such file or directory 25467 blocks + /usr/lib/rpm/check-buildroot + /usr/lib/rpm/redhat/brp-compress + /usr/lib/rpm/redhat/brp-strip-static-archive /usr/bin/strip + /usr/lib/rpm/brp-python-bytecompile /usr/bin/python 1 + /usr/lib/rpm/redhat/brp-python-hardlink + /usr/lib/rpm/redhat/brp-java-repack-jars Executing(%check): /bin/sh -e /var/tmp/rpm-tmp.68ygkW + umask 022 + cd /builddir/build/BUILD + cd nss-3.28.2 + '[' 0 -eq 1 ']' + export NSS_NO_SSL2=1 + NSS_NO_SSL2=1 + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + export BUILD_OPT=1 + BUILD_OPT=1 + export NSS_BLTEST_NOT_AVAILABLE=1 + NSS_BLTEST_NOT_AVAILABLE=1 + export SOFTOKEN_LIB_DIR=/usr/lib + SOFTOKEN_LIB_DIR=/usr/lib ++ find ./nss/tests ++ grep -c ' ' + SPACEISBAD=0 + : + '[' 0 -ne 0 ']' ++ perl -e 'print 9000 + int rand 1000' 9626 selfserv_9626 + MYRAND=9626 + echo 9626 + RANDSERV=selfserv_9626 + echo selfserv_9626 ++ ls -d ./dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin ./dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin + DISTBINDIR=./dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin + echo ./dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin ++ pwd ~/build/BUILD/nss-3.28.2 ~/build/BUILD/nss-3.28.2 + pushd /builddir/build/BUILD/nss-3.28.2 + cd ./dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin + ln -s selfserv selfserv_9626 ~/build/BUILD/nss-3.28.2 + popd + find ./nss/tests -type f + grep -v '\.db$' + xargs -l perl -pi -e 's/\bselfserv\b/selfserv_9626/g' + grep -vw CVS + grep -v '\.crt$' + xargs grep -lw selfserv + grep -v '\.crl$' + killall selfserv_9626 selfserv_9626: no process found + : + rm -rf ./tests_results ~/build/BUILD/nss-3.28.2/nss/tests ~/build/BUILD/nss-3.28.2 + pushd ./nss/tests/ + HOST=localhost + DOMSUF=localdomain + PORT=9626 + NSS_CYCLES= + NSS_TESTS='libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec gtests ssl_gtests' + NSS_SSL_TESTS= + NSS_SSL_RUN= + ./all.sh testdir is /builddir/build/BUILD/nss-3.28.2/tests_results/security init.sh init: Creating /builddir/build/BUILD/nss-3.28.2/tests_results/security which: no domainname in (.:/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/usr/local/sbin:/builddir/.local/bin:/builddir/bin) ******************************************** Platform: Linux4.8_arm_cc_glibc_PTH_OPT.OBJ Results: localhost.1 ******************************************** init.sh init: Testing PATH .:/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/usr/local/sbin:/builddir/.local/bin:/builddir/bin against LIB /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib: Running tests for libpkix TIMESTAMP libpkix BEGIN: Fri Mar 31 14:07:55 UTC 2017 TIMESTAMP libpkix END: Fri Mar 31 14:07:55 UTC 2017 Running tests for cert TIMESTAMP cert BEGIN: Fri Mar 31 14:07:55 UTC 2017 cert.sh: Certutil and Crlutil Tests with ECC =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating an DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #37: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #39: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -f ../tests.pw cert.sh: #50: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #51: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #52: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #53: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #54: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #55: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #56: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #57: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #58: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #59: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #60: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #61: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #62: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #63: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #64: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #65: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #66: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #67: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #68: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #69: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #71: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #72: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #73: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #75: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #76: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #77: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #78: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -f ../tests.pw cert.sh: #79: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #80: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #81: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #82: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #84: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #85: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #86: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #88: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #89: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #90: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #91: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #92: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #93: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #94: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #95: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #96: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #97: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #98: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #99: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #100: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #101: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #102: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #104: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #105: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #106: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #107: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw cert.sh: #108: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #109: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -i ../CA/TestCA.ca.cert cert.sh: #110: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #111: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -i ../CA/TestCA-ec.ca.cert cert.sh: #112: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #113: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #114: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #116: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #117: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #118: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #119: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #120: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #121: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #123: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #126: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #128: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #129: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -i ../CA/TestCA.ca.cert cert.sh: #130: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #131: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -i ../CA/TestCA-ec.ca.cert cert.sh: #132: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #133: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #134: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #135: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #136: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #137: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #138: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #139: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #140: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #141: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #142: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #143: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #144: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #149: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #152: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #155: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #158: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #160: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #161: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #163: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #164: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #165: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/alicedir -f ../tests.pw cert.sh: #166: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #167: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/alicedir -i ../CA/TestCA.ca.cert cert.sh: #168: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #169: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #170: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #171: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #172: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #173: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #174: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #175: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #176: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #177: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #178: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #179: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #180: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #181: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #182: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #183: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #184: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #185: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/bobdir -f ../tests.pw cert.sh: #186: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #187: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/bobdir -i ../CA/TestCA.ca.cert cert.sh: #188: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #189: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #190: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #191: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #192: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #193: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #195: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #198: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #201: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #204: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dave -f ../tests.pw cert.sh: #206: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #207: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dave -i ../CA/TestCA.ca.cert cert.sh: #208: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #209: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #210: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #211: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #212: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #213: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #214: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #215: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #216: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #218: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #221: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #224: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eve -f ../tests.pw cert.sh: #226: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #227: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eve -i ../CA/TestCA.ca.cert cert.sh: #228: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #229: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #230: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #231: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #232: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #233: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #234: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #235: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #236: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #237: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #238: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #239: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #241: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #244: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #246: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #247: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #248: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #249: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #250: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #251: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #252: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #253: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips -f ../tests.fipspw cert.sh: #254: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #255: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #256: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eccurves -f ../tests.pw cert.sh: #258: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #260: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #261: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #262: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #263: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #264: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #265: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #266: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #267: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #268: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #269: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw cert.sh: #270: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #271: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #272: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #273: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #274: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #276: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #278: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #279: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #281: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #282: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #283: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #284: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #285: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #286: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #287: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #288: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #289: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:80:ed:93 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 14:14:24 2017 Not After : Sat Jul 01 14:14:24 2017 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:54:ed:74:f2:4f:0b:91:a8:3f:df:b3:be:21:e5:0f: 58:bc:cf:29:91:37:a5:79:c8:c4:bc:59:f8:ce:d6:b1: 49:c2:1a:61:33:19:26:63:7f:47:3b:d3:0e:64:b4:cb: 1b:b4:3e:c2:ab:4e:e8:31:2f:76:4a:88:b8:e8:be:8d: a1:c4:5e:12:c5:11:fc:f5:c8:7c:f3:cb:1b:aa:9e:f5: b5:bc:6b:67:f0:a6:ac:69:43:0d:d6:1e:0a:4a:ec:f3: ed:6b:be:63:28:20:f7:e6:3c:e7:53:da:f8:57:0e:bc: b7:79:e2:bd:ec:65:7b:c7:dd:2f:2d:30:a8:67:be:82: 84:ae:45:18:5c:79:a9:da:1a:83:92:c7:3b:00:f8:2a: 65:04:d7:df:90:6c:77:bb:52:0a:bc:27:fd:8a:e4:b9: a2:cd:99:d6:10:04:93:f7:d9:ca:a0:5e:37:20:44:ba: 98:b2:72:fd:16:db:d4:37:07:29:b5:2b:51:1c:85:d7: 1d:c8:d5:92:5e:1e:1d:61:4a:66:3f:bd:76:d7:7c:51: c3:70:ea:65:87:53:82:cb:76:d5:f5:5b:43:35:04:4a: 1c:d2:2a:3c:a3:e5:b1:36:77:d8:5b:51:2a:3c:93:db: 97:07:47:e1:be:e9:cb:ac:ec:e3:78:f9:c6:65:ec:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:19:b5:5a:34:de:83:69:18:5d:0f:f2:9d:1b:92:4a: 79:1a:05:b5:19:a6:c7:86:6e:9b:a0:81:77:db:9a:48: ed:45:31:ee:c6:9c:da:89:1c:b2:e1:1b:d9:b6:c0:83: df:fa:49:b3:e8:74:3e:f3:98:ec:dd:a9:de:91:57:9e: 0f:9a:fb:6f:e6:a7:b3:51:33:f3:05:81:b4:ce:3b:25: 01:21:2e:ef:fe:ad:0d:7f:d8:1a:30:7b:11:01:d3:7e: d7:8b:cd:8a:19:16:7c:d9:f4:34:ff:b1:39:2f:2b:44: 34:c3:5d:38:0a:63:85:44:d8:40:45:0b:de:c5:b9:8e: ce:4b:53:f2:fa:9c:8d:93:39:df:54:d0:03:44:b5:f5: 85:27:01:45:76:c3:29:0a:4b:f6:3d:d8:43:19:34:e1: 90:55:bc:9e:b5:be:10:66:dc:2d:ec:df:34:e6:8d:a7: 9d:75:34:b7:50:79:41:70:20:45:05:3d:6c:09:65:2f: 1e:fc:ba:b8:48:16:41:ec:d9:20:4c:bf:36:99:15:4f: 65:76:21:20:48:04:33:99:45:bc:5f:bd:16:c3:ea:83: 47:1b:25:83:e4:61:9e:92:bf:9a:78:7b:91:e7:26:f4: 7d:f8:64:75:ab:24:59:c7:12:ab:4a:32:75:7e:9f:7a Fingerprint (SHA-256): 8A:94:9E:A2:84:2B:3C:13:D0:78:88:7B:09:D8:ED:A1:4A:BD:FB:FE:00:8E:87:23:AE:FF:05:BE:D1:DB:2B:E2 Fingerprint (SHA1): E5:1C:BC:66:51:60:EB:85:F5:12:47:08:E1:17:D3:02:16:10:68:04 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #290: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:80:ed:aa Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 14:14:36 2017 Not After : Sat Jul 01 14:14:36 2017 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:41:8f:bd:04:79:56:83:0c:18:f5:02:a6:ae:7b:16: bc:9c:d6:29:ed:5d:0d:9a:48:bf:1e:be:fc:1f:10:3b: 99:e2:e9:2c:91:d9:63:3c:6f:4f:62:39:9c:f4:87:90: 31:9a:eb:2e:2b:19:63:97:bb:38:59:df:0b:e0:8f:4a: 20:15:e8:b6:83:ec:c4:c8:4d:7d:86:99:3a:19:ca:d7: 3a:15:44:7a:3a:d8:1e:4d:8e:81:7d:f8:01:d6:9a:48: 3a:59:fe:4b:89:19:dc:35:78:6b:7c:81:67:57:74:f8: 34:a5:54:e1:1f:04:0b:90:50:b1:8b:e2:bb:c0:a6:16: 96:88:7d:cd:2d:cb:c2:a4:c4:52:48:eb:4e:da:63:36: 22:3c:95:4f:d9:95:c2:d6:c0:8c:b2:d5:b6:3c:e0:3e: 67:f1:db:14:ed:8c:6f:dd:bb:92:39:02:9d:aa:55:20: ed:81:99:52:bd:ae:93:5f:67:20:9f:20:5b:32:b4:3e: b7:f2:d9:2a:40:7c:e3:11:20:7a:76:6e:b0:f1:09:a6: e5:de:a5:9e:14:d8:b8:03:18:b1:9c:cb:4b:27:c2:91: 83:c0:f9:96:2a:2d:5d:ee:8a:9d:84:57:6c:fe:e9:dc: 66:70:99:9d:e9:d4:df:66:93:9f:e7:6f:36:82:f4:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:e6:99:36:15:bc:c3:f3:d4:45:78:32:92:99:e6:d9: a7:30:1c:5f:da:fa:fb:6e:32:99:25:89:cb:9b:7a:06: 3f:b3:9e:9a:94:41:92:7f:fc:ee:31:52:49:3d:f3:f7: bd:63:08:55:3e:51:bc:92:7f:94:1b:eb:be:4e:97:57: 44:ff:f6:49:9a:16:47:7c:b1:ca:62:9f:d2:6e:e9:53: 25:da:4a:d3:e6:f5:c0:89:b3:f8:18:72:04:12:1f:6c: 08:0a:19:a9:59:6e:a2:92:0b:5f:0a:7d:11:00:43:d7: 83:3d:ea:99:3f:ae:26:41:b3:d6:31:c1:f7:3c:05:85: 52:45:f9:8c:c4:3c:94:53:77:e4:dd:d5:47:77:0c:98: 3a:65:0e:1b:97:e4:8f:fa:a3:82:b4:3b:b9:bd:5e:12: f4:af:f3:41:08:51:aa:36:42:3f:ae:bf:1c:58:72:0c: 40:3a:3b:34:f6:9a:ee:59:a2:9e:e9:1d:12:74:9c:68: 62:04:4c:0a:a5:16:49:64:8c:f1:9a:ec:6a:29:fd:e5: 35:6e:f7:1d:7d:e6:87:3d:6e:27:c2:a4:13:70:7f:ae: 52:36:57:9c:f0:dd:8d:40:89:92:bb:a9:62:43:8d:0e: 56:2d:67:37:d8:eb:61:4f:7e:b3:1b:5b:84:8d:9d:c0 Fingerprint (SHA-256): 3C:07:72:59:C8:94:F6:5A:41:89:6A:92:1E:23:E5:AC:83:F7:AA:F8:4C:AF:10:8C:BE:83:91:E0:46:45:B0:60 Fingerprint (SHA1): 65:4A:66:18:62:C8:29:A2:9C:FA:BA:2D:3E:9C:61:8E:89:7A:6A:25 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #291: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:80:ed:c0 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 14:14:46 2017 Not After : Sat Jul 01 14:14:46 2017 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:38:8a:ef:5e:19:e2:8c:77:8c:35:ce:2e:72:16:99: b9:a5:de:d4:aa:8d:09:c5:ba:4f:82:3c:d3:a8:d8:a3: 50:3c:3c:e3:8d:50:6d:43:b5:6f:a1:98:e5:31:d5:49: ad:f3:d2:1c:b7:50:31:ff:1b:ed:25:65:9f:87:66:b1: 15:ef:38:94:01:b6:3b:42:1a:3e:be:15:3c:30:5d:68: 85:b1:bd:53:d0:3f:e4:2a:27:80:62:b6:f2:32:c3:f3: e3:4c:48:70:4a:95:f5:dc:8c:5e:bd:d5:d2:4e:bc:4a: 4c:1e:d7:c8:22:74:58:a4:92:e8:db:44:7d:a7:cb:ce: a6:ab:fd:34:73:9f:54:3e:28:6a:17:71:0e:67:9d:d9: 72:c0:62:96:b8:b0:b1:26:e7:8a:e7:97:22:72:aa:82: d7:e7:92:50:b2:af:de:d6:2b:fb:75:bc:47:b9:64:8e: fd:7f:73:ca:96:3b:67:3b:25:08:aa:74:66:08:7a:b2: 2a:aa:90:b9:7b:28:fb:71:84:42:9e:d9:52:62:2e:23: 80:55:1b:4a:63:32:1a:23:25:9d:a1:45:ce:c0:27:42: 25:1a:0e:8f:67:ac:5d:20:b0:a7:f5:3c:e2:3a:36:c0: dc:70:11:a2:60:b3:9d:61:80:4e:98:ef:55:b9:a0:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:ac:17:aa:af:9f:63:e9:3f:41:51:99:31:7c:2f:22: 88:07:cd:26:2f:a2:35:5a:c4:0b:5f:28:01:8c:02:71: 16:6b:7d:4f:90:e8:4a:a8:a8:52:f4:18:df:b2:22:a6: d1:71:a9:e8:20:af:2e:3b:ff:0a:88:46:cd:c5:03:a8: 99:c4:00:3a:f1:73:ac:46:29:e6:8b:7e:a7:7c:e8:fc: 9d:f5:e6:3d:e4:1f:46:47:d4:ec:37:93:ca:41:c0:a4: 5c:01:41:db:18:18:28:8c:ff:b9:69:15:40:a3:0b:1e: 47:58:00:cb:9b:b8:ff:d2:3e:be:a1:13:70:de:21:37: c6:46:76:fe:1f:ea:6a:83:31:90:6f:b4:2b:f4:1f:3d: 34:33:5f:c0:c0:34:92:29:1a:2a:08:78:d2:d4:dd:16: 8d:86:52:25:29:cc:1c:3a:98:40:55:d2:c5:02:53:3c: d2:8b:9a:fa:00:81:8b:47:11:b5:60:ad:51:e9:2b:5b: 02:63:a0:54:95:1e:ff:7c:6f:be:fa:fc:3f:9e:40:a7: a6:08:e2:35:52:38:44:83:b6:b7:a6:1c:98:9c:3c:9f: ed:f9:e8:e6:e9:bf:d8:f5:4b:90:c8:e1:74:88:7d:4d: 08:6c:f5:7c:d7:e8:60:01:ac:30:12:b8:7a:5d:09:42 Fingerprint (SHA-256): 9A:CE:9F:6E:8F:FC:3E:FB:2E:7B:5B:D7:8A:93:F2:67:E7:DC:9E:7C:46:90:28:3C:9A:10:B4:95:5F:64:87:2E Fingerprint (SHA1): 97:F0:8F:71:BB:1B:77:19:5B:B3:02:F8:1D:1B:8B:BA:78:32:02:DB Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #292: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:80:ed:d3 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 14:14:50 2017 Not After : Sat Jul 01 14:14:50 2017 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:d2:91:4c:bc:4b:9d:04:e0:bf:e5:7a:c2:2c:40:47: c4:6f:8a:e3:a1:68:f4:5d:09:7e:c9:c1:7f:2f:3e:86: 4c:6d:20:d5:e3:18:00:4c:0d:16:c7:4b:df:70:83:ff: 6b:cf:00:62:5b:2f:28:85:e1:2e:f2:cc:09:d3:9f:f8: b5:bf:0d:cc:a3:49:99:e1:3c:10:c9:55:a3:4d:e6:77: e6:9f:34:cc:a9:71:68:be:13:f8:f9:af:10:16:39:46: c0:90:26:90:81:20:e9:53:bc:de:2e:3e:93:0d:d7:19: 74:48:af:6d:53:05:e5:ca:99:3a:9b:19:3f:2b:ef:5d: 70:fb:9a:d7:bc:d9:f0:e7:74:81:46:c2:a0:7d:d4:7d: 6b:b4:d1:6c:4c:05:b8:1d:fc:2b:62:d6:82:83:80:53: ec:6c:d4:ff:26:3c:43:12:20:2d:a4:e9:f7:5f:ec:cf: 3c:3f:25:fa:b8:48:43:50:d0:5e:b6:0f:f2:ec:6a:2e: a6:12:8b:2a:1b:9a:67:ae:b9:29:6c:65:02:1b:02:4b: 59:66:17:cf:0d:15:62:b1:d3:9e:da:9b:1f:f3:34:f2: 0b:62:d2:e2:2b:f4:1f:92:af:13:05:5c:ce:8d:0a:5d: 0e:c3:1c:ba:e3:d2:52:ca:1d:28:84:f1:bd:bd:60:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:35:5a:4b:2f:d3:a3:c7:83:6f:b2:01:46:49:53:78: 7f:84:9f:6b:00:83:3b:54:19:2a:09:17:5c:dc:03:f6: ab:fd:3c:52:ee:d4:58:fa:08:cf:b6:46:c6:a6:47:2f: 20:74:8b:8d:db:cc:12:94:d8:18:3e:f4:1e:91:4a:30: 02:fa:9f:19:17:71:1a:e8:d8:b1:f3:3f:71:82:f4:30: 32:1b:e4:cf:7a:e3:89:96:7c:f2:ca:ec:41:5f:48:f4: 8a:d5:ff:85:86:f3:40:c0:de:fd:08:fc:e8:9e:f8:2b: 8c:6c:d9:46:de:ba:b8:01:c2:95:82:51:25:69:a3:1c: 7b:3b:c8:0f:47:ff:83:fd:8d:45:67:09:d0:27:8b:25: 3f:cd:94:75:3e:bc:fb:71:b1:b5:3a:21:5d:41:91:ff: 31:62:ff:26:71:fc:ab:a7:1f:d1:51:fc:e5:7f:3b:1f: 84:5d:0b:d0:2e:7c:2d:5d:6f:8b:f8:f9:a2:c8:62:2c: 2e:f1:40:5e:c2:9c:5e:8b:9f:13:4f:cd:3f:91:2e:f7: 72:07:8a:47:9d:a2:18:dc:3f:2c:eb:20:be:e0:48:5d: 0a:fd:80:e7:4b:95:09:a6:ef:81:a4:9c:04:35:33:b0: a1:c3:73:7b:87:35:c5:f8:4d:f5:22:21:5d:52:58:bf Fingerprint (SHA-256): A5:64:FD:FD:38:CE:92:A2:F8:D9:1A:7A:6D:10:07:5A:F3:02:90:F1:78:82:F8:1D:50:97:04:A3:1A:E0:CE:1E Fingerprint (SHA1): 0C:3F:01:85:BA:5E:66:17:98:29:E0:CD:C7:1D:AD:DE:46:E0:5D:64 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #293: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:80:ed:da Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 14:14:56 2017 Not After : Sat Jul 01 14:14:56 2017 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:2f:3e:b8:26:21:aa:ad:56:95:83:93:fb:f8:dd:05: 50:4d:1b:70:5d:4d:cd:c3:f4:6e:6b:b3:81:ee:9d:01: f0:ae:72:e3:7d:08:52:07:b8:e8:e2:d5:0d:e6:b8:ad: 42:3f:31:36:1f:ef:11:aa:a9:8e:4c:44:03:68:c7:28: 00:82:07:25:29:12:1d:20:9c:e0:83:a6:4e:7f:4e:1c: 86:86:14:ce:51:4c:75:bf:0b:e7:db:9f:86:07:f0:6e: 00:c8:69:0d:31:bf:4c:3f:a8:ec:90:74:68:67:e5:51: 99:e5:c6:76:f7:a6:7d:17:0c:90:29:de:cb:98:a6:06: c9:50:07:e4:5f:10:ad:59:be:c7:e0:96:8e:93:31:b5: bf:90:70:b6:19:c7:e2:c7:b3:c6:d6:7e:8c:2c:f8:05: eb:5b:fa:29:91:97:9d:b9:79:e5:31:d2:63:0a:35:04: 6c:85:12:74:45:c3:94:43:c2:e0:30:ef:37:a7:9b:24: 05:84:4c:e0:48:85:2f:d0:bc:11:5f:fa:b4:8a:ab:cb: 47:87:56:37:34:06:ac:3b:77:4d:fc:50:e8:11:2a:71: 20:ae:fa:43:cc:8a:b3:a8:ce:fe:17:93:59:63:a9:0a: 59:16:80:46:db:d4:ec:bc:c8:db:62:1d:20:b5:43:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 86:92:3a:2f:8e:89:a0:42:09:d8:fa:9d:01:9e:a2:0c: 72:e9:4a:03:b4:24:b4:38:a0:3a:9b:ec:a0:46:37:32: 19:f7:3f:54:21:35:bb:a9:ec:3a:fc:24:34:74:9a:be: 60:06:85:13:b1:a5:85:f9:83:ca:46:ed:d7:ce:6f:ee: c7:0c:26:24:e7:4a:83:7e:96:f6:a1:81:61:ff:81:2b: 76:8c:f0:55:7f:6e:4b:9e:64:2a:60:41:fc:a2:d5:42: d6:e1:1c:80:04:19:c7:6a:f9:45:ce:20:76:0f:0a:ed: b5:ef:c2:a3:84:5c:4a:ea:3b:22:8f:43:19:eb:31:32: e2:af:3f:62:0b:83:55:80:85:25:c4:3c:32:f7:d9:ba: cf:fa:98:b5:30:d9:7b:d5:5b:ca:1f:c9:ab:17:85:42: 29:7e:f1:d8:24:01:cc:57:8e:6c:c4:b3:7e:a9:44:a1: ff:f4:d1:70:3a:9b:f9:1b:2b:6f:30:fd:0b:2e:71:15: de:b4:2d:80:50:fa:c8:3f:3b:a7:fb:1c:5e:66:44:4f: b2:9a:3c:a3:b0:bf:4d:bc:8f:fa:db:68:63:78:97:75: 57:99:c4:44:86:c2:00:7f:88:2d:36:7e:0a:58:a1:85: bc:aa:c0:4e:fa:b9:bd:b9:7a:27:68:cc:9d:b9:db:c2 Fingerprint (SHA-256): 6A:26:2B:38:AA:36:24:D5:CE:69:E3:B2:E6:16:60:54:E2:CE:E5:22:62:CF:D2:2D:46:E0:56:62:87:28:F7:CC Fingerprint (SHA1): 10:07:DB:63:25:0B:16:9D:3D:58:F3:88:03:F1:4B:87:B8:8F:B2:5A Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #294: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:80:ed:e6 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 14:15:10 2017 Not After : Sat Jul 01 14:15:10 2017 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:1c:2f:97:10:61:b0:25:1a:46:2f:a6:da:e9:d4:62: 38:e9:2e:94:9d:00:f2:b1:c8:fc:0a:84:6f:40:e2:50: 68:db:9b:41:d7:a6:01:8f:5c:51:99:e8:a6:a4:eb:52: 86:76:7f:95:c9:4b:b5:46:d6:c6:e6:a4:df:9d:b0:4a: 52:ac:48:86:1b:9c:f2:68:84:ec:d7:6e:57:29:c7:1c: bb:1d:1d:e7:59:b1:42:24:1e:dc:b6:5e:14:85:c0:a3: 2c:ab:95:db:a3:32:fa:78:72:33:fd:87:ad:a9:2e:a5: 5b:e5:21:02:d7:38:a0:44:52:27:cd:63:92:a9:3c:ea: 3e:43:9d:a8:da:82:97:c0:b5:6f:91:39:bf:44:02:0a: 56:e3:92:71:f6:e2:af:e5:f5:7b:59:5e:80:5d:e7:1d: 27:fc:f9:3c:ff:27:eb:2c:a1:ff:70:c8:8b:07:78:99: e0:20:2e:be:6b:8b:6b:97:b0:1b:49:94:18:3b:b7:f5: b7:f5:2d:ce:b9:4a:67:47:98:f7:60:af:bd:7d:3b:5d: 76:b5:da:8a:bd:7f:fd:42:fd:6b:14:b8:e4:75:e1:be: b9:73:7b:62:df:fc:ee:23:73:41:a9:7c:e0:94:dc:86: 8d:cb:32:4e:37:c1:20:ab:49:91:b7:2a:0c:8c:72:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:a5:0b:55:d7:76:f5:ac:48:41:b5:62:fe:58:3e:ad: b2:b0:96:f1:fa:a8:df:f3:3a:6a:1e:aa:56:9a:0c:f0: 77:d4:79:be:92:d9:5d:ea:44:3b:05:69:a1:5a:bb:9c: 85:64:4a:69:be:f2:df:59:7f:59:9f:af:fa:2a:8c:e7: 79:75:1e:a8:5a:40:6e:64:8e:22:b4:fa:8d:c2:92:40: 4e:1b:9e:e1:d5:c0:bd:63:1c:79:e9:6f:af:81:82:b6: fb:db:19:bd:d3:bb:fc:bf:64:02:ad:4a:ea:a9:26:76: 91:80:07:00:f6:9b:00:05:04:4a:c1:b9:9b:69:5e:98: 29:4d:8d:8b:a8:92:d4:c5:3a:90:d4:86:2f:2a:d7:0a: dd:fd:0f:04:2f:b6:fc:7a:e1:77:3f:aa:a1:20:b5:e4: 07:6b:c1:60:89:11:8d:b8:e6:1c:db:88:fd:99:89:c6: 94:83:ce:b7:f5:79:57:2b:94:a3:db:ae:11:d6:84:36: ef:5c:58:9c:a1:e7:ab:3b:f9:75:6c:f8:41:4c:ef:4f: 45:7b:2c:db:e3:42:63:1b:bf:9d:d0:c0:bd:e6:96:e1: ce:47:cb:a9:cf:6e:a2:36:a5:f5:0e:4d:60:eb:ec:f3: d9:b6:6c:c0:99:44:11:00:2e:94:84:a0:12:1f:20:1b Fingerprint (SHA-256): BD:FA:30:4C:F9:9C:C3:BC:52:86:6D:81:3F:95:59:5C:7B:74:A8:F3:0A:78:E0:2B:90:17:A8:27:DD:AC:18:9C Fingerprint (SHA1): 55:F8:28:2E:16:B8:28:1C:AC:42:88:6A:F2:F0:00:08:EA:99:82:48 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #295: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:80:ee:01 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 14:15:16 2017 Not After : Sat Jul 01 14:15:16 2017 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:0f:b9:0a:3d:25:ce:a4:4e:7c:42:9c:08:9d:78:3f: 70:bc:a8:08:8d:71:a2:be:fb:4d:2d:97:d8:61:2b:3f: 8d:73:21:d1:78:77:6d:df:60:29:c2:f6:1c:8c:11:0d: 9f:d5:c9:a3:a3:2b:e1:a4:82:31:b3:0b:e3:77:d9:07: e2:b2:23:0c:81:bc:7a:58:38:21:97:1b:67:85:e7:a4: 04:85:52:4b:5a:e8:8d:09:5a:10:65:92:13:20:23:c4: ac:00:17:1e:62:88:09:e3:98:f1:3d:46:c8:bc:40:cb: ea:1c:27:f7:45:67:73:23:e4:d9:24:85:b4:8a:ec:6e: d0:10:03:5e:78:4e:54:a5:2a:e5:b9:cc:02:d0:1f:1c: d4:d1:7f:b4:eb:3b:0c:51:44:0d:74:e2:36:be:74:9d: 4c:b8:51:db:ae:2a:61:18:ba:02:a2:ee:b4:11:eb:04: b2:b9:6a:b8:b8:57:92:d3:00:66:a4:4d:70:34:2c:c0: 14:5c:4f:2c:e8:c2:e7:b0:bf:c4:6c:2f:ec:83:cc:9f: ed:7b:f0:7f:e4:2f:f7:14:bc:1a:f3:08:15:63:bf:c8: c2:98:0d:62:61:d3:51:61:79:55:47:d9:3e:d1:ab:04: 30:b6:53:6f:f2:a1:10:5f:7d:33:4f:40:7a:85:5a:33 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:14:8e:0e:1d:ad:42:ec:e4:d8:6f:1b:cb:30:f2:5d: a9:23:c9:24:de:66:92:72:a5:9a:32:6f:4f:88:e5:10: b2:b7:70:b4:be:d0:d6:c3:a6:0b:9f:bc:16:62:7a:f1: 8f:62:48:ec:ce:1b:9a:bb:b1:3f:a6:79:17:ac:84:d6: 96:50:7e:70:82:99:1f:82:4d:16:a3:74:fd:01:e0:4e: f3:8d:af:fe:bf:ee:3f:5d:58:e9:15:34:df:6e:3b:18: 84:c7:38:e0:b1:76:27:04:35:9a:7a:09:ce:e1:17:b3: bc:7a:99:3f:05:05:65:ca:21:47:7c:dc:18:b9:2a:05: bc:58:7a:78:69:7f:b2:e0:90:90:63:10:4a:1e:88:2e: 6d:d7:b9:27:fe:54:a1:b7:e3:e5:1c:35:21:26:43:b4: ae:52:45:56:c0:1a:e3:85:d1:6a:05:40:c9:e3:99:64: e1:77:93:df:01:18:b0:34:bb:47:ba:7b:77:0c:a6:95: 97:59:e9:8f:75:13:92:f9:4a:a2:f5:4e:92:8b:6b:e0: 43:83:ae:c9:8b:b1:e0:78:4c:98:49:8e:ee:10:07:3d: bd:ea:74:16:b3:9b:f6:f9:56:ab:9d:37:f4:e3:e6:33: 09:3a:83:aa:61:f5:ab:b4:fd:cf:19:b4:00:41:ad:fb Fingerprint (SHA-256): 0C:3F:9B:02:81:B3:94:4E:EA:94:DB:89:E5:D9:27:FB:25:2D:D4:0A:07:64:9C:9B:3A:42:74:56:0F:0D:87:75 Fingerprint (SHA1): 8D:67:6F:0E:7A:03:D0:79:80:3C:A4:BB:A3:6B:F8:39:EC:71:5E:FC Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #296: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:80:ee:0c Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 14:15:22 2017 Not After : Sat Jul 01 14:15:22 2017 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:aa:92:6f:cb:92:f0:9f:af:d0:22:32:e6:b1:f6:10: 09:13:a7:51:7f:b6:2b:45:fa:fb:ea:28:6c:08:51:68: e0:77:32:84:e3:e7:0d:a5:d9:50:31:7b:4a:29:40:c2: bd:83:15:e9:74:86:8b:bd:ed:12:9c:88:12:af:b7:2f: d1:b9:39:e3:d0:22:ed:75:a9:2b:4b:2c:b3:33:ec:b3: 46:39:ce:b8:5a:e0:b3:cb:d6:66:7c:29:ec:6b:ce:6f: a8:8e:98:fc:77:09:29:b5:a2:d1:13:b0:54:09:95:93: ab:43:16:e4:36:b6:ed:55:cc:f7:f3:6a:bc:2f:fa:10: 5a:18:1b:3e:74:70:fb:93:ec:95:e3:41:fe:49:50:30: 8d:5c:ac:28:34:7b:e5:c7:42:ae:92:a9:a7:20:3f:3d: b0:76:b0:dd:4e:eb:e1:48:0d:98:b9:e0:ce:74:3e:f4: 0e:4f:b6:05:7d:ec:46:1a:1e:61:38:39:6c:da:c1:0d: d8:df:ea:72:ad:75:19:af:0d:f1:91:37:04:6f:89:48: 02:fd:90:b3:74:62:cd:96:9c:fa:d4:a4:df:ab:62:32: 84:5c:c9:3a:b8:c1:b0:bc:58:87:b4:eb:17:19:30:b9: 70:c6:2b:09:21:64:97:ff:c0:69:93:f0:e4:53:f7:07 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:fe:e8:aa:e0:f7:da:1d:74:af:50:8e:47:44:ad:73: 2f:58:65:ec:f1:50:28:f0:30:ed:bb:00:06:ec:79:05: f8:5b:7b:28:8d:c7:27:a0:80:15:0d:bf:db:5e:69:f5: aa:c0:8f:9d:e9:2e:a6:d0:31:2a:47:d6:06:8e:b0:48: ac:3a:2b:0a:29:3a:01:30:01:bf:fb:05:20:ee:36:fd: d7:5d:c6:2d:ff:d1:02:72:91:e3:c0:ae:eb:14:35:c8: 78:c7:fc:c0:21:33:cb:95:4c:d8:91:14:8f:ff:46:15: 81:a0:e2:b0:f4:f9:34:8e:05:20:07:d2:45:7d:d2:40: 51:f8:f4:08:00:e3:e3:ce:23:d0:6c:9a:69:4b:e3:fc: 0d:72:84:e3:ab:f9:92:a4:5c:16:82:e9:11:60:03:1a: 81:97:1a:d3:78:cc:d7:d1:02:4f:1f:f5:07:77:48:af: 37:5d:4e:ac:d8:df:61:e4:29:ef:9a:ba:dc:25:17:46: 14:8b:b0:11:34:b2:d5:61:55:26:32:e4:d4:aa:84:40: 34:55:32:c1:92:4a:a0:44:d5:b6:b8:d6:04:6e:2d:28: 23:2e:f3:93:b5:19:33:61:69:20:30:59:1e:4d:e0:ad: 77:bf:c0:87:45:02:c3:ae:56:d7:60:d3:1c:23:42:96 Fingerprint (SHA-256): 16:8F:7A:DD:1A:8B:A7:95:46:87:DF:E0:4C:84:D1:42:3A:3A:53:86:FE:41:D4:7A:21:58:E4:FD:AE:3F:C4:E6 Fingerprint (SHA1): 34:AA:35:88:7A:53:22:03:E7:E9:4F:F7:4C:3C:5E:13:1D:0A:1A:DF Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #297: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:80:ee:19 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 14:15:31 2017 Not After : Sat Jul 01 14:15:31 2017 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:73:2a:32:54:51:1b:25:43:44:41:62:cd:65:77:ff: e0:93:34:6a:da:ef:3d:42:4d:ab:67:63:11:6c:91:28: 82:30:87:e4:a2:6b:63:d1:32:46:d7:5c:bc:ff:1f:62: 18:6d:56:8c:c0:d1:4c:91:98:29:d0:09:5b:c6:61:de: bf:5d:e4:c1:4b:24:fc:e6:0d:02:7d:40:25:ad:44:5c: 3d:55:5d:1b:8b:d2:b8:32:55:d5:01:a6:50:a6:a5:ae: cf:5c:73:f6:6f:2c:a4:9a:7a:e7:d0:95:cc:12:ff:9f: 37:25:e9:b0:5b:d5:ea:cf:ac:29:c9:27:38:01:d0:e8: 05:d5:89:74:e0:16:22:cc:aa:06:9e:75:a0:20:b8:9d: 68:bd:e6:e7:a0:f0:f7:6a:e4:7c:2b:e7:35:78:94:0a: 13:57:73:3e:68:d1:c6:f7:95:53:06:98:bb:53:57:20: cc:d1:26:9d:45:8d:a1:d3:81:e2:e4:bf:47:6d:eb:b9: c1:7d:4e:86:22:37:62:9b:67:42:17:53:44:69:b7:c2: 90:ff:71:ff:97:f7:5f:b1:1f:7f:53:1a:56:ec:29:1a: 66:2a:e5:fa:c0:6a:5c:4a:c9:2c:7e:d3:ea:06:7f:ad: 9b:22:44:98:31:a1:0a:95:18:9f:be:6c:e3:a2:7b:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:3f:49:88:4e:ba:95:d8:4e:f8:f6:f7:76:e4:d6:cd: d1:4d:57:f0:60:80:a8:fe:22:ad:fe:a4:89:14:63:26: 39:64:e2:f9:d6:9c:68:8f:ca:38:7c:f1:59:75:23:ca: 09:34:9c:2d:e2:93:27:b6:ea:3a:ec:94:8d:e9:fd:d8: f9:d3:48:e0:ee:24:33:cd:84:b0:55:2b:2b:25:61:86: 25:ad:da:5e:a6:ce:5c:d9:d4:86:ee:bf:0a:67:d9:59: 7b:7c:77:8e:09:cb:d5:d7:e0:3b:10:23:37:48:4b:9b: c3:ec:30:40:d6:55:bc:97:19:1a:4b:47:b5:b0:cc:e0: 3f:28:59:9a:46:fa:b7:b8:4d:88:05:74:23:93:4b:80: ea:bc:b1:8d:36:93:e4:5e:92:79:c2:6a:da:71:af:cb: 64:6c:d9:d8:4c:97:81:7c:13:f5:82:07:da:c5:0f:83: e2:84:36:5b:c2:84:fa:ae:e7:e7:99:1f:d8:d6:ee:97: dd:dc:0e:9a:df:db:f3:ca:4d:23:b0:46:53:8f:25:ba: 0c:b3:b3:65:7c:5f:0f:d7:60:66:15:60:2d:23:11:ad: 30:6f:b6:2d:da:1c:8f:7a:2b:8f:5c:27:16:c1:df:c0: 79:83:0c:e4:3a:b1:f3:9a:d5:05:bc:8e:75:1d:3f:be Fingerprint (SHA-256): A7:C5:B2:40:EB:13:4F:52:20:75:D6:AD:EE:7B:90:BB:49:57:25:80:D3:92:71:1C:3D:77:AD:64:59:56:12:17 Fingerprint (SHA1): A0:BE:CA:45:F1:FF:74:4E:53:54:13:AA:32:0E:23:C0:73:D0:F7:1E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #298: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:80:ee:29 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Mar 31 14:15:43 2017 Not After : Sat Jul 01 14:15:43 2017 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:0f:0c:e1:aa:0f:37:0b:ae:31:ea:4f:d5:ee:01:33: a1:3b:21:73:99:be:25:43:74:dc:0c:f5:62:70:b1:82: f0:d2:0c:2a:99:d8:bc:d1:5e:cb:3a:ad:fa:15:b8:f6: 04:5f:67:0a:73:44:8e:b7:e7:ca:5d:f5:56:d6:27:2e: 6e:61:4b:67:93:c3:13:98:5c:18:f1:c9:a9:c9:73:ba: cc:b1:89:67:72:77:fb:b7:c6:da:b6:6a:f5:71:fc:22: d0:60:e0:30:70:28:97:31:89:1c:b8:8f:ac:8e:b0:bd: 94:e0:89:4c:42:06:12:95:91:f5:f8:37:94:80:aa:b7: 15:a1:93:43:7a:e5:e4:bb:83:90:9f:64:47:6f:60:99: 27:f0:c4:3e:c3:11:35:7b:d0:21:97:00:4e:1f:ba:4a: 70:cc:7e:19:65:f8:7b:0d:1c:09:77:c3:be:f1:49:df: 9d:3d:d0:b9:64:0d:e0:ab:a2:f4:64:90:8a:d5:27:60: 55:25:b3:38:8f:19:ca:0b:9f:0a:ca:22:98:23:73:82: 5d:c3:21:9a:c1:75:ec:8c:3e:a5:a2:4d:27:31:da:a0: 3b:5f:2b:72:25:ae:4c:c8:b5:86:d8:51:49:33:74:ce: 41:f3:7b:13:d7:93:ba:7c:f4:e7:3b:c4:f4:21:45:af Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:fb:87:65:b7:cd:be:e9:7d:4d:ce:ba:53:a6:47:2a: 8d:8f:e0:d3:9e:48:c7:8e:af:38:ee:84:79:dc:fd:19: 5b:58:36:ae:60:78:49:88:48:10:bd:19:65:0e:90:46: 48:41:f0:e5:c6:05:4f:3a:9b:a0:65:ff:8d:3c:93:e9: 0b:d9:92:40:e8:bd:db:0d:6d:bf:89:7f:3e:63:12:5e: ea:c7:f6:6e:df:ac:9d:c6:1c:28:c8:7c:9e:52:84:b8: 0d:dc:02:78:d5:33:bb:85:8a:c1:0d:c2:b5:73:14:3e: 89:4a:ce:b7:4e:19:6d:98:17:20:ed:a0:cb:0c:c7:40: ea:b3:49:19:8b:86:be:9d:8d:52:54:7a:ce:a9:be:05: e8:cd:a8:34:be:1e:06:cb:82:52:40:07:e6:36:7f:b9: e1:8c:99:67:77:19:5f:85:bd:5b:65:6b:c3:7c:06:af: 2d:b4:52:e7:f4:11:33:9a:aa:87:b4:7a:68:a4:5e:92: 01:3f:b9:49:31:2a:b3:cc:b0:56:ef:d9:9a:56:4b:62: 91:f1:7e:bb:0d:1c:74:56:ae:1b:82:1d:40:38:90:9c: 40:7b:51:56:30:dd:65:58:62:67:36:f3:3c:03:84:8a: 37:b0:35:df:4b:61:f6:72:b2:71:7d:cf:2a:bf:ab:d5 Fingerprint (SHA-256): B9:2D:53:B6:F9:FA:84:95:07:CB:B1:71:56:A9:2D:34:AF:5C:3A:6B:A1:FE:85:1B:1B:BE:C7:5B:AA:22:D4:1A Fingerprint (SHA1): 38:1B:77:1F:6D:09:33:65:EC:B5:D3:AB:C3:35:FF:E6:2B:D7:4E:86 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #299: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:80:ee:40 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Mar 31 14:15:50 2017 Not After : Sat Jul 01 14:15:50 2017 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:67:6a:3b:95:42:88:57:de:2e:a9:ce:b5:ff:1a:4a: f6:cb:6c:6d:31:f2:99:58:b3:98:30:14:38:ba:d3:61: d4:88:8f:fb:78:ca:46:67:e4:ba:9a:e2:9a:f9:63:01: 1d:b9:12:e4:da:1e:e3:16:68:d1:b7:89:b2:92:88:18: b7:55:51:60:1b:ac:01:3e:bd:50:fc:a3:00:da:60:d2: 5a:23:7e:55:84:bc:47:96:7e:77:07:20:83:74:7c:bf: 7c:8c:24:29:6f:1b:af:5d:47:d2:5e:d5:0d:61:05:af: 3b:ce:8f:17:c5:06:dd:73:25:ad:50:51:1c:b6:09:5d: 57:97:81:1f:7d:69:aa:76:24:fe:eb:17:57:ea:b6:8a: a8:9d:89:59:11:e4:86:db:ff:36:6c:c1:d2:2b:ee:c9: 0e:da:ea:ed:0d:2f:3a:18:9e:e8:6c:3c:b6:e7:cc:82: 01:0f:e3:b4:87:18:55:0e:a3:8a:a5:bc:35:7d:d9:bb: af:15:72:47:44:8f:8e:8f:a4:51:ac:13:63:ed:c1:31: f0:d8:15:f5:a5:19:1e:4d:56:0b:56:58:31:95:96:03: ac:d0:4f:9b:8d:ff:c2:af:36:1e:4f:dd:4e:c1:32:dd: 04:b1:2c:1e:ae:54:95:aa:50:81:b7:b3:5a:b4:0d:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:99:04:0c:30:a8:17:0d:95:ca:f3:dc:1b:4a:e4:f7: 14:65:5b:0c:9a:1d:d7:05:76:bf:2f:e6:00:b6:5d:de: 83:ef:b6:f5:57:c7:e5:ee:53:99:0f:c0:c6:e1:47:0e: 5d:59:2e:6a:e9:ca:6c:f6:f5:2c:7b:73:d7:e1:d6:f1: 34:f1:20:cd:cf:6d:2e:06:09:30:56:6e:51:02:0d:e6: a8:53:34:69:67:5a:fa:09:53:ea:be:23:63:6b:bd:3e: fa:2f:b2:a4:a6:f9:bc:14:b8:28:f9:d7:27:0b:61:6d: 8c:87:79:e4:02:a1:2f:11:02:57:46:c2:a4:ca:94:b3: f8:88:b7:09:4e:35:ab:7c:54:cd:0c:28:02:0d:41:5f: c6:88:a6:09:f1:8c:87:9c:40:a9:71:de:3b:a8:9b:14: 30:74:9b:42:ed:6a:71:1c:15:17:ce:fa:c6:ad:07:17: 90:18:7e:20:2c:83:1c:2e:2d:de:3a:ed:5b:7d:dd:67: c7:87:d7:12:f6:8c:8a:f0:93:91:0b:19:84:4b:cc:92: 42:ae:43:d7:20:0e:51:0a:e9:5d:19:88:28:04:c5:33: 0d:9c:74:8c:77:19:96:81:ee:92:22:13:9d:3f:b7:f4: 02:b3:42:7c:b4:02:eb:76:72:f2:16:88:64:6b:ce:76 Fingerprint (SHA-256): 69:CA:20:44:F6:97:3D:70:42:22:35:55:C8:E5:23:84:C0:1E:13:A1:30:F4:C9:64:6F:E6:5A:15:4F:CE:EB:2C Fingerprint (SHA1): 60:79:D7:3C:90:22:BB:8E:89:4F:74:AD:6A:F7:65:55:0A:F5:66:64 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #300: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #301: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #302: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #303: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:80:ee:5e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Mar 31 14:16:04 2017 Not After : Sat Jul 01 14:16:04 2017 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:2b:ac:d0:c2:2f:c4:9a:c2:28:78:82:a4:60:f3:11: 28:57:27:b3:0a:12:82:10:9f:9b:5e:c9:a2:4d:18:d1: 42:9c:49:78:8b:d6:81:23:b3:2f:66:1b:01:01:c0:2d: ad:07:40:5e:9c:89:83:ff:44:53:a3:4c:56:e0:a4:2f: 12:2a:62:4e:90:83:65:46:15:8d:15:d0:32:cf:5f:6a: db:ed:5e:55:7a:c0:5d:45:ad:bd:22:0a:6f:27:01:67: 9d:9e:af:f5:12:f5:42:2a:07:11:2b:4f:29:dd:23:f4: 74:6e:3b:34:60:87:43:2f:e2:aa:05:a0:1d:75:25:7d: dc:49:ea:c4:42:49:ec:10:59:21:7c:1e:47:e3:6d:b6: e4:09:37:b3:8d:dd:0e:c7:5d:f2:69:04:90:12:42:c1: 7e:e2:91:54:9f:03:e4:40:da:16:54:52:ca:ed:41:2b: 72:0a:3a:6d:79:7e:ea:91:c3:43:e3:fe:e5:97:ea:b7: 9d:3f:17:65:21:ac:d3:99:9a:f8:b1:aa:7d:42:aa:1e: 35:dd:3a:c4:c5:10:50:a5:a6:b9:e6:44:ef:90:bb:a6: 87:9f:7c:23:dd:8d:9a:46:30:0a:6f:4c:8c:48:57:d0: c5:95:78:26:4a:16:1e:ed:ba:ed:23:76:b9:e4:3b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:f8:a1:9e:62:da:33:0a:a1:d7:32:52:c5:c1:b8:e5: 6f:25:d0:13:2a:42:f5:97:1f:1d:66:da:ea:5d:39:94: ea:e8:d2:8a:07:58:2f:a6:01:0b:45:a9:fa:79:f0:b9: 1c:58:f2:f0:df:aa:08:37:36:73:da:50:77:ee:99:26: 3d:22:4c:db:cf:2f:86:7f:45:81:0b:8a:47:d5:b4:37: 0d:17:39:1e:c9:f2:00:29:ac:e6:bb:2a:1f:e3:d6:e9: 3c:1c:16:c1:84:6d:61:8e:92:8f:b2:ae:eb:f1:49:0d: ad:a7:ba:85:c7:43:b0:a5:38:bf:35:c0:fb:f7:eb:ab: a6:e2:24:ad:e3:36:4f:6d:3a:db:a2:3a:08:56:6e:85: 85:f3:f0:88:69:88:e8:5a:cc:87:08:8f:e7:ba:8f:d0: 4e:91:13:de:aa:c8:75:d9:45:f7:e2:9a:ed:78:50:a6: 69:a1:38:82:31:05:d7:d2:c0:d6:56:6c:e9:66:03:2b: 22:97:e7:65:81:c2:57:fb:82:29:05:6e:bc:d7:ec:4e: f2:d2:10:3d:76:b1:ce:69:57:6c:ab:e5:16:ae:8e:37: ac:6d:31:a5:6e:24:12:9e:f3:34:46:b4:cd:6d:4a:83: e2:f3:9f:c4:ad:8b:36:2e:42:5e:4e:42:3b:5e:11:41 Fingerprint (SHA-256): EE:C7:F2:E0:54:12:A8:3B:23:1D:5C:57:5B:6B:3B:66:37:02:E3:6F:D9:95:B9:24:77:46:D3:00:82:84:F3:73 Fingerprint (SHA1): 11:54:07:C2:19:A4:A9:A1:A3:E2:A2:4E:52:4D:D4:90:D3:F7:EE:AD Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #304: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/sanext.der cert.sh: #305: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #306: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #307: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #308: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #309: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #310: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #311: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:80:ee:a6 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Mar 31 14:16:44 2017 Not After : Sat Jul 01 14:16:44 2017 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:56:ae:fd:c0:80:89:e4:a9:3c:3e:0a:80:cd:9d:17: 45:dc:a0:4e:85:b4:8b:ba:d9:1d:54:90:58:b7:8f:e5: 5f:fe:7c:05:b4:ef:bf:e2:e4:2c:72:15:90:77:7c:b2: 81:55:15:c8:96:8a:7a:ae:1e:33:8a:d5:49:4b:4d:cb: d3:45:29:18:20:b9:e0:68:dc:b9:93:bb:42:fb:3f:10: 07:ca:29:59:a1:67:4b:0f:db:f8:77:e2:a2:84:9c:c7: ca:dd:85:fb:bd:9c:98:39:48:09:81:61:d0:d2:a4:78: 68:c9:60:33:6b:a8:3e:ba:2f:6e:c5:37:be:f5:60:14: 91:95:d0:cc:c5:b1:0e:7d:bd:74:c7:44:72:3e:f9:cb: 0e:9b:9e:31:37:96:a4:db:eb:ef:47:bf:d2:01:d4:04: 8e:51:04:7c:20:7b:b0:e5:17:90:79:2d:bc:32:27:d1: 7c:0f:79:dd:2a:7f:5c:29:87:b7:48:8b:c0:cc:d9:e4: e7:79:43:0a:fc:b0:ee:9e:c0:a2:d3:9e:e7:4f:b4:60: a3:3a:b6:57:d3:94:d5:a2:40:46:a2:6c:7e:aa:a3:04: 5a:a8:f9:c2:9f:7f:77:e5:f1:4c:5b:e3:56:4a:08:5b: dc:a9:c6:42:56:aa:a3:b4:56:5d:54:fa:ec:8f:0f:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:31:63:fa:90:05:fc:22:ec:fa:62:0e:a3:b6:d1:87: 14:35:aa:3a:6e:fa:79:63:b4:63:8d:01:e3:63:82:6a: d1:f3:73:cb:2b:88:50:e9:ef:f3:6f:b1:ca:06:8f:38: bd:94:59:0c:b1:2c:bb:74:b4:38:d8:f4:f7:17:7c:a3: ad:7d:97:40:7b:83:88:ce:e4:76:35:3e:7a:d7:54:5a: 74:52:ed:67:5c:8e:70:4a:22:91:5a:be:8a:20:ce:6f: d5:76:cf:d8:94:ac:c1:46:ab:92:9c:0a:8f:5a:63:31: c3:cc:7b:0f:3f:3b:e8:e0:75:da:e6:74:db:91:b3:09: 88:03:a6:87:c0:a2:17:f2:5e:a3:c9:ce:0a:75:71:00: 85:1f:17:fe:81:96:fc:f1:82:d1:45:27:8a:f7:ea:fe: 59:d0:16:ed:4c:01:ad:5e:c2:38:de:1c:22:e4:fc:e4: be:b7:04:24:ea:a7:6c:57:8b:08:e7:2d:67:53:b6:cd: 83:d5:e4:2a:7c:60:14:25:a3:6f:e6:78:c5:dd:b9:8a: 30:99:63:1c:7d:eb:e0:25:39:4d:d9:60:25:51:42:20: 6c:52:45:f9:9f:72:bb:46:99:ed:f1:21:12:0c:6d:af: c8:aa:81:b8:b9:e3:55:35:b3:ca:a1:5e:7a:4e:76:1c Fingerprint (SHA-256): 34:82:E5:0D:46:ED:06:08:5D:EB:3F:45:E0:19:4C:93:67:1C:B8:04:5F:C3:3D:FD:8F:42:82:02:EE:34:3F:8A Fingerprint (SHA1): FC:ED:C8:54:FB:FD:F2:A6:90:E7:50:0B:FD:0A:8E:5D:1E:6C:55:76 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #312: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #313: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #314: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dbpass -f ../tests.pw cert.sh: #315: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #316: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #317: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dbpass -o root.cert cert.sh: #318: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #319: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #320: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #321: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #322: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #323: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -i ../CA/TestCA.ca.cert cert.sh: #324: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #325: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #326: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #327: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #328: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #329: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #330: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #331: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #332: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #333: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #334: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #335: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #336: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #337: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #338: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #339: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #340: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #341: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #342: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #343: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA -o root.cert cert.sh: #344: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #345: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #346: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #347: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #348: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #349: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #350: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #351: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #352: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #353: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #354: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #355: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #356: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #357: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #358: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #359: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #360: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #361: perform selftest - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #362: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #363: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #364: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #365: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #366: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #367: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #369: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #372: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #375: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #378: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #381: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #383: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #384: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #386: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #387: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #388: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #389: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #390: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #391: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #392: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #393: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #394: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #395: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #396: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #397: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #398: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #399: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #400: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #401: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #402: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #403: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #404: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #405: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #406: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #407: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #408: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #409: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #410: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #411: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #412: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #413: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #414: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #415: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #416: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #417: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #418: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #419: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #420: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #421: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #422: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #423: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #424: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #426: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #427: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #428: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #429: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #430: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #431: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #432: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #433: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #434: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #435: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #436: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #437: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #438: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #439: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #440: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #441: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #442: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #443: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #444: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #445: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #446: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #447: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #448: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #449: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #450: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #451: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #453: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #454: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #455: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #456: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #457: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #458: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #459: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #460: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #461: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #462: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #463: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #464: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #465: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #466: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #467: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #468: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #469: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #470: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #471: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #472: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #473: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #474: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #475: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #476: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #477: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #478: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #479: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #480: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #481: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #482: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #483: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #484: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #485: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #486: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #487: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #488: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #489: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #490: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #491: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #492: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #493: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #494: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #495: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #496: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #497: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #498: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #499: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #500: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #501: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #502: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #503: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #504: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #505: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #506: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #507: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #508: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #509: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #510: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #511: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #512: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #513: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #514: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #515: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #516: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #517: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #518: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #519: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #520: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #521: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #522: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #523: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #524: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #525: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #526: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #527: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #528: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #529: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #530: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #531: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #532: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #533: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #534: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #535: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #536: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #537: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #538: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #539: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #540: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #541: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #542: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #543: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #544: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #545: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #546: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #547: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #548: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #549: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #550: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #551: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #552: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #553: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #554: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #555: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #556: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #557: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #558: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #559: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #560: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #561: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #562: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #563: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #564: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #565: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #566: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #567: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #568: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #569: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #570: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #571: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #572: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #573: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Fri Mar 31 14:22:26 UTC 2017 Running tests for dbtests TIMESTAMP dbtests BEGIN: Fri Mar 31 14:22:26 UTC 2017 dbtests.sh: CERT and Key DB Tests =============================== --------------------------------------------------------------- | test opening the database read/write in a nonexisting directory --------------------------------------------------------------- certutil: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #574: Certutil didn't work in a nonexisting dir 255 - PASSED dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #575: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED --------------------------------------------------------------- | test force opening the database in a nonexisting directory --------------------------------------------------------------- dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtests.sh: #576: Dbtest force succeeded in a nonexisting dir 0 - PASSED --------------------------------------------------------------- | test opening the database readonly in an empty directory --------------------------------------------------------------- tstclnt: unable to open cert database: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #577: Tstclnt didn't work in an empty dir 1 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/emptydir database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #578: Dbtest readonly didn't work in an empty dir 46 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/emptydir dbtests.sh: #579: Dbtest logout after empty DB Init has key - PASSED dbdir selected is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/emptydir dbtests.sh: #580: Dbtest password DB Init maintains needlogin state - PASSED certutil: could not find certificate named "xxxx": SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #581: Certutil didn't work in an empty dir 255 - PASSED --------------------------------------------------------------- | test force opening the database readonly in a empty directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/emptydir database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtests.sh: #582: Dbtest force readonly succeeded in an empty dir 0 - PASSED --------------------------------------------------------------- | test opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/secmod.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/cert8.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/key3.db" is not writeable. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #583: Dbtest r/w didn't work in an readonly dir 46 - PASSED certutil: could not find certificate named "TestUser": SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #584: Certutil didn't work in an readonly dir 255 - PASSED --------------------------------------------------------------- | test opening the database ronly in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/secmod.db database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/cert8.db database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/key3.db dbtests.sh: #585: Dbtest readonly succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | test force opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/secmod.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/cert8.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/key3.db" is not writeable. dbtests.sh: #586: Dbtest force succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | ls -l /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir --------------------------------------------------------------- dr-xr-xr-x. 2 mockbuild mockbuild 4096 Mar 31 14:22 /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir -r--r-----. 1 mockbuild mockbuild 1221 Mar 31 14:22 /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/TestUser-dsa.cert -r--r-----. 1 mockbuild mockbuild 1425 Mar 31 14:22 /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/TestUser-dsamixed.cert -r--r-----. 1 mockbuild mockbuild 579 Mar 31 14:22 /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/TestUser-ec.cert -r--r-----. 1 mockbuild mockbuild 705 Mar 31 14:22 /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/TestUser-ecmixed.cert -r--r-----. 1 mockbuild mockbuild 870 Mar 31 14:22 /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/TestUser.cert -r--------. 1 mockbuild mockbuild 229376 Mar 31 14:22 /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/cert8.db -r--------. 1 mockbuild mockbuild 110592 Mar 31 14:22 /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/key3.db -r--r-----. 1 mockbuild mockbuild 394 Mar 31 14:22 /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/req -r--------. 1 mockbuild mockbuild 16384 Mar 31 14:22 /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ronlydir/secmod.db --------------------------------------------------------------- | test creating a new cert with a conflicting nickname --------------------------------------------------------------- /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/conflictdir certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database. dbtests.sh: #587: Nicknane conflict test, could not import conflict nickname 255 - PASSED --------------------------------------------------------------- | test importing an old cert to a conflicting nickname --------------------------------------------------------------- Certificate: Data: Version: 3 (0x2) Serial Number: 40 (0x28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:12:22 2017 Not After : Thu Mar 31 14:12:22 2022 Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:11:bf:3a:02:6c:ce:27:7d:a1:6b:c0:5a:cd:5d:81: 4d:fa:f5:80:a0:2d:2a:48:c3:7a:5d:5a:2b:a5:1f:89: 4e:02:16:89:62:06:d1:ea:9c:65:10:9a:42:04:e8:92: 03:7b:5a:4d:34:70:c0:d3:9c:d7:3a:4f:17:e1:50:4b: 33:8d:a3:53:1d:90:f1:d4:da:38:6a:e2:ae:93:e3:dd: 25:2a:61:a3:d1:fc:e3:87:73:9b:fc:e6:98:df:58:c2: f9:15:6c:e3:55:f4:e8:0e:ca:f6:34:44:e1:15:aa:d6: 79:5f:2f:21:aa:98:e7:f5:24:f0:6d:2d:7d:a3:be:12: e6:7f:3b:53:88:31:f8:18:37:24:9c:18:02:9b:f5:8c: 5d:a1:b5:9b:08:26:20:4d:b9:b8:84:11:24:51:56:40: 1e:73:5d:18:4b:6d:1d:35:63:ed:52:91:13:5a:b9:87: ff:5f:d6:6c:78:05:a9:38:f9:f7:a4:aa:78:be:70:75: 74:20:5a:07:54:69:62:67:7d:a3:91:fc:f5:cb:13:ef: 17:94:1a:2d:b8:05:02:fe:05:71:db:0e:c4:67:1b:c6: 6e:25:cd:a6:2e:f3:fc:d7:bf:85:c0:8d:8c:71:b6:19: 07:fe:f7:99:8b:8c:e7:8c:3a:ad:18:91:9b:c1:9c:c7 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6c:14:2b:88:56:63:b1:85:71:2c:8a:f3:61:71:88:6a: a6:74:49:9a:49:44:93:31:2a:af:67:e2:1a:b6:93:39: 7c:98:33:8a:71:0c:82:29:fa:1e:e4:50:8f:08:2f:84: ee:ac:08:dd:f7:e2:e9:f1:c0:a8:58:a2:1a:e1:97:6b: fc:ca:fb:68:19:9a:0a:09:70:48:fa:c9:5f:34:b9:be: d4:12:55:08:0c:0e:fd:62:38:36:46:22:d9:43:0a:f8: 02:6b:44:68:f0:27:a2:74:63:a3:6e:b3:68:ef:7f:76: 29:25:84:05:2f:81:4c:c9:41:c7:97:fa:4b:b0:88:a8: 74:a4:0b:38:72:da:eb:f9:b4:11:91:35:83:15:ae:d5: f4:fb:b5:fa:12:2f:11:e3:b3:b3:a1:e5:e9:6e:07:a2: fa:82:e3:b3:ed:54:fc:f7:8a:1e:9c:0d:59:22:32:b8: 91:53:30:fd:5b:60:30:85:f3:c4:ec:4c:d6:7c:c5:fe: 5a:bd:2a:68:ae:52:25:90:4e:05:cd:7b:9e:6c:e6:dc: 1b:b4:2c:ce:2b:fc:a7:ac:86:0f:87:ff:7b:8e:2c:15: 89:5b:98:5a:52:08:b6:e5:e2:ba:51:2f:49:95:8b:86: 3d:90:3e:89:a4:09:70:19:de:63:3f:75:40:ff:b9:5c Fingerprint (SHA-256): 98:63:9B:9D:F8:1F:A8:4B:86:43:F7:2F:52:95:97:E5:34:4E:54:B0:55:72:5F:68:0A:4D:18:B4:7D:CE:5C:B8 Fingerprint (SHA1): 15:9B:21:D7:DC:5C:EA:00:50:5B:9A:07:3B:E9:94:8C:2A:5F:7B:A2 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: dbtests.sh: #588: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED TIMESTAMP dbtests END: Fri Mar 31 14:22:36 UTC 2017 Running tests for tools TIMESTAMP tools BEGIN: Fri Mar 31 14:22:36 UTC 2017 tools.sh: Tools Tests with ECC =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 43:50:75:2f:6e:52:66:c6:92:fc:a5:98:51:1e:7a:f6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #590: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #591: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #592: Exporting Alice's email EC cert & key (pk12util -o) - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #593: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cf:52:4a:07:a2:52:84:8c:d1:3b:f0:ef:a7:cb:97:2c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Mar 31 14:09:43 2017 Not After : Thu Mar 31 14:09:43 2067 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:9a:10:09:f5:9f:6e:c1:cd:d2:59:f9:55:94:05: a8:cd:40:85:b4:30:5b:df:85:18:f5:7e:70:54:83:84: 04:91:d8:fd:0e:0f:62:65:ec:32:b7:52:b6:2b:7f:2d: e9:68:2f:fc:4a:5b:09:30:8b:47:69:f8:13:a4:c4:f6: 0d:22:3a:01:ac:82:a4:a6:ce:95:75:fb:30:44:1e:44: 5d:17:51:7a:2c:e6:b0:86:5f:3d:e3:80:b3:a9:48:34: 3b:63:0d:cf:0c:75:dc:d8:32:b1:a8:77:a2:b8:3f:03: be:eb:4a:09:a9:84:eb:b6:09:09:19:da:a3:0d:19:70: 94:c8:17:ee:f6 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:87:02:42:01:08:9d:fc:1b:89:98:ad:f6:fc:81: 00:06:ca:5e:8a:34:67:92:1e:8a:c0:36:15:0b:eb:ac: cc:f2:8d:da:93:5e:c6:86:c1:6d:66:cd:fc:b3:7b:56: 90:4a:c3:b8:cd:54:18:37:87:40:ca:7b:4f:e9:aa:4f: b5:d9:c3:c0:42:17:4f:02:41:12:4a:73:4d:1b:10:e6: e0:d4:11:f2:c6:6b:1d:cb:73:c6:34:62:29:d0:13:3d: e8:76:8b:36:e6:bf:1b:8a:f2:22:e3:30:e1:53:22:c0: 9f:e8:31:76:c1:96:16:8c:08:2b:80:68:77:46:5c:e9: ca:b0:8b:22:cd:c9:88:bb:60:38 Fingerprint (SHA-256): A0:6C:3D:C3:6C:74:00:D9:C7:A7:5B:6B:94:7E:A8:CE:65:71:4E:06:04:54:27:9D:B9:93:09:38:DC:78:BF:3E Fingerprint (SHA1): 77:55:A4:22:04:5D:A6:FA:1E:9E:29:F2:B2:C3:AE:1F:A3:D7:8D:8E Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Mar 31 14:12:04 2017 Not After : Thu Mar 31 14:12:04 2022 Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:ab:58:63:55:db:6b:d2:fe:f7:c4:61:4f:b2:47:65: 6d:b8:48:9e:6c:ff:6e:29:e9:8b:02:8c:9a:bc:77:45: 0e:bc:da:bc:b3:04:1f:27:e4:5d:d8:68:dd:6e:01:6d: ba:64:97:02:4f:25:f2:c6:b0:0a:ca:07:70:90:4b:99: 42:1b:78:39:6c:4d:20:c0:c5:f2:3e:e0:fc:a1:6a:55: 65:b2:07:4e:1b:95:db:ee:54:f0:3f:da:3e:16:42:5a: dc Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:87:02:42:00:9b:d3:10:29:41:48:4b:b7:69:01: 60:c7:9a:f7:80:00:cc:8c:da:a6:b4:b7:ae:53:9b:b1: eb:ff:bc:ee:e2:55:72:71:9e:15:de:07:9f:9a:07:af: fb:37:84:34:f8:ee:2e:e3:33:24:61:6d:63:af:c0:7c: 52:dd:bf:95:80:42:b8:02:41:41:94:d8:39:6f:60:60: 66:c4:20:0a:58:2f:75:76:d3:57:eb:1f:f9:77:9c:d9: 89:8c:e4:b6:71:04:9c:8a:69:af:b9:f9:07:86:c4:ce: d4:cc:a3:a2:40:59:98:b4:41:13:d9:b9:c5:9c:3f:5f: 42:4b:22:22:1c:42:09:69:f0:50 Fingerprint (SHA-256): F0:9F:D5:09:D2:CF:B1:07:8C:70:8B:7F:E9:19:09:AF:09:0B:97:46:D4:4E:35:89:0A:26:1E:DD:DE:D9:97:C8 Fingerprint (SHA1): 9D:CD:A7:A4:F0:12:56:F5:77:6A:0B:A6:F4:B4:5A:5F:C9:DC:48:8F Friendly Name: Alice-ec tools.sh: #594: Listing Alice's pk12 EC file (pk12util -l) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #595: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 71:8e:84:16:c3:b0:6d:01:50:d0:d0:4a:29:e7:ba:21 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #596: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #597: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #598: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: c1:09:d8:33:1f:a6:59:c0:87:cf:54:e9:af:18:9c:a9 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: ae:9b:86:84:bd:cb:cc:c6:71:95:23:ef:76:17:e1:c7 Iteration Count: 2000 (0x7d0) tools.sh: #602: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #603: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #604: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9f:d2:27:57:87:fb:4a:6c:73:4e:62:0d:25:a3:09:b6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #605: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #606: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #607: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 11:f2:07:38:6d:68:7f:3d:7d:71:4f:13:f9:12:db:23 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #608: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #609: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #610: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4f:cf:d7:9b:a1:71:c2:dd:bd:51:00:ba:ab:69:37:d4 Iteration Count: 2000 (0x7d0) tools.sh: #611: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8c:49:a1:ac:9d:72:cd:86:ac:9a:0b:b0:83:07:3e:a8 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:61:11:49:2f:34:ee:ee:37:b9:fe:e4:0c:c7:77: e9:2e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #614: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #615: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #616: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cf:e9:6c:4f:22:98:b4:4e:07:76:6f:16:b6:ff:2f:d8 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:a3:b6:97:1e:43:4d:b9:89:2e:31:23:07:d2:ff: 12:db Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #617: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #618: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #619: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 67:99:de:31:42:1e:f6:cb:8f:39:97:bf:8c:e2:24:fe Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:0e:7e:4a:46:a7:53:c4:1f:b5:e2:2c:aa:e5:89: 1d:07 tools.sh: #620: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #621: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #622: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 26:7d:a9:20:3f:5c:07:df:8e:b3:df:72:44:ac:80:78 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:78:2c:30:02:16:33:f6:34:f2:25:cf:3c:7b:ea: c5:c8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #623: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8e:15:23:16:af:f8:4d:16:b6:44:dd:09:5e:2a:9c:35 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:b8:7b:72:d2:bc:95:8e:85:86:11:c9:c0:69:56: 23:97 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #626: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #627: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #628: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: bf:16:5a:b8:c4:e7:c8:e3:0d:f5:f6:53:df:9e:b8:ac Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:ee:7d:e4:0c:5d:e1:2f:e3:fb:ad:85:1e:66:3d: 3c:b6 tools.sh: #629: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #630: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #631: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 12:df:19:99:c6:7a:9d:5d:bd:8c:89:f7:04:3d:3a:c6 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:94:c1:1c:ce:e0:72:a6:a3:fe:7c:db:3d:4d:b8: e3:7d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #632: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #633: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #634: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 94:61:81:47:90:ec:c3:06:16:7c:46:5b:4d:8e:41:eb Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:68:32:61:f7:b9:eb:f4:37:a2:b6:c4:a0:3f:9a: 7e:99 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 69:56:bc:c6:c7:7f:ba:07:94:c2:93:22:ad:02:ba:c3 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:7d:90:70:ba:92:50:f8:1e:5d:98:54:00:db:41: e2:27 tools.sh: #638: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #639: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #640: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f1:f1:ca:74:e5:2e:34:e1:f8:bd:54:b6:b4:aa:60:80 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:86:7d:0a:c8:31:d0:08:ab:58:1d:4f:81:15:6b: 61:fc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #641: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #642: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #643: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 79:ed:83:3b:77:95:15:f7:5e:7d:93:de:35:32:0c:8f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:fc:fd:63:dc:35:1b:d2:70:dd:3e:04:32:b9:90: 44:60 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #644: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #645: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #646: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 32:dc:e7:c3:d1:ed:8d:36:f6:f4:ae:7c:34:31:74:35 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:a6:e4:0f:96:0a:0f:f6:f5:ba:b9:2b:9c:03:c9: a3:14 tools.sh: #647: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 52:72:39:c4:ab:f6:2d:e1:0d:33:12:82:3b:d4:c8:0d Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:1f:2a:63:8a:90:8e:92:f0:a3:a6:7b:17:a4:f0: a3:0d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #650: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #651: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #652: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 04:16:5b:d0:fd:2e:33:9b:d4:23:93:d2:28:76:b8:dd Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:b9:d0:33:a4:a7:bf:6c:f0:41:a0:e7:47:ce:26: f6:94 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #653: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #654: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #655: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d2:f2:7b:9b:f5:90:0f:46:5c:78:3d:53:8c:18:17:6f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:a6:1d:3c:0d:e6:77:e6:da:9a:80:89:57:7f:ef: e1:11 tools.sh: #656: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #657: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #658: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5a:af:87:ea:48:ed:34:e5:f2:32:f3:be:79:d3:5e:82 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:62:8f:30:22:e2:4e:4c:0d:58:ea:53:37:be:a3: 45:14 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 17:de:e7:74:62:4b:94:96:01:c7:c1:1b:c7:60:44:3b Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:5d:9a:09:ac:e7:1c:30:82:e0:a0:b1:50:95:b7: 5d:b3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #662: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #663: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #664: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cb:ba:df:89:98:fe:31:4f:40:a7:d4:84:96:bc:a9:9b Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:ab:8b:cd:7f:8c:c9:b8:36:ae:32:45:17:00:fc: d2:3b tools.sh: #665: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #666: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #667: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 14:ef:04:b4:0f:7e:7a:45:14:a7:cc:e7:94:b5:ff:68 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #668: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #669: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #670: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 74:1a:7c:7c:b6:bb:0f:04:01:b7:4a:14:5f:c6:78:3c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 79:8f:da:39:23:ce:62:b1:6c:aa:64:44:ac:94:1b:96 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #674: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #675: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #676: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 2d:31:c7:ca:b4:70:f1:ef:e5:48:23:98:4d:5a:86:b3 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #677: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #678: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #679: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: fe:da:3b:d5:6e:55:70:11:6b:ad:b9:3c:2c:43:4d:ca Iteration Count: 2000 (0x7d0) tools.sh: #680: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #681: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #682: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: e1:01:4c:03:44:ea:9b:5d:3c:d9:82:13:0e:8e:f6:9a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 4c:8f:ad:74:7e:fc:c4:47:88:cf:da:af:cf:bc:36:38 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #686: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #687: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #688: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: b5:a6:59:12:32:83:e5:9a:07:f3:87:79:95:85:25:e6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #689: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #690: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #691: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 45:67:48:4a:8c:47:37:ee:85:6c:bc:e5:dd:e7:83:76 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #692: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #693: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #694: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: c8:37:1b:30:b8:66:75:4c:65:3c:99:d9:cf:48:b7:9c Iteration Count: 2000 (0x7d0) tools.sh: #695: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 40:8a:2d:8c:0d:ce:54:fc:a1:61:5a:33:3a:a9:06:c6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #698: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #699: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #700: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 5b:c6:4c:3b:aa:66:65:4f:4e:57:07:8e:51:eb:54:c0 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #701: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #702: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #703: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 21:d2:92:05:e3:71:d7:cf:45:dc:72:47:be:bb:10:05 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #704: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #705: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #706: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 63:3a:3f:23:12:5a:4a:0e:a0:4a:4a:87:ea:c8:7d:c1 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: cb:2e:35:54:0e:9b:e9:a2:fc:40:24:4b:fe:06:d7:64 Iteration Count: 2000 (0x7d0) tools.sh: #710: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #711: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #712: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7a:5c:ba:fb:3f:be:e8:38:79:43:2f:ac:ab:3d:9d:84 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #713: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #714: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #715: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 87:35:91:50:f7:18:b4:df:19:e8:3a:d8:bb:60:80:ac Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #716: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #717: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #718: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5a:8a:17:3d:47:52:21:6d:83:a9:ff:7b:b2:d1:84:c2 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 68:0b:a3:12:43:7b:76:31:7f:db:c6:d8:43:49:81:33 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #722: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #723: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #724: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 51:e4:1e:34:54:92:28:89:52:7a:d7:b5:60:36:52:1a Iteration Count: 2000 (0x7d0) tools.sh: #725: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #726: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #727: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 92:2e:82:47:25:5d:5d:ce:08:f5:ad:82:13:df:4d:8e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #728: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #729: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #730: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d0:ef:25:94:0f:ab:3d:da:fd:40:15:96:10:88:18:4e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #731: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #732: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #733: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 76:c4:5a:84:69:ce:27:28:75:08:f0:d5:b2:20:59:ac Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #734: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #735: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #736: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8d:c6:78:16:f6:d1:7c:e5:19:fc:38:10:45:a9:2b:7a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #737: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #738: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #739: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 35:10:3a:99:ca:f1:ad:bf:a7:64:68:92:77:78:48:6b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #740: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #741: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #742: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b7:9e:10:6c:f2:0d:c2:7b:b5:ff:9b:1e:6d:2c:54:cb Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #743: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #744: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #745: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 01:a0:bb:34:82:40:3d:e5:10:ad:46:d7:2f:9d:a0:6e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #746: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #747: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #748: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7b:6a:16:5d:e9:32:d8:91:2b:26:98:12:fd:dd:e6:a8 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #749: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #750: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #751: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ff:9f:07:b9:65:d7:fa:86:0c:4c:20:0c:d3:11:32:85 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #752: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #753: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #754: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b1:ef:54:77:c1:92:a8:93:b7:a4:ef:61:28:0b:cd:87 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #755: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #756: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #757: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #758: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #759: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #760: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #761: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #762: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #763: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #764: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #765: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Fri Mar 31 14:24:16 UTC 2017 Running tests for fips TIMESTAMP fips BEGIN: Fri Mar 31 14:24:16 UTC 2017 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #766: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #767: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 69a3c48fc41c02203a55b054f6b109ba4289abf1 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #768: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #769: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #770: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #771: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #772: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #773: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #774: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #775: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #776: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #777: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #778: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 69a3c48fc41c02203a55b054f6b109ba4289abf1 FIPS_PUB_140_Test_Certificate fips.sh: #779: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #780: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #781: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #782: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #783: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 69a3c48fc41c02203a55b054f6b109ba4289abf1 FIPS_PUB_140_Test_Certificate fips.sh: #784: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #785: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #786: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest1.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle Changing byte 0x00033964 (211300): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/fips/mangle dbtest -r -d ../fips fips.sh: #787: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Fri Mar 31 14:25:20 UTC 2017 Running tests for sdr TIMESTAMP sdr BEGIN: Fri Mar 31 14:25:20 UTC 2017 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests.v1.2460 -t "Test1" sdr.sh: #788: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests.v2.2460 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #789: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests.v3.2460 -t "1234567" sdr.sh: #790: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests.v1.2460 -t "Test1" sdr.sh: #791: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests.v2.2460 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #792: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests.v3.2460 -t "1234567" sdr.sh: #793: Decrypt - Value 3 - PASSED TIMESTAMP sdr END: Fri Mar 31 14:25:23 UTC 2017 Running tests for crmf TIMESTAMP crmf BEGIN: Fri Mar 31 14:25:23 UTC 2017 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #794: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #795: CMMF test . - PASSED TIMESTAMP crmf END: Fri Mar 31 14:25:25 UTC 2017 Running tests for smime TIMESTAMP smime BEGIN: Fri Mar 31 14:25:25 UTC 2017 smime.sh: S/MIME Tests with ECC =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #796: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #797: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #798: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #799: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #800: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #801: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #802: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #803: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1 smime.sh: #804: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED diff alice.txt alice-ec.data.SHA1 smime.sh: #805: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #806: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #807: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #808: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #809: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #810: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #811: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #812: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #813: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256 smime.sh: #814: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED diff alice.txt alice-ec.data.SHA256 smime.sh: #815: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #816: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #817: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #818: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #819: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #820: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #821: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #822: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #823: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384 smime.sh: #824: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED diff alice.txt alice-ec.data.SHA384 smime.sh: #825: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #826: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #827: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #828: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #829: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #830: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #831: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #832: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #833: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512 smime.sh: #834: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED diff alice.txt alice-ec.data.SHA512 smime.sh: #835: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #836: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #837: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #838: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #839: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #840: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #841: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #842: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #843: Decrypt with a Multiple Email cert . - PASSED smime.sh: #844: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #845: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #846: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #847: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #848: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #849: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #850: Decode Encrypted-Data . - PASSED smime.sh: #851: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #852: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #853: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #854: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #855: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #856: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Fri Mar 31 14:25:56 UTC 2017 Running tests for ssl TIMESTAMP ssl BEGIN: Fri Mar 31 14:25:56 UTC 2017 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:25:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:25:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:26:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #857: Server never started - PASSED kill -0 13588 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13588 found at Fri Mar 31 14:26:02 UTC 2017 selfserv_9626 with PID 13588 started at Fri Mar 31 14:26:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #858: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 13588 at Fri Mar 31 14:26:03 UTC 2017 kill -USR1 13588 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13588 killed at Fri Mar 31 14:26:03 UTC 2017 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:26:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:26:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:26:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #859: Server never started - PASSED kill -0 13671 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13671 found at Fri Mar 31 14:26:09 UTC 2017 selfserv_9626 with PID 13671 started at Fri Mar 31 14:26:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #860: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 13671 at Fri Mar 31 14:26:10 UTC 2017 kill -USR1 13671 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13671 killed at Fri Mar 31 14:26:10 UTC 2017 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:26:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:26:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:26:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #861: Server never started - PASSED kill -0 13740 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13740 found at Fri Mar 31 14:26:16 UTC 2017 selfserv_9626 with PID 13740 started at Fri Mar 31 14:26:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #862: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 13740 at Fri Mar 31 14:26:17 UTC 2017 kill -USR1 13740 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13740 killed at Fri Mar 31 14:26:17 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:26:17 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:26:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:26:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #863: Server never started - PASSED kill -0 13820 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13820 found at Fri Mar 31 14:26:23 UTC 2017 selfserv_9626 with PID 13820 started at Fri Mar 31 14:26:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #864: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 13820 at Fri Mar 31 14:26:24 UTC 2017 kill -USR1 13820 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13820 killed at Fri Mar 31 14:26:24 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:26:24 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:26:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:26:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #865: Server never started - PASSED kill -0 13888 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13888 found at Fri Mar 31 14:26:30 UTC 2017 selfserv_9626 with PID 13888 started at Fri Mar 31 14:26:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #866: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 13888 at Fri Mar 31 14:26:31 UTC 2017 kill -USR1 13888 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13888 killed at Fri Mar 31 14:26:31 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:26:31 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:26:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:26:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #867: Server never started - PASSED kill -0 13960 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13960 found at Fri Mar 31 14:26:37 UTC 2017 selfserv_9626 with PID 13960 started at Fri Mar 31 14:26:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #868: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 13960 at Fri Mar 31 14:26:38 UTC 2017 kill -USR1 13960 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13960 killed at Fri Mar 31 14:26:38 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:26:39 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:26:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:26:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #869: Server never started - PASSED kill -0 14040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14040 found at Fri Mar 31 14:26:45 UTC 2017 selfserv_9626 with PID 14040 started at Fri Mar 31 14:26:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #870: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 14040 at Fri Mar 31 14:26:45 UTC 2017 kill -USR1 14040 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14040 killed at Fri Mar 31 14:26:46 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:26:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:26:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:26:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #871: Server never started - PASSED kill -0 14108 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14108 found at Fri Mar 31 14:26:52 UTC 2017 selfserv_9626 with PID 14108 started at Fri Mar 31 14:26:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #872: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 14108 at Fri Mar 31 14:26:52 UTC 2017 kill -USR1 14108 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14108 killed at Fri Mar 31 14:26:53 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:26:53 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:26:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:26:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #873: Server never started - PASSED kill -0 14177 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14177 found at Fri Mar 31 14:26:59 UTC 2017 selfserv_9626 with PID 14177 started at Fri Mar 31 14:26:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #874: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 14177 at Fri Mar 31 14:26:59 UTC 2017 kill -USR1 14177 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14177 killed at Fri Mar 31 14:27:00 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:27:00 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:27:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:27:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #875: Server never started - PASSED kill -0 14257 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14257 found at Fri Mar 31 14:27:06 UTC 2017 selfserv_9626 with PID 14257 started at Fri Mar 31 14:27:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #876: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 14257 at Fri Mar 31 14:27:06 UTC 2017 kill -USR1 14257 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14257 killed at Fri Mar 31 14:27:07 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:27:07 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:27:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:27:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #877: Server never started - PASSED kill -0 14338 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14338 found at Fri Mar 31 14:27:13 UTC 2017 selfserv_9626 with PID 14338 started at Fri Mar 31 14:27:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #878: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 14338 at Fri Mar 31 14:27:13 UTC 2017 kill -USR1 14338 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14338 killed at Fri Mar 31 14:27:14 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:27:14 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:27:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:27:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #879: Server never started - PASSED kill -0 14407 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14407 found at Fri Mar 31 14:27:20 UTC 2017 selfserv_9626 with PID 14407 started at Fri Mar 31 14:27:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #880: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 14407 at Fri Mar 31 14:27:21 UTC 2017 kill -USR1 14407 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14407 killed at Fri Mar 31 14:27:21 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:27:21 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:27:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:27:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #881: Server never started - PASSED kill -0 14487 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14487 found at Fri Mar 31 14:27:27 UTC 2017 selfserv_9626 with PID 14487 started at Fri Mar 31 14:27:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #882: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 14487 at Fri Mar 31 14:27:28 UTC 2017 kill -USR1 14487 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14487 killed at Fri Mar 31 14:27:28 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:27:28 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:27:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:27:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #883: Server never started - PASSED kill -0 14559 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14559 found at Fri Mar 31 14:27:34 UTC 2017 selfserv_9626 with PID 14559 started at Fri Mar 31 14:27:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #884: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 14559 at Fri Mar 31 14:27:35 UTC 2017 kill -USR1 14559 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14559 killed at Fri Mar 31 14:27:35 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:27:35 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:27:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:27:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #885: Server never started - PASSED kill -0 14627 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14627 found at Fri Mar 31 14:27:41 UTC 2017 selfserv_9626 with PID 14627 started at Fri Mar 31 14:27:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #886: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 14627 at Fri Mar 31 14:27:42 UTC 2017 kill -USR1 14627 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14627 killed at Fri Mar 31 14:27:42 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:27:42 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:27:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:27:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #887: Server never started - PASSED kill -0 14707 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14707 found at Fri Mar 31 14:27:48 UTC 2017 selfserv_9626 with PID 14707 started at Fri Mar 31 14:27:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #888: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 14707 at Fri Mar 31 14:27:49 UTC 2017 kill -USR1 14707 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14707 killed at Fri Mar 31 14:27:49 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:27:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:27:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:27:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #889: Server never started - PASSED kill -0 14776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14776 found at Fri Mar 31 14:27:55 UTC 2017 selfserv_9626 with PID 14776 started at Fri Mar 31 14:27:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #890: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 14776 at Fri Mar 31 14:27:56 UTC 2017 kill -USR1 14776 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14776 killed at Fri Mar 31 14:27:56 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:27:57 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:27:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:28:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #891: Server never started - PASSED kill -0 14844 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14844 found at Fri Mar 31 14:28:02 UTC 2017 selfserv_9626 with PID 14844 started at Fri Mar 31 14:28:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #892: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 14844 at Fri Mar 31 14:28:03 UTC 2017 kill -USR1 14844 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14844 killed at Fri Mar 31 14:28:03 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:28:04 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:28:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:28:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #893: Server never started - PASSED kill -0 14937 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14937 found at Fri Mar 31 14:28:10 UTC 2017 selfserv_9626 with PID 14937 started at Fri Mar 31 14:28:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #894: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 14937 at Fri Mar 31 14:28:10 UTC 2017 kill -USR1 14937 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14937 killed at Fri Mar 31 14:28:11 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:28:11 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:28:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:28:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #895: Server never started - PASSED kill -0 15006 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15006 found at Fri Mar 31 14:28:17 UTC 2017 selfserv_9626 with PID 15006 started at Fri Mar 31 14:28:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #896: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 15006 at Fri Mar 31 14:28:17 UTC 2017 kill -USR1 15006 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15006 killed at Fri Mar 31 14:28:18 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:28:18 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:28:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:28:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #897: Server never started - PASSED kill -0 15074 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15074 found at Fri Mar 31 14:28:24 UTC 2017 selfserv_9626 with PID 15074 started at Fri Mar 31 14:28:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #898: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 15074 at Fri Mar 31 14:28:24 UTC 2017 kill -USR1 15074 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15074 killed at Fri Mar 31 14:28:25 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:28:25 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:28:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:28:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #899: Server never started - PASSED kill -0 15154 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15154 found at Fri Mar 31 14:28:31 UTC 2017 selfserv_9626 with PID 15154 started at Fri Mar 31 14:28:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #900: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 15154 at Fri Mar 31 14:28:31 UTC 2017 kill -USR1 15154 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15154 killed at Fri Mar 31 14:28:32 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:28:32 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:28:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:28:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #901: Server never started - PASSED kill -0 15226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15226 found at Fri Mar 31 14:28:38 UTC 2017 selfserv_9626 with PID 15226 started at Fri Mar 31 14:28:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #902: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 15226 at Fri Mar 31 14:28:39 UTC 2017 kill -USR1 15226 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15226 killed at Fri Mar 31 14:28:39 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:28:39 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:28:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:28:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #903: Server never started - PASSED kill -0 15294 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15294 found at Fri Mar 31 14:28:45 UTC 2017 selfserv_9626 with PID 15294 started at Fri Mar 31 14:28:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #904: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 15294 at Fri Mar 31 14:28:46 UTC 2017 kill -USR1 15294 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15294 killed at Fri Mar 31 14:28:46 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:28:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:28:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:28:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #905: Server never started - PASSED kill -0 15374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15374 found at Fri Mar 31 14:28:52 UTC 2017 selfserv_9626 with PID 15374 started at Fri Mar 31 14:28:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #906: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 15374 at Fri Mar 31 14:28:53 UTC 2017 kill -USR1 15374 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15374 killed at Fri Mar 31 14:28:53 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:28:53 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:28:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:28:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #907: Server never started - PASSED kill -0 15443 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15443 found at Fri Mar 31 14:28:59 UTC 2017 selfserv_9626 with PID 15443 started at Fri Mar 31 14:28:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #908: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 15443 at Fri Mar 31 14:29:00 UTC 2017 kill -USR1 15443 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15443 killed at Fri Mar 31 14:29:00 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:29:00 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:29:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:29:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #909: Server never started - PASSED kill -0 15511 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15511 found at Fri Mar 31 14:29:06 UTC 2017 selfserv_9626 with PID 15511 started at Fri Mar 31 14:29:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #910: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 15511 at Fri Mar 31 14:29:07 UTC 2017 kill -USR1 15511 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15511 killed at Fri Mar 31 14:29:07 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:29:08 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:29:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:29:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #911: Server never started - PASSED kill -0 15608 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15608 found at Fri Mar 31 14:29:13 UTC 2017 selfserv_9626 with PID 15608 started at Fri Mar 31 14:29:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #912: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 15608 at Fri Mar 31 14:29:14 UTC 2017 kill -USR1 15608 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15608 killed at Fri Mar 31 14:29:14 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:29:15 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:29:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:29:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #913: Server never started - PASSED kill -0 15677 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15677 found at Fri Mar 31 14:29:21 UTC 2017 selfserv_9626 with PID 15677 started at Fri Mar 31 14:29:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #914: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 15677 at Fri Mar 31 14:29:21 UTC 2017 kill -USR1 15677 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15677 killed at Fri Mar 31 14:29:22 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:29:22 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:29:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:29:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #915: Server never started - PASSED kill -0 15745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15745 found at Fri Mar 31 14:29:28 UTC 2017 selfserv_9626 with PID 15745 started at Fri Mar 31 14:29:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #916: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 15745 at Fri Mar 31 14:29:28 UTC 2017 kill -USR1 15745 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15745 killed at Fri Mar 31 14:29:29 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:29:29 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:29:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:29:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #917: Server never started - PASSED kill -0 15828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15828 found at Fri Mar 31 14:29:35 UTC 2017 selfserv_9626 with PID 15828 started at Fri Mar 31 14:29:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #918: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 15828 at Fri Mar 31 14:29:35 UTC 2017 kill -USR1 15828 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15828 killed at Fri Mar 31 14:29:36 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:29:36 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:29:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:29:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #919: Server never started - PASSED kill -0 15897 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15897 found at Fri Mar 31 14:29:42 UTC 2017 selfserv_9626 with PID 15897 started at Fri Mar 31 14:29:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #920: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 15897 at Fri Mar 31 14:29:42 UTC 2017 kill -USR1 15897 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15897 killed at Fri Mar 31 14:29:43 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:29:43 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:29:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:29:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #921: Server never started - PASSED kill -0 15965 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15965 found at Fri Mar 31 14:29:49 UTC 2017 selfserv_9626 with PID 15965 started at Fri Mar 31 14:29:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #922: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 15965 at Fri Mar 31 14:29:49 UTC 2017 kill -USR1 15965 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15965 killed at Fri Mar 31 14:29:50 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:29:50 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:29:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:29:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #923: Server never started - PASSED kill -0 16045 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16045 found at Fri Mar 31 14:29:56 UTC 2017 selfserv_9626 with PID 16045 started at Fri Mar 31 14:29:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #924: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 16045 at Fri Mar 31 14:29:57 UTC 2017 kill -USR1 16045 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16045 killed at Fri Mar 31 14:29:57 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:29:57 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:29:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:30:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #925: Server never started - PASSED kill -0 16114 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16114 found at Fri Mar 31 14:30:03 UTC 2017 selfserv_9626 with PID 16114 started at Fri Mar 31 14:30:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #926: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 16114 at Fri Mar 31 14:30:04 UTC 2017 kill -USR1 16114 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16114 killed at Fri Mar 31 14:30:04 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:30:04 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:30:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:30:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #927: Server never started - PASSED kill -0 16195 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16195 found at Fri Mar 31 14:30:10 UTC 2017 selfserv_9626 with PID 16195 started at Fri Mar 31 14:30:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #928: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 16195 at Fri Mar 31 14:30:11 UTC 2017 kill -USR1 16195 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16195 killed at Fri Mar 31 14:30:11 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:30:11 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:30:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:30:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #929: Server never started - PASSED kill -0 16275 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16275 found at Fri Mar 31 14:30:17 UTC 2017 selfserv_9626 with PID 16275 started at Fri Mar 31 14:30:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #930: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 16275 at Fri Mar 31 14:30:18 UTC 2017 kill -USR1 16275 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16275 killed at Fri Mar 31 14:30:18 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:30:18 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:30:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:30:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #931: Server never started - PASSED kill -0 16344 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16344 found at Fri Mar 31 14:30:24 UTC 2017 selfserv_9626 with PID 16344 started at Fri Mar 31 14:30:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #932: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 16344 at Fri Mar 31 14:30:25 UTC 2017 kill -USR1 16344 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16344 killed at Fri Mar 31 14:30:25 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:30:25 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:30:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:30:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #933: Server never started - PASSED kill -0 16412 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16412 found at Fri Mar 31 14:30:31 UTC 2017 selfserv_9626 with PID 16412 started at Fri Mar 31 14:30:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #934: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 16412 at Fri Mar 31 14:30:32 UTC 2017 kill -USR1 16412 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16412 killed at Fri Mar 31 14:30:32 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:30:33 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:30:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:30:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #935: Server never started - PASSED kill -0 16495 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16495 found at Fri Mar 31 14:30:39 UTC 2017 selfserv_9626 with PID 16495 started at Fri Mar 31 14:30:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #936: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 16495 at Fri Mar 31 14:30:39 UTC 2017 kill -USR1 16495 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16495 killed at Fri Mar 31 14:30:40 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:30:40 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:30:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:30:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #937: Server never started - PASSED kill -0 16564 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16564 found at Fri Mar 31 14:30:46 UTC 2017 selfserv_9626 with PID 16564 started at Fri Mar 31 14:30:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #938: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 16564 at Fri Mar 31 14:30:46 UTC 2017 kill -USR1 16564 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16564 killed at Fri Mar 31 14:30:47 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:30:47 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:30:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:30:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #939: Server never started - PASSED kill -0 16632 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16632 found at Fri Mar 31 14:30:53 UTC 2017 selfserv_9626 with PID 16632 started at Fri Mar 31 14:30:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #940: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 16632 at Fri Mar 31 14:30:53 UTC 2017 kill -USR1 16632 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16632 killed at Fri Mar 31 14:30:54 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:30:54 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:30:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:30:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #941: Server never started - PASSED kill -0 16713 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16713 found at Fri Mar 31 14:31:00 UTC 2017 selfserv_9626 with PID 16713 started at Fri Mar 31 14:31:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #942: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 16713 at Fri Mar 31 14:31:00 UTC 2017 kill -USR1 16713 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16713 killed at Fri Mar 31 14:31:01 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:31:01 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:31:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:31:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #943: Server never started - PASSED kill -0 16791 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16791 found at Fri Mar 31 14:31:07 UTC 2017 selfserv_9626 with PID 16791 started at Fri Mar 31 14:31:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #944: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 16791 at Fri Mar 31 14:31:08 UTC 2017 kill -USR1 16791 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16791 killed at Fri Mar 31 14:31:08 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:31:08 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:31:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:31:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #945: Server never started - PASSED kill -0 16864 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16864 found at Fri Mar 31 14:31:14 UTC 2017 selfserv_9626 with PID 16864 started at Fri Mar 31 14:31:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #946: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 16864 at Fri Mar 31 14:31:15 UTC 2017 kill -USR1 16864 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16864 killed at Fri Mar 31 14:31:15 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:31:15 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:31:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:31:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #947: Server never started - PASSED kill -0 16945 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16945 found at Fri Mar 31 14:31:21 UTC 2017 selfserv_9626 with PID 16945 started at Fri Mar 31 14:31:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #948: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 16945 at Fri Mar 31 14:31:22 UTC 2017 kill -USR1 16945 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16945 killed at Fri Mar 31 14:31:22 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:31:22 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:31:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:31:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #949: Server never started - PASSED kill -0 17013 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17013 found at Fri Mar 31 14:31:28 UTC 2017 selfserv_9626 with PID 17013 started at Fri Mar 31 14:31:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #950: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 17013 at Fri Mar 31 14:31:29 UTC 2017 kill -USR1 17013 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17013 killed at Fri Mar 31 14:31:29 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:31:29 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:31:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:31:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #951: Server never started - PASSED kill -0 17084 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17084 found at Fri Mar 31 14:31:35 UTC 2017 selfserv_9626 with PID 17084 started at Fri Mar 31 14:31:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #952: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 17084 at Fri Mar 31 14:31:36 UTC 2017 kill -USR1 17084 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17084 killed at Fri Mar 31 14:31:36 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:31:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:31:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:31:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #953: Server never started - PASSED kill -0 17165 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17165 found at Fri Mar 31 14:31:42 UTC 2017 selfserv_9626 with PID 17165 started at Fri Mar 31 14:31:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #954: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 17165 at Fri Mar 31 14:31:43 UTC 2017 kill -USR1 17165 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17165 killed at Fri Mar 31 14:31:43 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:31:44 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:31:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:31:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #955: Server never started - PASSED kill -0 17233 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17233 found at Fri Mar 31 14:31:50 UTC 2017 selfserv_9626 with PID 17233 started at Fri Mar 31 14:31:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #956: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 17233 at Fri Mar 31 14:31:50 UTC 2017 kill -USR1 17233 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17233 killed at Fri Mar 31 14:31:51 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:31:51 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:31:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:31:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #957: Server never started - PASSED kill -0 17301 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17301 found at Fri Mar 31 14:31:57 UTC 2017 selfserv_9626 with PID 17301 started at Fri Mar 31 14:31:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #958: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 17301 at Fri Mar 31 14:31:57 UTC 2017 kill -USR1 17301 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17301 killed at Fri Mar 31 14:31:58 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:31:58 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:31:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:32:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #959: Server never started - PASSED kill -0 17382 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17382 found at Fri Mar 31 14:32:04 UTC 2017 selfserv_9626 with PID 17382 started at Fri Mar 31 14:32:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #960: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 17382 at Fri Mar 31 14:32:04 UTC 2017 kill -USR1 17382 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17382 killed at Fri Mar 31 14:32:05 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:32:05 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:32:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:32:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #961: Server never started - PASSED kill -0 17463 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17463 found at Fri Mar 31 14:32:11 UTC 2017 selfserv_9626 with PID 17463 started at Fri Mar 31 14:32:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #962: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 17463 at Fri Mar 31 14:32:11 UTC 2017 kill -USR1 17463 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17463 killed at Fri Mar 31 14:32:12 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:32:12 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:32:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:32:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #963: Server never started - PASSED kill -0 17531 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17531 found at Fri Mar 31 14:32:18 UTC 2017 selfserv_9626 with PID 17531 started at Fri Mar 31 14:32:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #964: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 17531 at Fri Mar 31 14:32:18 UTC 2017 kill -USR1 17531 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17531 killed at Fri Mar 31 14:32:19 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:32:19 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:32:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:32:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #965: Server never started - PASSED kill -0 17612 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17612 found at Fri Mar 31 14:32:25 UTC 2017 selfserv_9626 with PID 17612 started at Fri Mar 31 14:32:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #966: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 17612 at Fri Mar 31 14:32:26 UTC 2017 kill -USR1 17612 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17612 killed at Fri Mar 31 14:32:26 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:32:26 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:32:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:32:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #967: Server never started - PASSED kill -0 17680 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17680 found at Fri Mar 31 14:32:32 UTC 2017 selfserv_9626 with PID 17680 started at Fri Mar 31 14:32:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #968: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 17680 at Fri Mar 31 14:32:33 UTC 2017 kill -USR1 17680 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17680 killed at Fri Mar 31 14:32:33 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:32:33 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:32:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:32:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #969: Server never started - PASSED kill -0 17751 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17751 found at Fri Mar 31 14:32:39 UTC 2017 selfserv_9626 with PID 17751 started at Fri Mar 31 14:32:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #970: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 17751 at Fri Mar 31 14:32:40 UTC 2017 kill -USR1 17751 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17751 killed at Fri Mar 31 14:32:40 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:32:40 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:32:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:32:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #971: Server never started - PASSED kill -0 17832 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17832 found at Fri Mar 31 14:32:46 UTC 2017 selfserv_9626 with PID 17832 started at Fri Mar 31 14:32:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #972: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 17832 at Fri Mar 31 14:32:47 UTC 2017 kill -USR1 17832 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17832 killed at Fri Mar 31 14:32:47 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:32:47 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:32:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:32:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #973: Server never started - PASSED kill -0 17900 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17900 found at Fri Mar 31 14:32:53 UTC 2017 selfserv_9626 with PID 17900 started at Fri Mar 31 14:32:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #974: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 17900 at Fri Mar 31 14:32:54 UTC 2017 kill -USR1 17900 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17900 killed at Fri Mar 31 14:32:54 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:32:54 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:32:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:33:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #975: Server never started - PASSED kill -0 17968 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17968 found at Fri Mar 31 14:33:00 UTC 2017 selfserv_9626 with PID 17968 started at Fri Mar 31 14:33:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #976: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 17968 at Fri Mar 31 14:33:01 UTC 2017 kill -USR1 17968 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17968 killed at Fri Mar 31 14:33:01 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:33:02 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:33:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:33:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #977: Server never started - PASSED kill -0 18053 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18053 found at Fri Mar 31 14:33:08 UTC 2017 selfserv_9626 with PID 18053 started at Fri Mar 31 14:33:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #978: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 18053 at Fri Mar 31 14:33:08 UTC 2017 kill -USR1 18053 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18053 killed at Fri Mar 31 14:33:09 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:33:09 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:33:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:33:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #979: Server never started - PASSED kill -0 18131 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18131 found at Fri Mar 31 14:33:15 UTC 2017 selfserv_9626 with PID 18131 started at Fri Mar 31 14:33:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #980: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 18131 at Fri Mar 31 14:33:15 UTC 2017 kill -USR1 18131 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18131 killed at Fri Mar 31 14:33:16 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:33:16 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:33:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:33:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #981: Server never started - PASSED kill -0 18199 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18199 found at Fri Mar 31 14:33:22 UTC 2017 selfserv_9626 with PID 18199 started at Fri Mar 31 14:33:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #982: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 18199 at Fri Mar 31 14:33:22 UTC 2017 kill -USR1 18199 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18199 killed at Fri Mar 31 14:33:23 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:33:23 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:33:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:33:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #983: Server never started - PASSED kill -0 18280 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18280 found at Fri Mar 31 14:33:29 UTC 2017 selfserv_9626 with PID 18280 started at Fri Mar 31 14:33:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #984: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 18280 at Fri Mar 31 14:33:30 UTC 2017 kill -USR1 18280 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18280 killed at Fri Mar 31 14:33:30 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:33:30 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:33:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:33:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #985: Server never started - PASSED kill -0 18351 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18351 found at Fri Mar 31 14:33:36 UTC 2017 selfserv_9626 with PID 18351 started at Fri Mar 31 14:33:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #986: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 18351 at Fri Mar 31 14:33:37 UTC 2017 kill -USR1 18351 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18351 killed at Fri Mar 31 14:33:37 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:33:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:33:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:33:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #987: Server never started - PASSED kill -0 18419 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18419 found at Fri Mar 31 14:33:43 UTC 2017 selfserv_9626 with PID 18419 started at Fri Mar 31 14:33:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #988: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 18419 at Fri Mar 31 14:33:44 UTC 2017 kill -USR1 18419 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18419 killed at Fri Mar 31 14:33:44 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:33:44 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:33:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:33:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #989: Server never started - PASSED kill -0 18500 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18500 found at Fri Mar 31 14:33:50 UTC 2017 selfserv_9626 with PID 18500 started at Fri Mar 31 14:33:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #990: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 18500 at Fri Mar 31 14:33:51 UTC 2017 kill -USR1 18500 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18500 killed at Fri Mar 31 14:33:51 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:33:51 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:33:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:33:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #991: Server never started - PASSED kill -0 18568 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18568 found at Fri Mar 31 14:33:57 UTC 2017 selfserv_9626 with PID 18568 started at Fri Mar 31 14:33:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #992: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 18568 at Fri Mar 31 14:33:58 UTC 2017 kill -USR1 18568 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18568 killed at Fri Mar 31 14:33:58 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:33:58 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:33:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:34:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #993: Server never started - PASSED kill -0 18636 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18636 found at Fri Mar 31 14:34:04 UTC 2017 selfserv_9626 with PID 18636 started at Fri Mar 31 14:34:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #994: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 18636 at Fri Mar 31 14:34:05 UTC 2017 kill -USR1 18636 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18636 killed at Fri Mar 31 14:34:05 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:34:06 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:34:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:34:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #995: Server never started - PASSED kill -0 18730 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18730 found at Fri Mar 31 14:34:12 UTC 2017 selfserv_9626 with PID 18730 started at Fri Mar 31 14:34:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #996: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 18730 at Fri Mar 31 14:34:12 UTC 2017 kill -USR1 18730 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18730 killed at Fri Mar 31 14:34:13 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:34:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:34:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:34:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #997: Server never started - PASSED kill -0 18799 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18799 found at Fri Mar 31 14:34:19 UTC 2017 selfserv_9626 with PID 18799 started at Fri Mar 31 14:34:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #998: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 18799 at Fri Mar 31 14:34:19 UTC 2017 kill -USR1 18799 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18799 killed at Fri Mar 31 14:34:20 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:34:20 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:34:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:34:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #999: Server never started - PASSED kill -0 18868 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18868 found at Fri Mar 31 14:34:26 UTC 2017 selfserv_9626 with PID 18868 started at Fri Mar 31 14:34:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1000: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 18868 at Fri Mar 31 14:34:26 UTC 2017 kill -USR1 18868 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18868 killed at Fri Mar 31 14:34:27 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:34:27 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:34:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:34:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1001: Server never started - PASSED kill -0 18948 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18948 found at Fri Mar 31 14:34:33 UTC 2017 selfserv_9626 with PID 18948 started at Fri Mar 31 14:34:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1002: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 18948 at Fri Mar 31 14:34:33 UTC 2017 kill -USR1 18948 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18948 killed at Fri Mar 31 14:34:34 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:34:34 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:34:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:34:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1003: Server never started - PASSED kill -0 19019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19019 found at Fri Mar 31 14:34:40 UTC 2017 selfserv_9626 with PID 19019 started at Fri Mar 31 14:34:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1004: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 19019 at Fri Mar 31 14:34:40 UTC 2017 kill -USR1 19019 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19019 killed at Fri Mar 31 14:34:41 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:34:41 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:34:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:34:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1005: Server never started - PASSED kill -0 19088 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19088 found at Fri Mar 31 14:34:47 UTC 2017 selfserv_9626 with PID 19088 started at Fri Mar 31 14:34:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1006: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 19088 at Fri Mar 31 14:34:48 UTC 2017 kill -USR1 19088 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19088 killed at Fri Mar 31 14:34:48 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:34:48 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:34:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:34:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1007: Server never started - PASSED kill -0 19168 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19168 found at Fri Mar 31 14:34:54 UTC 2017 selfserv_9626 with PID 19168 started at Fri Mar 31 14:34:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1008: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 19168 at Fri Mar 31 14:34:55 UTC 2017 kill -USR1 19168 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19168 killed at Fri Mar 31 14:34:55 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:34:55 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:34:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:35:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1009: Server never started - PASSED kill -0 19236 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19236 found at Fri Mar 31 14:35:01 UTC 2017 selfserv_9626 with PID 19236 started at Fri Mar 31 14:35:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1010: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 19236 at Fri Mar 31 14:35:02 UTC 2017 kill -USR1 19236 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19236 killed at Fri Mar 31 14:35:02 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:35:02 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:35:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:35:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1011: Server never started - PASSED kill -0 19318 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19318 found at Fri Mar 31 14:35:08 UTC 2017 selfserv_9626 with PID 19318 started at Fri Mar 31 14:35:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1012: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 19318 at Fri Mar 31 14:35:09 UTC 2017 kill -USR1 19318 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19318 killed at Fri Mar 31 14:35:09 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:35:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:35:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:35:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1013: Server never started - PASSED kill -0 19398 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19398 found at Fri Mar 31 14:35:15 UTC 2017 selfserv_9626 with PID 19398 started at Fri Mar 31 14:35:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1014: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 19398 at Fri Mar 31 14:35:16 UTC 2017 kill -USR1 19398 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19398 killed at Fri Mar 31 14:35:16 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:35:17 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:35:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:35:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1015: Server never started - PASSED kill -0 19466 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19466 found at Fri Mar 31 14:35:23 UTC 2017 selfserv_9626 with PID 19466 started at Fri Mar 31 14:35:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1016: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 19466 at Fri Mar 31 14:35:23 UTC 2017 kill -USR1 19466 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19466 killed at Fri Mar 31 14:35:24 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:35:24 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:35:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:35:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1017: Server never started - PASSED kill -0 19535 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19535 found at Fri Mar 31 14:35:30 UTC 2017 selfserv_9626 with PID 19535 started at Fri Mar 31 14:35:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1018: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 19535 at Fri Mar 31 14:35:30 UTC 2017 kill -USR1 19535 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19535 killed at Fri Mar 31 14:35:31 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:35:31 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:35:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:35:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1019: Server never started - PASSED kill -0 19618 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19618 found at Fri Mar 31 14:35:37 UTC 2017 selfserv_9626 with PID 19618 started at Fri Mar 31 14:35:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1020: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 19618 at Fri Mar 31 14:35:37 UTC 2017 kill -USR1 19618 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19618 killed at Fri Mar 31 14:35:38 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:35:38 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:35:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:35:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1021: Server never started - PASSED kill -0 19686 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19686 found at Fri Mar 31 14:35:44 UTC 2017 selfserv_9626 with PID 19686 started at Fri Mar 31 14:35:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1022: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 19686 at Fri Mar 31 14:35:44 UTC 2017 kill -USR1 19686 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19686 killed at Fri Mar 31 14:35:45 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:35:45 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:35:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:35:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1023: Server never started - PASSED kill -0 19755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19755 found at Fri Mar 31 14:35:51 UTC 2017 selfserv_9626 with PID 19755 started at Fri Mar 31 14:35:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1024: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 19755 at Fri Mar 31 14:35:51 UTC 2017 kill -USR1 19755 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19755 killed at Fri Mar 31 14:35:52 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:35:52 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:35:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:35:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1025: Server never started - PASSED kill -0 19835 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19835 found at Fri Mar 31 14:35:58 UTC 2017 selfserv_9626 with PID 19835 started at Fri Mar 31 14:35:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1026: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 19835 at Fri Mar 31 14:35:59 UTC 2017 kill -USR1 19835 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19835 killed at Fri Mar 31 14:35:59 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:35:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:35:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:36:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1027: Server never started - PASSED kill -0 19903 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19903 found at Fri Mar 31 14:36:05 UTC 2017 selfserv_9626 with PID 19903 started at Fri Mar 31 14:36:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1028: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 19903 at Fri Mar 31 14:36:06 UTC 2017 kill -USR1 19903 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19903 killed at Fri Mar 31 14:36:06 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:36:06 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:36:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:36:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1029: Server never started - PASSED kill -0 19985 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19985 found at Fri Mar 31 14:36:12 UTC 2017 selfserv_9626 with PID 19985 started at Fri Mar 31 14:36:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1030: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 19985 at Fri Mar 31 14:36:13 UTC 2017 kill -USR1 19985 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19985 killed at Fri Mar 31 14:36:13 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:36:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:36:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:36:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1031: Server never started - PASSED kill -0 20065 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20065 found at Fri Mar 31 14:36:19 UTC 2017 selfserv_9626 with PID 20065 started at Fri Mar 31 14:36:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1032: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 20065 at Fri Mar 31 14:36:20 UTC 2017 kill -USR1 20065 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20065 killed at Fri Mar 31 14:36:20 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:36:20 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:36:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:36:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1033: Server never started - PASSED kill -0 20133 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20133 found at Fri Mar 31 14:36:26 UTC 2017 selfserv_9626 with PID 20133 started at Fri Mar 31 14:36:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1034: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 20133 at Fri Mar 31 14:36:27 UTC 2017 kill -USR1 20133 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20133 killed at Fri Mar 31 14:36:27 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:36:27 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:36:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:36:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1035: Server never started - PASSED kill -0 20202 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20202 found at Fri Mar 31 14:36:33 UTC 2017 selfserv_9626 with PID 20202 started at Fri Mar 31 14:36:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1036: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 20202 at Fri Mar 31 14:36:34 UTC 2017 kill -USR1 20202 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20202 killed at Fri Mar 31 14:36:34 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:36:35 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:36:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:36:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1037: Server never started - PASSED kill -0 20294 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20294 found at Fri Mar 31 14:36:41 UTC 2017 selfserv_9626 with PID 20294 started at Fri Mar 31 14:36:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1038: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 20294 at Fri Mar 31 14:36:41 UTC 2017 kill -USR1 20294 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20294 killed at Fri Mar 31 14:36:42 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:36:42 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:36:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:36:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1039: Server never started - PASSED kill -0 20362 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20362 found at Fri Mar 31 14:36:48 UTC 2017 selfserv_9626 with PID 20362 started at Fri Mar 31 14:36:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1040: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 20362 at Fri Mar 31 14:36:48 UTC 2017 kill -USR1 20362 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20362 killed at Fri Mar 31 14:36:49 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:36:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:36:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:36:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1041: Server never started - PASSED kill -0 20431 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20431 found at Fri Mar 31 14:36:55 UTC 2017 selfserv_9626 with PID 20431 started at Fri Mar 31 14:36:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1042: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 20431 at Fri Mar 31 14:36:55 UTC 2017 kill -USR1 20431 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20431 killed at Fri Mar 31 14:36:56 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:36:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:36:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:37:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1043: Server never started - PASSED kill -0 20511 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20511 found at Fri Mar 31 14:37:02 UTC 2017 selfserv_9626 with PID 20511 started at Fri Mar 31 14:37:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1044: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 20511 at Fri Mar 31 14:37:02 UTC 2017 kill -USR1 20511 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20511 killed at Fri Mar 31 14:37:03 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:37:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:37:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:37:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1045: Server never started - PASSED kill -0 20593 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20593 found at Fri Mar 31 14:37:09 UTC 2017 selfserv_9626 with PID 20593 started at Fri Mar 31 14:37:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1046: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 20593 at Fri Mar 31 14:37:10 UTC 2017 kill -USR1 20593 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20593 killed at Fri Mar 31 14:37:10 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:37:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:37:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:37:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1047: Server never started - PASSED kill -0 20662 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20662 found at Fri Mar 31 14:37:16 UTC 2017 selfserv_9626 with PID 20662 started at Fri Mar 31 14:37:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1048: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 20662 at Fri Mar 31 14:37:17 UTC 2017 kill -USR1 20662 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20662 killed at Fri Mar 31 14:37:17 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:37:17 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:37:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:37:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1049: Server never started - PASSED kill -0 20742 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20742 found at Fri Mar 31 14:37:23 UTC 2017 selfserv_9626 with PID 20742 started at Fri Mar 31 14:37:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1050: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 20742 at Fri Mar 31 14:37:24 UTC 2017 kill -USR1 20742 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20742 killed at Fri Mar 31 14:37:24 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:37:24 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:37:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:37:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1051: Server never started - PASSED kill -0 20810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20810 found at Fri Mar 31 14:37:30 UTC 2017 selfserv_9626 with PID 20810 started at Fri Mar 31 14:37:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1052: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 20810 at Fri Mar 31 14:37:31 UTC 2017 kill -USR1 20810 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20810 killed at Fri Mar 31 14:37:31 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:37:31 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:37:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:37:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1053: Server never started - PASSED kill -0 20882 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20882 found at Fri Mar 31 14:37:37 UTC 2017 selfserv_9626 with PID 20882 started at Fri Mar 31 14:37:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1054: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 20882 at Fri Mar 31 14:37:38 UTC 2017 kill -USR1 20882 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20882 killed at Fri Mar 31 14:37:38 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:37:39 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:37:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:37:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1055: Server never started - PASSED kill -0 20962 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20962 found at Fri Mar 31 14:37:44 UTC 2017 selfserv_9626 with PID 20962 started at Fri Mar 31 14:37:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1056: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 20962 at Fri Mar 31 14:37:45 UTC 2017 kill -USR1 20962 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20962 killed at Fri Mar 31 14:37:45 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:37:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:37:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:37:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1057: Server never started - PASSED kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21031 found at Fri Mar 31 14:37:52 UTC 2017 selfserv_9626 with PID 21031 started at Fri Mar 31 14:37:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1058: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 21031 at Fri Mar 31 14:37:52 UTC 2017 kill -USR1 21031 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21031 killed at Fri Mar 31 14:37:53 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:37:53 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:37:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:37:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1059: Server never started - PASSED kill -0 21099 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21099 found at Fri Mar 31 14:37:59 UTC 2017 selfserv_9626 with PID 21099 started at Fri Mar 31 14:37:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1060: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 21099 at Fri Mar 31 14:37:59 UTC 2017 kill -USR1 21099 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21099 killed at Fri Mar 31 14:38:00 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:38:00 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:38:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:38:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1061: Server never started - PASSED kill -0 21179 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21179 found at Fri Mar 31 14:38:06 UTC 2017 selfserv_9626 with PID 21179 started at Fri Mar 31 14:38:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1062: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 21179 at Fri Mar 31 14:38:06 UTC 2017 kill -USR1 21179 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21179 killed at Fri Mar 31 14:38:07 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:38:07 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:38:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:38:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1063: Server never started - PASSED kill -0 21262 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21262 found at Fri Mar 31 14:38:13 UTC 2017 selfserv_9626 with PID 21262 started at Fri Mar 31 14:38:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1064: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 21262 at Fri Mar 31 14:38:13 UTC 2017 kill -USR1 21262 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21262 killed at Fri Mar 31 14:38:14 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:38:14 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:38:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:38:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1065: Server never started - PASSED kill -0 21330 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21330 found at Fri Mar 31 14:38:20 UTC 2017 selfserv_9626 with PID 21330 started at Fri Mar 31 14:38:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1066: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 21330 at Fri Mar 31 14:38:20 UTC 2017 kill -USR1 21330 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21330 killed at Fri Mar 31 14:38:21 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:38:21 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:38:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:38:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1067: Server never started - PASSED kill -0 21410 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21410 found at Fri Mar 31 14:38:27 UTC 2017 selfserv_9626 with PID 21410 started at Fri Mar 31 14:38:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1068: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 21410 at Fri Mar 31 14:38:28 UTC 2017 kill -USR1 21410 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21410 killed at Fri Mar 31 14:38:28 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:38:28 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:38:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:38:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1069: Server never started - PASSED kill -0 21479 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21479 found at Fri Mar 31 14:38:34 UTC 2017 selfserv_9626 with PID 21479 started at Fri Mar 31 14:38:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1070: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 21479 at Fri Mar 31 14:38:35 UTC 2017 kill -USR1 21479 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21479 killed at Fri Mar 31 14:38:35 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:38:35 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:38:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:38:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1071: Server never started - PASSED kill -0 21550 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21550 found at Fri Mar 31 14:38:41 UTC 2017 selfserv_9626 with PID 21550 started at Fri Mar 31 14:38:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1072: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 21550 at Fri Mar 31 14:38:42 UTC 2017 kill -USR1 21550 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21550 killed at Fri Mar 31 14:38:42 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:38:42 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:38:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:38:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1073: Server never started - PASSED kill -0 21630 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21630 found at Fri Mar 31 14:38:48 UTC 2017 selfserv_9626 with PID 21630 started at Fri Mar 31 14:38:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1074: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 21630 at Fri Mar 31 14:38:49 UTC 2017 kill -USR1 21630 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21630 killed at Fri Mar 31 14:38:49 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:38:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:38:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:38:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1075: Server never started - PASSED kill -0 21699 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21699 found at Fri Mar 31 14:38:55 UTC 2017 selfserv_9626 with PID 21699 started at Fri Mar 31 14:38:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1076: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 21699 at Fri Mar 31 14:38:56 UTC 2017 kill -USR1 21699 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21699 killed at Fri Mar 31 14:38:56 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:38:57 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:38:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:39:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1077: Server never started - PASSED kill -0 21767 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21767 found at Fri Mar 31 14:39:03 UTC 2017 selfserv_9626 with PID 21767 started at Fri Mar 31 14:39:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1078: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 21767 at Fri Mar 31 14:39:03 UTC 2017 kill -USR1 21767 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21767 killed at Fri Mar 31 14:39:03 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:39:04 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:39:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:39:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1079: Server never started - PASSED kill -0 21861 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21861 found at Fri Mar 31 14:39:10 UTC 2017 selfserv_9626 with PID 21861 started at Fri Mar 31 14:39:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1080: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 21861 at Fri Mar 31 14:39:10 UTC 2017 kill -USR1 21861 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21861 killed at Fri Mar 31 14:39:11 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:39:11 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:39:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:39:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1081: Server never started - PASSED kill -0 21930 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21930 found at Fri Mar 31 14:39:17 UTC 2017 selfserv_9626 with PID 21930 started at Fri Mar 31 14:39:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1082: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 21930 at Fri Mar 31 14:39:17 UTC 2017 kill -USR1 21930 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21930 killed at Fri Mar 31 14:39:18 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:39:18 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:39:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:39:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1083: Server never started - PASSED kill -0 21998 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21998 found at Fri Mar 31 14:39:24 UTC 2017 selfserv_9626 with PID 21998 started at Fri Mar 31 14:39:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1084: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 21998 at Fri Mar 31 14:39:24 UTC 2017 kill -USR1 21998 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21998 killed at Fri Mar 31 14:39:25 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:39:25 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:39:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:39:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1085: Server never started - PASSED kill -0 22078 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22078 found at Fri Mar 31 14:39:31 UTC 2017 selfserv_9626 with PID 22078 started at Fri Mar 31 14:39:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1086: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 22078 at Fri Mar 31 14:39:31 UTC 2017 kill -USR1 22078 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22078 killed at Fri Mar 31 14:39:32 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:39:32 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:39:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:39:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1087: Server never started - PASSED kill -0 22150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22150 found at Fri Mar 31 14:39:38 UTC 2017 selfserv_9626 with PID 22150 started at Fri Mar 31 14:39:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1088: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 22150 at Fri Mar 31 14:39:39 UTC 2017 kill -USR1 22150 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22150 killed at Fri Mar 31 14:39:39 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:39:39 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:39:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:39:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1089: Server never started - PASSED kill -0 22218 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22218 found at Fri Mar 31 14:39:45 UTC 2017 selfserv_9626 with PID 22218 started at Fri Mar 31 14:39:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1090: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 22218 at Fri Mar 31 14:39:46 UTC 2017 kill -USR1 22218 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22218 killed at Fri Mar 31 14:39:46 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:39:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:39:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:39:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1091: Server never started - PASSED kill -0 22298 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22298 found at Fri Mar 31 14:39:52 UTC 2017 selfserv_9626 with PID 22298 started at Fri Mar 31 14:39:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1092: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 22298 at Fri Mar 31 14:39:53 UTC 2017 kill -USR1 22298 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22298 killed at Fri Mar 31 14:39:53 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:39:53 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:39:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:39:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1093: Server never started - PASSED kill -0 22367 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22367 found at Fri Mar 31 14:39:59 UTC 2017 selfserv_9626 with PID 22367 started at Fri Mar 31 14:39:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1094: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 22367 at Fri Mar 31 14:40:00 UTC 2017 kill -USR1 22367 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22367 killed at Fri Mar 31 14:40:00 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:40:00 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:40:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:40:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1095: Server never started - PASSED kill -0 22435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22435 found at Fri Mar 31 14:40:06 UTC 2017 selfserv_9626 with PID 22435 started at Fri Mar 31 14:40:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1096: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 22435 at Fri Mar 31 14:40:07 UTC 2017 kill -USR1 22435 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22435 killed at Fri Mar 31 14:40:07 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:40:08 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:40:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:40:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1097: Server never started - PASSED kill -0 22528 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22528 found at Fri Mar 31 14:40:13 UTC 2017 selfserv_9626 with PID 22528 started at Fri Mar 31 14:40:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1098: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 22528 at Fri Mar 31 14:40:14 UTC 2017 kill -USR1 22528 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22528 killed at Fri Mar 31 14:40:14 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:40:15 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:40:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:40:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1099: Server never started - PASSED kill -0 22597 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22597 found at Fri Mar 31 14:40:21 UTC 2017 selfserv_9626 with PID 22597 started at Fri Mar 31 14:40:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1100: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 22597 at Fri Mar 31 14:40:21 UTC 2017 kill -USR1 22597 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22597 killed at Fri Mar 31 14:40:22 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:40:22 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:40:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:40:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1101: Server never started - PASSED kill -0 22665 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22665 found at Fri Mar 31 14:40:28 UTC 2017 selfserv_9626 with PID 22665 started at Fri Mar 31 14:40:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1102: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 22665 at Fri Mar 31 14:40:28 UTC 2017 kill -USR1 22665 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22665 killed at Fri Mar 31 14:40:29 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:40:29 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:40:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:40:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1103: Server never started - PASSED kill -0 22745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22745 found at Fri Mar 31 14:40:35 UTC 2017 selfserv_9626 with PID 22745 started at Fri Mar 31 14:40:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1104: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 22745 at Fri Mar 31 14:40:35 UTC 2017 kill -USR1 22745 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22745 killed at Fri Mar 31 14:40:36 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:40:36 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:40:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:40:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1105: Server never started - PASSED kill -0 22817 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22817 found at Fri Mar 31 14:40:42 UTC 2017 selfserv_9626 with PID 22817 started at Fri Mar 31 14:40:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1106: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 22817 at Fri Mar 31 14:40:42 UTC 2017 kill -USR1 22817 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22817 killed at Fri Mar 31 14:40:43 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:40:43 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:40:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:40:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1107: Server never started - PASSED kill -0 22885 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22885 found at Fri Mar 31 14:40:49 UTC 2017 selfserv_9626 with PID 22885 started at Fri Mar 31 14:40:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1108: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 22885 at Fri Mar 31 14:40:49 UTC 2017 kill -USR1 22885 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22885 killed at Fri Mar 31 14:40:50 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:40:50 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:40:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:40:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1109: Server never started - PASSED kill -0 22966 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22966 found at Fri Mar 31 14:40:56 UTC 2017 selfserv_9626 with PID 22966 started at Fri Mar 31 14:40:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1110: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 22966 at Fri Mar 31 14:40:57 UTC 2017 kill -USR1 22966 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22966 killed at Fri Mar 31 14:40:57 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:40:57 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:40:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:41:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1111: Server never started - PASSED kill -0 23034 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23034 found at Fri Mar 31 14:41:03 UTC 2017 selfserv_9626 with PID 23034 started at Fri Mar 31 14:41:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1112: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 23034 at Fri Mar 31 14:41:04 UTC 2017 kill -USR1 23034 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23034 killed at Fri Mar 31 14:41:04 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:41:04 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:41:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:41:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1113: Server never started - PASSED kill -0 23115 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23115 found at Fri Mar 31 14:41:10 UTC 2017 selfserv_9626 with PID 23115 started at Fri Mar 31 14:41:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1114: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 23115 at Fri Mar 31 14:41:11 UTC 2017 kill -USR1 23115 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23115 killed at Fri Mar 31 14:41:11 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:41:11 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:41:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:41:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1115: Server never started - PASSED kill -0 23196 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23196 found at Fri Mar 31 14:41:17 UTC 2017 selfserv_9626 with PID 23196 started at Fri Mar 31 14:41:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1116: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 23196 at Fri Mar 31 14:41:18 UTC 2017 kill -USR1 23196 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23196 killed at Fri Mar 31 14:41:18 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:41:18 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:41:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:41:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1117: Server never started - PASSED kill -0 23264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23264 found at Fri Mar 31 14:41:24 UTC 2017 selfserv_9626 with PID 23264 started at Fri Mar 31 14:41:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1118: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 23264 at Fri Mar 31 14:41:25 UTC 2017 kill -USR1 23264 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23264 killed at Fri Mar 31 14:41:25 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:41:26 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:41:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:41:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1119: Server never started - PASSED kill -0 23332 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23332 found at Fri Mar 31 14:41:32 UTC 2017 selfserv_9626 with PID 23332 started at Fri Mar 31 14:41:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1120: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 23332 at Fri Mar 31 14:41:32 UTC 2017 kill -USR1 23332 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23332 killed at Fri Mar 31 14:41:32 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:41:33 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:41:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:41:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1121: Server never started - PASSED kill -0 23416 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23416 found at Fri Mar 31 14:41:39 UTC 2017 selfserv_9626 with PID 23416 started at Fri Mar 31 14:41:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1122: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 23416 at Fri Mar 31 14:41:39 UTC 2017 kill -USR1 23416 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23416 killed at Fri Mar 31 14:41:40 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:41:40 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:41:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:41:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1123: Server never started - PASSED kill -0 23484 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23484 found at Fri Mar 31 14:41:46 UTC 2017 selfserv_9626 with PID 23484 started at Fri Mar 31 14:41:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1124: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 23484 at Fri Mar 31 14:41:46 UTC 2017 kill -USR1 23484 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23484 killed at Fri Mar 31 14:41:47 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:41:47 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:41:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:41:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1125: Server never started - PASSED kill -0 23552 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23552 found at Fri Mar 31 14:41:53 UTC 2017 selfserv_9626 with PID 23552 started at Fri Mar 31 14:41:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1126: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 23552 at Fri Mar 31 14:41:53 UTC 2017 kill -USR1 23552 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23552 killed at Fri Mar 31 14:41:54 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:41:54 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:41:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:41:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1127: Server never started - PASSED kill -0 23633 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23633 found at Fri Mar 31 14:42:00 UTC 2017 selfserv_9626 with PID 23633 started at Fri Mar 31 14:42:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1128: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 23633 at Fri Mar 31 14:42:00 UTC 2017 kill -USR1 23633 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23633 killed at Fri Mar 31 14:42:01 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:42:01 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:42:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:42:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1129: Server never started - PASSED kill -0 23714 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23714 found at Fri Mar 31 14:42:07 UTC 2017 selfserv_9626 with PID 23714 started at Fri Mar 31 14:42:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1130: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 23714 at Fri Mar 31 14:42:08 UTC 2017 kill -USR1 23714 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23714 killed at Fri Mar 31 14:42:08 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:42:08 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:42:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:42:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1131: Server never started - PASSED kill -0 23782 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23782 found at Fri Mar 31 14:42:14 UTC 2017 selfserv_9626 with PID 23782 started at Fri Mar 31 14:42:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1132: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 23782 at Fri Mar 31 14:42:15 UTC 2017 kill -USR1 23782 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23782 killed at Fri Mar 31 14:42:15 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:42:15 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:42:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:42:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1133: Server never started - PASSED kill -0 23863 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23863 found at Fri Mar 31 14:42:21 UTC 2017 selfserv_9626 with PID 23863 started at Fri Mar 31 14:42:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1134: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 23863 at Fri Mar 31 14:42:22 UTC 2017 kill -USR1 23863 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23863 killed at Fri Mar 31 14:42:22 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:42:22 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:42:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:42:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1135: Server never started - PASSED kill -0 23931 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23931 found at Fri Mar 31 14:42:28 UTC 2017 selfserv_9626 with PID 23931 started at Fri Mar 31 14:42:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1136: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 23931 at Fri Mar 31 14:42:29 UTC 2017 kill -USR1 23931 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23931 killed at Fri Mar 31 14:42:29 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:42:30 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:42:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:42:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1137: Server never started - PASSED kill -0 23999 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23999 found at Fri Mar 31 14:42:35 UTC 2017 selfserv_9626 with PID 23999 started at Fri Mar 31 14:42:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1138: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 23999 at Fri Mar 31 14:42:36 UTC 2017 kill -USR1 23999 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23999 killed at Fri Mar 31 14:42:36 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:42:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:42:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:42:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1139: Server never started - PASSED kill -0 24083 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24083 found at Fri Mar 31 14:42:43 UTC 2017 selfserv_9626 with PID 24083 started at Fri Mar 31 14:42:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1140: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 24083 at Fri Mar 31 14:42:43 UTC 2017 kill -USR1 24083 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24083 killed at Fri Mar 31 14:42:44 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:42:44 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:42:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:42:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1141: Server never started - PASSED kill -0 24151 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24151 found at Fri Mar 31 14:42:50 UTC 2017 selfserv_9626 with PID 24151 started at Fri Mar 31 14:42:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1142: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 24151 at Fri Mar 31 14:42:50 UTC 2017 kill -USR1 24151 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24151 killed at Fri Mar 31 14:42:51 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:42:51 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:42:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:42:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1143: Server never started - PASSED kill -0 24219 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24219 found at Fri Mar 31 14:42:57 UTC 2017 selfserv_9626 with PID 24219 started at Fri Mar 31 14:42:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1144: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 24219 at Fri Mar 31 14:42:57 UTC 2017 kill -USR1 24219 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24219 killed at Fri Mar 31 14:42:58 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:42:58 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:42:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:43:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1145: Server never started - PASSED kill -0 24300 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24300 found at Fri Mar 31 14:43:04 UTC 2017 selfserv_9626 with PID 24300 started at Fri Mar 31 14:43:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1146: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 24300 at Fri Mar 31 14:43:04 UTC 2017 kill -USR1 24300 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24300 killed at Fri Mar 31 14:43:05 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:43:05 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:43:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:43:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1147: Server never started - PASSED kill -0 24381 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24381 found at Fri Mar 31 14:43:11 UTC 2017 selfserv_9626 with PID 24381 started at Fri Mar 31 14:43:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1148: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 24381 at Fri Mar 31 14:43:12 UTC 2017 kill -USR1 24381 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24381 killed at Fri Mar 31 14:43:12 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:43:12 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:43:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:43:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1149: Server never started - PASSED kill -0 24449 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24449 found at Fri Mar 31 14:43:18 UTC 2017 selfserv_9626 with PID 24449 started at Fri Mar 31 14:43:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1150: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 24449 at Fri Mar 31 14:43:19 UTC 2017 kill -USR1 24449 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24449 killed at Fri Mar 31 14:43:19 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:43:19 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:43:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:43:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1151: Server never started - PASSED kill -0 24530 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24530 found at Fri Mar 31 14:43:25 UTC 2017 selfserv_9626 with PID 24530 started at Fri Mar 31 14:43:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1152: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 24530 at Fri Mar 31 14:43:26 UTC 2017 kill -USR1 24530 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24530 killed at Fri Mar 31 14:43:26 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:43:26 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:43:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:43:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1153: Server never started - PASSED kill -0 24598 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24598 found at Fri Mar 31 14:43:32 UTC 2017 selfserv_9626 with PID 24598 started at Fri Mar 31 14:43:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1154: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 24598 at Fri Mar 31 14:43:33 UTC 2017 kill -USR1 24598 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24598 killed at Fri Mar 31 14:43:33 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:43:33 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:43:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:43:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1155: Server never started - PASSED kill -0 24669 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24669 found at Fri Mar 31 14:43:39 UTC 2017 selfserv_9626 with PID 24669 started at Fri Mar 31 14:43:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1156: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 24669 at Fri Mar 31 14:43:40 UTC 2017 kill -USR1 24669 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24669 killed at Fri Mar 31 14:43:40 UTC 2017 ssl.sh: Cache CRL SSL Client Tests - with ECC =============================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/authin.tl.tmp 0 selfserv_9626 starting at Fri Mar 31 14:43:40 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:43:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:43:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1157: Server never started - PASSED kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:46 UTC 2017 selfserv_9626 with PID 24745 started at Fri Mar 31 14:43:46 UTC 2017 Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:47 UTC 2017 ssl.sh: #1158: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:48 UTC 2017 ssl.sh: #1159: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:48 UTC 2017 ssl.sh: #1160: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:49 UTC 2017 ssl.sh: #1161: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:50 UTC 2017 ssl.sh: #1162: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:50 UTC 2017 ssl.sh: #1163: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:51 UTC 2017 ssl.sh: #1164: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:51 UTC 2017 ssl.sh: #1165: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:52 UTC 2017 ssl.sh: #1166: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:53 UTC 2017 ssl.sh: #1167: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:53 UTC 2017 ssl.sh: #1168: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:54 UTC 2017 ssl.sh: #1169: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:55 UTC 2017 ssl.sh: #1170: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:55 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1171: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:56 UTC 2017 ssl.sh: #1172: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:57 UTC 2017 ssl.sh: #1173: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:57 UTC 2017 ssl.sh: #1174: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:58 UTC 2017 ssl.sh: #1175: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:58 UTC 2017 ssl.sh: #1176: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:43:59 UTC 2017 ssl.sh: #1177: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:00 UTC 2017 ssl.sh: #1178: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:00 UTC 2017 ssl.sh: #1179: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:01 UTC 2017 ssl.sh: #1180: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:02 UTC 2017 ssl.sh: #1181: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:02 UTC 2017 ssl.sh: #1182: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:03 UTC 2017 ssl.sh: #1183: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:04 UTC 2017 ssl.sh: #1184: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:04 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1185: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:05 UTC 2017 ssl.sh: #1186: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:06 UTC 2017 ssl.sh: #1187: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:06 UTC 2017 ssl.sh: #1188: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:07 UTC 2017 ssl.sh: #1189: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:07 UTC 2017 ssl.sh: #1190: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:08 UTC 2017 ssl.sh: #1191: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:09 UTC 2017 ssl.sh: #1192: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:09 UTC 2017 ssl.sh: #1193: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:10 UTC 2017 ssl.sh: #1194: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:11 UTC 2017 ssl.sh: #1195: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:11 UTC 2017 ssl.sh: #1196: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:12 UTC 2017 ssl.sh: #1197: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24745 found at Fri Mar 31 14:44:13 UTC 2017 ssl.sh: #1198: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 24745 at Fri Mar 31 14:44:13 UTC 2017 kill -USR1 24745 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24745 killed at Fri Mar 31 14:44:13 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:44:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:44:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:44:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1199: Server never started - PASSED kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:19 UTC 2017 selfserv_9626 with PID 26197 started at Fri Mar 31 14:44:19 UTC 2017 Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:20 UTC 2017 ssl.sh: #1200: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:21 UTC 2017 ssl.sh: #1201: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:21 UTC 2017 ssl.sh: #1202: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:22 UTC 2017 ssl.sh: #1203: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:22 UTC 2017 ssl.sh: #1204: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:23 UTC 2017 ssl.sh: #1205: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:24 UTC 2017 ssl.sh: #1206: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:24 UTC 2017 ssl.sh: #1207: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:25 UTC 2017 ssl.sh: #1208: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:26 UTC 2017 ssl.sh: #1209: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:26 UTC 2017 ssl.sh: #1210: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:27 UTC 2017 ssl.sh: #1211: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:28 UTC 2017 ssl.sh: #1212: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:28 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1213: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:29 UTC 2017 ssl.sh: #1214: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:29 UTC 2017 ssl.sh: #1215: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:30 UTC 2017 ssl.sh: #1216: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:31 UTC 2017 ssl.sh: #1217: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:31 UTC 2017 ssl.sh: #1218: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:32 UTC 2017 ssl.sh: #1219: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:33 UTC 2017 ssl.sh: #1220: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:33 UTC 2017 ssl.sh: #1221: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:34 UTC 2017 ssl.sh: #1222: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:35 UTC 2017 ssl.sh: #1223: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:35 UTC 2017 ssl.sh: #1224: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:36 UTC 2017 ssl.sh: #1225: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:37 UTC 2017 ssl.sh: #1226: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:37 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1227: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:38 UTC 2017 ssl.sh: #1228: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:38 UTC 2017 ssl.sh: #1229: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:39 UTC 2017 ssl.sh: #1230: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:40 UTC 2017 ssl.sh: #1231: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:40 UTC 2017 ssl.sh: #1232: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:41 UTC 2017 ssl.sh: #1233: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:42 UTC 2017 ssl.sh: #1234: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:42 UTC 2017 ssl.sh: #1235: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:43 UTC 2017 ssl.sh: #1236: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:44 UTC 2017 ssl.sh: #1237: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:44 UTC 2017 ssl.sh: #1238: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:45 UTC 2017 ssl.sh: #1239: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26197 found at Fri Mar 31 14:44:46 UTC 2017 ssl.sh: #1240: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 26197 at Fri Mar 31 14:44:46 UTC 2017 kill -USR1 26197 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 26197 killed at Fri Mar 31 14:44:46 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:44:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:44:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:44:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1241: Server never started - PASSED kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:44:52 UTC 2017 selfserv_9626 with PID 27637 started at Fri Mar 31 14:44:52 UTC 2017 Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:44:53 UTC 2017 ssl.sh: #1242: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:44:53 UTC 2017 ssl.sh: #1243: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:44:54 UTC 2017 ssl.sh: #1244: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:44:55 UTC 2017 ssl.sh: #1245: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:44:55 UTC 2017 ssl.sh: #1246: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:44:56 UTC 2017 ssl.sh: #1247: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:44:57 UTC 2017 ssl.sh: #1248: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:44:57 UTC 2017 ssl.sh: #1249: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:44:58 UTC 2017 ssl.sh: #1250: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:44:58 UTC 2017 ssl.sh: #1251: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:44:59 UTC 2017 ssl.sh: #1252: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:00 UTC 2017 ssl.sh: #1253: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:00 UTC 2017 ssl.sh: #1254: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:01 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1255: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:02 UTC 2017 ssl.sh: #1256: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:02 UTC 2017 ssl.sh: #1257: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:03 UTC 2017 ssl.sh: #1258: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:04 UTC 2017 ssl.sh: #1259: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:04 UTC 2017 ssl.sh: #1260: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:05 UTC 2017 ssl.sh: #1261: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:06 UTC 2017 ssl.sh: #1262: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:06 UTC 2017 ssl.sh: #1263: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:07 UTC 2017 ssl.sh: #1264: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:08 UTC 2017 ssl.sh: #1265: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:08 UTC 2017 ssl.sh: #1266: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:09 UTC 2017 ssl.sh: #1267: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:10 UTC 2017 ssl.sh: #1268: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:10 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1269: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:11 UTC 2017 ssl.sh: #1270: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:11 UTC 2017 ssl.sh: #1271: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:12 UTC 2017 ssl.sh: #1272: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:13 UTC 2017 ssl.sh: #1273: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:13 UTC 2017 ssl.sh: #1274: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:14 UTC 2017 ssl.sh: #1275: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:14 UTC 2017 ssl.sh: #1276: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:15 UTC 2017 ssl.sh: #1277: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:16 UTC 2017 ssl.sh: #1278: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:16 UTC 2017 ssl.sh: #1279: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:17 UTC 2017 ssl.sh: #1280: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:18 UTC 2017 ssl.sh: #1281: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27637 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27637 found at Fri Mar 31 14:45:19 UTC 2017 ssl.sh: #1282: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 27637 at Fri Mar 31 14:45:19 UTC 2017 kill -USR1 27637 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 27637 killed at Fri Mar 31 14:45:19 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:45:19 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:45:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:45:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1283: Server never started - PASSED kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:25 UTC 2017 selfserv_9626 with PID 29086 started at Fri Mar 31 14:45:25 UTC 2017 Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:26 UTC 2017 ssl.sh: #1284: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:26 UTC 2017 ssl.sh: #1285: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:27 UTC 2017 ssl.sh: #1286: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:28 UTC 2017 ssl.sh: #1287: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:28 UTC 2017 ssl.sh: #1288: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:29 UTC 2017 ssl.sh: #1289: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:29 UTC 2017 ssl.sh: #1290: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:30 UTC 2017 ssl.sh: #1291: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:31 UTC 2017 ssl.sh: #1292: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:31 UTC 2017 ssl.sh: #1293: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:32 UTC 2017 ssl.sh: #1294: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:33 UTC 2017 ssl.sh: #1295: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:33 UTC 2017 ssl.sh: #1296: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:34 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1297: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:35 UTC 2017 ssl.sh: #1298: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:35 UTC 2017 ssl.sh: #1299: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:36 UTC 2017 ssl.sh: #1300: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:36 UTC 2017 ssl.sh: #1301: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:37 UTC 2017 ssl.sh: #1302: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:38 UTC 2017 ssl.sh: #1303: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:38 UTC 2017 ssl.sh: #1304: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:39 UTC 2017 ssl.sh: #1305: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:40 UTC 2017 ssl.sh: #1306: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:40 UTC 2017 ssl.sh: #1307: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:41 UTC 2017 ssl.sh: #1308: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:42 UTC 2017 ssl.sh: #1309: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:42 UTC 2017 ssl.sh: #1310: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:43 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1311: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:44 UTC 2017 ssl.sh: #1312: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:44 UTC 2017 ssl.sh: #1313: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:45 UTC 2017 ssl.sh: #1314: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:45 UTC 2017 ssl.sh: #1315: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:46 UTC 2017 ssl.sh: #1316: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:47 UTC 2017 ssl.sh: #1317: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:47 UTC 2017 ssl.sh: #1318: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:48 UTC 2017 ssl.sh: #1319: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:49 UTC 2017 ssl.sh: #1320: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:49 UTC 2017 ssl.sh: #1321: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:50 UTC 2017 ssl.sh: #1322: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:51 UTC 2017 ssl.sh: #1323: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29086 found at Fri Mar 31 14:45:51 UTC 2017 ssl.sh: #1324: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 29086 at Fri Mar 31 14:45:51 UTC 2017 kill -USR1 29086 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29086 killed at Fri Mar 31 14:45:52 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:45:52 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:45:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:45:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1325: Server never started - PASSED kill -0 30524 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30524 found at Fri Mar 31 14:45:58 UTC 2017 selfserv_9626 with PID 30524 started at Fri Mar 31 14:45:58 UTC 2017 trying to kill selfserv_9626 with PID 30524 at Fri Mar 31 14:45:58 UTC 2017 kill -USR1 30524 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30524 killed at Fri Mar 31 14:45:58 UTC 2017 selfserv_9626 starting at Fri Mar 31 14:45:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:45:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:46:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1326: Server never started - PASSED kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:04 UTC 2017 selfserv_9626 with PID 30579 started at Fri Mar 31 14:46:05 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:05 UTC 2017 ssl.sh: #1327: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:06 UTC 2017 ssl.sh: #1328: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:06 UTC 2017 ssl.sh: #1329: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:07 UTC 2017 ssl.sh: #1330: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:08 UTC 2017 ssl.sh: #1331: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:08 UTC 2017 ssl.sh: #1332: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:09 UTC 2017 ssl.sh: #1333: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:10 UTC 2017 ssl.sh: #1334: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:10 UTC 2017 ssl.sh: #1335: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:11 UTC 2017 ssl.sh: #1336: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:11 UTC 2017 ssl.sh: #1337: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:12 UTC 2017 ssl.sh: #1338: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:13 UTC 2017 ssl.sh: #1339: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:13 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1340: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:14 UTC 2017 ssl.sh: #1341: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:15 UTC 2017 ssl.sh: #1342: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:15 UTC 2017 ssl.sh: #1343: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:16 UTC 2017 ssl.sh: #1344: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:17 UTC 2017 ssl.sh: #1345: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:17 UTC 2017 ssl.sh: #1346: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:18 UTC 2017 ssl.sh: #1347: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:18 UTC 2017 ssl.sh: #1348: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:19 UTC 2017 ssl.sh: #1349: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:20 UTC 2017 ssl.sh: #1350: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:20 UTC 2017 ssl.sh: #1351: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:21 UTC 2017 ssl.sh: #1352: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:22 UTC 2017 ssl.sh: #1353: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:22 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1354: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:23 UTC 2017 ssl.sh: #1355: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:24 UTC 2017 ssl.sh: #1356: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:24 UTC 2017 ssl.sh: #1357: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:25 UTC 2017 ssl.sh: #1358: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:25 UTC 2017 ssl.sh: #1359: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:26 UTC 2017 ssl.sh: #1360: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:27 UTC 2017 ssl.sh: #1361: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:27 UTC 2017 ssl.sh: #1362: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:28 UTC 2017 ssl.sh: #1363: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:29 UTC 2017 ssl.sh: #1364: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:29 UTC 2017 ssl.sh: #1365: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:30 UTC 2017 ssl.sh: #1366: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30579 found at Fri Mar 31 14:46:31 UTC 2017 ssl.sh: #1367: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 30579 at Fri Mar 31 14:46:31 UTC 2017 kill -USR1 30579 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30579 killed at Fri Mar 31 14:46:31 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:46:31 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:46:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:46:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1368: Server never started - PASSED kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:37 UTC 2017 selfserv_9626 with PID 32030 started at Fri Mar 31 14:46:37 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:38 UTC 2017 ssl.sh: #1369: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:39 UTC 2017 ssl.sh: #1370: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:39 UTC 2017 ssl.sh: #1371: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:40 UTC 2017 ssl.sh: #1372: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:40 UTC 2017 ssl.sh: #1373: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:41 UTC 2017 ssl.sh: #1374: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:42 UTC 2017 ssl.sh: #1375: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:42 UTC 2017 ssl.sh: #1376: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:43 UTC 2017 ssl.sh: #1377: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:44 UTC 2017 ssl.sh: #1378: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:44 UTC 2017 ssl.sh: #1379: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:45 UTC 2017 ssl.sh: #1380: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:46 UTC 2017 ssl.sh: #1381: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:46 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1382: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:47 UTC 2017 ssl.sh: #1383: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:48 UTC 2017 ssl.sh: #1384: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:48 UTC 2017 ssl.sh: #1385: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:49 UTC 2017 ssl.sh: #1386: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:49 UTC 2017 ssl.sh: #1387: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:50 UTC 2017 ssl.sh: #1388: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:51 UTC 2017 ssl.sh: #1389: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:51 UTC 2017 ssl.sh: #1390: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:52 UTC 2017 ssl.sh: #1391: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:53 UTC 2017 ssl.sh: #1392: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:53 UTC 2017 ssl.sh: #1393: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:54 UTC 2017 ssl.sh: #1394: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:55 UTC 2017 ssl.sh: #1395: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:55 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1396: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:56 UTC 2017 ssl.sh: #1397: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:56 UTC 2017 ssl.sh: #1398: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:57 UTC 2017 ssl.sh: #1399: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:58 UTC 2017 ssl.sh: #1400: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:58 UTC 2017 ssl.sh: #1401: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:46:59 UTC 2017 ssl.sh: #1402: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:47:00 UTC 2017 ssl.sh: #1403: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:47:00 UTC 2017 ssl.sh: #1404: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:47:01 UTC 2017 ssl.sh: #1405: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:47:02 UTC 2017 ssl.sh: #1406: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:47:02 UTC 2017 ssl.sh: #1407: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:47:03 UTC 2017 ssl.sh: #1408: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 32030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32030 found at Fri Mar 31 14:47:04 UTC 2017 ssl.sh: #1409: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 32030 at Fri Mar 31 14:47:04 UTC 2017 kill -USR1 32030 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32030 killed at Fri Mar 31 14:47:04 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:47:04 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:47:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:47:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1410: Server never started - PASSED kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:10 UTC 2017 selfserv_9626 with PID 1019 started at Fri Mar 31 14:47:10 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:11 UTC 2017 ssl.sh: #1411: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:12 UTC 2017 ssl.sh: #1412: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:12 UTC 2017 ssl.sh: #1413: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:13 UTC 2017 ssl.sh: #1414: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:13 UTC 2017 ssl.sh: #1415: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:14 UTC 2017 ssl.sh: #1416: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:15 UTC 2017 ssl.sh: #1417: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:15 UTC 2017 ssl.sh: #1418: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:16 UTC 2017 ssl.sh: #1419: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:17 UTC 2017 ssl.sh: #1420: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:17 UTC 2017 ssl.sh: #1421: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:18 UTC 2017 ssl.sh: #1422: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:19 UTC 2017 ssl.sh: #1423: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:19 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:20 UTC 2017 ssl.sh: #1425: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:20 UTC 2017 ssl.sh: #1426: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:21 UTC 2017 ssl.sh: #1427: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:22 UTC 2017 ssl.sh: #1428: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:22 UTC 2017 ssl.sh: #1429: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:23 UTC 2017 ssl.sh: #1430: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:24 UTC 2017 ssl.sh: #1431: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:24 UTC 2017 ssl.sh: #1432: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:25 UTC 2017 ssl.sh: #1433: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:26 UTC 2017 ssl.sh: #1434: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:26 UTC 2017 ssl.sh: #1435: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:27 UTC 2017 ssl.sh: #1436: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:28 UTC 2017 ssl.sh: #1437: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:28 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:29 UTC 2017 ssl.sh: #1439: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:29 UTC 2017 ssl.sh: #1440: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:30 UTC 2017 ssl.sh: #1441: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:31 UTC 2017 ssl.sh: #1442: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:31 UTC 2017 ssl.sh: #1443: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:32 UTC 2017 ssl.sh: #1444: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:33 UTC 2017 ssl.sh: #1445: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:33 UTC 2017 ssl.sh: #1446: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:34 UTC 2017 ssl.sh: #1447: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:35 UTC 2017 ssl.sh: #1448: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:35 UTC 2017 ssl.sh: #1449: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:36 UTC 2017 ssl.sh: #1450: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1019 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1019 found at Fri Mar 31 14:47:37 UTC 2017 ssl.sh: #1451: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 1019 at Fri Mar 31 14:47:37 UTC 2017 kill -USR1 1019 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1019 killed at Fri Mar 31 14:47:37 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:47:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:47:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:47:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1452: Server never started - PASSED kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:43 UTC 2017 selfserv_9626 with PID 2492 started at Fri Mar 31 14:47:43 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:44 UTC 2017 ssl.sh: #1453: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:44 UTC 2017 ssl.sh: #1454: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:45 UTC 2017 ssl.sh: #1455: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:46 UTC 2017 ssl.sh: #1456: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:46 UTC 2017 ssl.sh: #1457: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:47 UTC 2017 ssl.sh: #1458: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:48 UTC 2017 ssl.sh: #1459: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:48 UTC 2017 ssl.sh: #1460: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:49 UTC 2017 ssl.sh: #1461: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:50 UTC 2017 ssl.sh: #1462: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:50 UTC 2017 ssl.sh: #1463: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:51 UTC 2017 ssl.sh: #1464: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:52 UTC 2017 ssl.sh: #1465: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:52 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1466: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:53 UTC 2017 ssl.sh: #1467: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:53 UTC 2017 ssl.sh: #1468: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:54 UTC 2017 ssl.sh: #1469: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:55 UTC 2017 ssl.sh: #1470: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:55 UTC 2017 ssl.sh: #1471: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:56 UTC 2017 ssl.sh: #1472: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:57 UTC 2017 ssl.sh: #1473: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:57 UTC 2017 ssl.sh: #1474: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:58 UTC 2017 ssl.sh: #1475: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:59 UTC 2017 ssl.sh: #1476: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:47:59 UTC 2017 ssl.sh: #1477: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:48:00 UTC 2017 ssl.sh: #1478: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:48:01 UTC 2017 ssl.sh: #1479: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:48:01 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1480: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:48:02 UTC 2017 ssl.sh: #1481: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:48:02 UTC 2017 ssl.sh: #1482: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:48:03 UTC 2017 ssl.sh: #1483: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:48:04 UTC 2017 ssl.sh: #1484: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:48:04 UTC 2017 ssl.sh: #1485: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:48:05 UTC 2017 ssl.sh: #1486: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:48:06 UTC 2017 ssl.sh: #1487: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:48:06 UTC 2017 ssl.sh: #1488: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:48:07 UTC 2017 ssl.sh: #1489: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:48:08 UTC 2017 ssl.sh: #1490: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:48:08 UTC 2017 ssl.sh: #1491: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:48:09 UTC 2017 ssl.sh: #1492: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 2492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2492 found at Fri Mar 31 14:48:10 UTC 2017 ssl.sh: #1493: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 2492 at Fri Mar 31 14:48:10 UTC 2017 kill -USR1 2492 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2492 killed at Fri Mar 31 14:48:10 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:48:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:48:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:48:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1494: Server never started - PASSED kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:16 UTC 2017 selfserv_9626 with PID 3994 started at Fri Mar 31 14:48:16 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:17 UTC 2017 ssl.sh: #1495: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:17 UTC 2017 ssl.sh: #1496: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:18 UTC 2017 ssl.sh: #1497: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:19 UTC 2017 ssl.sh: #1498: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:19 UTC 2017 ssl.sh: #1499: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:20 UTC 2017 ssl.sh: #1500: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:21 UTC 2017 ssl.sh: #1501: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:21 UTC 2017 ssl.sh: #1502: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:22 UTC 2017 ssl.sh: #1503: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:23 UTC 2017 ssl.sh: #1504: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:23 UTC 2017 ssl.sh: #1505: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:24 UTC 2017 ssl.sh: #1506: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:25 UTC 2017 ssl.sh: #1507: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:25 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1508: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:26 UTC 2017 ssl.sh: #1509: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:26 UTC 2017 ssl.sh: #1510: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:27 UTC 2017 ssl.sh: #1511: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:28 UTC 2017 ssl.sh: #1512: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:28 UTC 2017 ssl.sh: #1513: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:29 UTC 2017 ssl.sh: #1514: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:30 UTC 2017 ssl.sh: #1515: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:30 UTC 2017 ssl.sh: #1516: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:31 UTC 2017 ssl.sh: #1517: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:32 UTC 2017 ssl.sh: #1518: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:32 UTC 2017 ssl.sh: #1519: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:33 UTC 2017 ssl.sh: #1520: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:34 UTC 2017 ssl.sh: #1521: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:34 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1522: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:35 UTC 2017 ssl.sh: #1523: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:35 UTC 2017 ssl.sh: #1524: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:36 UTC 2017 ssl.sh: #1525: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:37 UTC 2017 ssl.sh: #1526: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:37 UTC 2017 ssl.sh: #1527: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:38 UTC 2017 ssl.sh: #1528: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:39 UTC 2017 ssl.sh: #1529: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:39 UTC 2017 ssl.sh: #1530: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:40 UTC 2017 ssl.sh: #1531: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:41 UTC 2017 ssl.sh: #1532: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:41 UTC 2017 ssl.sh: #1533: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:42 UTC 2017 ssl.sh: #1534: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3994 found at Fri Mar 31 14:48:43 UTC 2017 ssl.sh: #1535: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 3994 at Fri Mar 31 14:48:43 UTC 2017 kill -USR1 3994 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 3994 killed at Fri Mar 31 14:48:43 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:48:43 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:48:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:48:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1536: Server never started - PASSED kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:48:49 UTC 2017 selfserv_9626 with PID 5435 started at Fri Mar 31 14:48:49 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:48:50 UTC 2017 ssl.sh: #1537: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:48:50 UTC 2017 ssl.sh: #1538: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:48:51 UTC 2017 ssl.sh: #1539: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:48:52 UTC 2017 ssl.sh: #1540: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:48:52 UTC 2017 ssl.sh: #1541: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:48:53 UTC 2017 ssl.sh: #1542: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:48:54 UTC 2017 ssl.sh: #1543: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:48:54 UTC 2017 ssl.sh: #1544: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:48:55 UTC 2017 ssl.sh: #1545: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:48:56 UTC 2017 ssl.sh: #1546: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:48:56 UTC 2017 ssl.sh: #1547: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:48:57 UTC 2017 ssl.sh: #1548: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:48:58 UTC 2017 ssl.sh: #1549: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:48:58 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1550: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:48:59 UTC 2017 ssl.sh: #1551: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:48:59 UTC 2017 ssl.sh: #1552: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:00 UTC 2017 ssl.sh: #1553: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:01 UTC 2017 ssl.sh: #1554: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:01 UTC 2017 ssl.sh: #1555: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:02 UTC 2017 ssl.sh: #1556: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:03 UTC 2017 ssl.sh: #1557: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:03 UTC 2017 ssl.sh: #1558: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:04 UTC 2017 ssl.sh: #1559: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:05 UTC 2017 ssl.sh: #1560: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:05 UTC 2017 ssl.sh: #1561: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:06 UTC 2017 ssl.sh: #1562: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:07 UTC 2017 ssl.sh: #1563: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:07 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1564: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:08 UTC 2017 ssl.sh: #1565: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:08 UTC 2017 ssl.sh: #1566: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:09 UTC 2017 ssl.sh: #1567: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:10 UTC 2017 ssl.sh: #1568: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:10 UTC 2017 ssl.sh: #1569: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:11 UTC 2017 ssl.sh: #1570: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:12 UTC 2017 ssl.sh: #1571: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:12 UTC 2017 ssl.sh: #1572: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:13 UTC 2017 ssl.sh: #1573: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:14 UTC 2017 ssl.sh: #1574: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:14 UTC 2017 ssl.sh: #1575: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:15 UTC 2017 ssl.sh: #1576: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 5435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5435 found at Fri Mar 31 14:49:16 UTC 2017 ssl.sh: #1577: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 5435 at Fri Mar 31 14:49:16 UTC 2017 kill -USR1 5435 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5435 killed at Fri Mar 31 14:49:16 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:49:16 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:49:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:49:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1578: Server never started - PASSED kill -0 6884 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6884 found at Fri Mar 31 14:49:22 UTC 2017 selfserv_9626 with PID 6884 started at Fri Mar 31 14:49:22 UTC 2017 trying to kill selfserv_9626 with PID 6884 at Fri Mar 31 14:49:22 UTC 2017 kill -USR1 6884 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6884 killed at Fri Mar 31 14:49:23 UTC 2017 selfserv_9626 starting at Fri Mar 31 14:49:23 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:49:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:49:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1579: Server never started - PASSED kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:29 UTC 2017 selfserv_9626 with PID 6938 started at Fri Mar 31 14:49:29 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:29 UTC 2017 ssl.sh: #1580: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:30 UTC 2017 ssl.sh: #1581: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:31 UTC 2017 ssl.sh: #1582: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:31 UTC 2017 ssl.sh: #1583: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:32 UTC 2017 ssl.sh: #1584: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:33 UTC 2017 ssl.sh: #1585: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:33 UTC 2017 ssl.sh: #1586: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:34 UTC 2017 ssl.sh: #1587: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:35 UTC 2017 ssl.sh: #1588: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:35 UTC 2017 ssl.sh: #1589: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:36 UTC 2017 ssl.sh: #1590: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:37 UTC 2017 ssl.sh: #1591: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:37 UTC 2017 ssl.sh: #1592: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:38 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1593: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:38 UTC 2017 ssl.sh: #1594: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:39 UTC 2017 ssl.sh: #1595: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:40 UTC 2017 ssl.sh: #1596: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:40 UTC 2017 ssl.sh: #1597: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:41 UTC 2017 ssl.sh: #1598: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:42 UTC 2017 ssl.sh: #1599: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:42 UTC 2017 ssl.sh: #1600: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:43 UTC 2017 ssl.sh: #1601: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:44 UTC 2017 ssl.sh: #1602: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:44 UTC 2017 ssl.sh: #1603: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:45 UTC 2017 ssl.sh: #1604: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:46 UTC 2017 ssl.sh: #1605: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:46 UTC 2017 ssl.sh: #1606: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:47 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1607: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:47 UTC 2017 ssl.sh: #1608: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:48 UTC 2017 ssl.sh: #1609: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:49 UTC 2017 ssl.sh: #1610: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:49 UTC 2017 ssl.sh: #1611: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:50 UTC 2017 ssl.sh: #1612: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:51 UTC 2017 ssl.sh: #1613: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:51 UTC 2017 ssl.sh: #1614: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:52 UTC 2017 ssl.sh: #1615: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:53 UTC 2017 ssl.sh: #1616: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:53 UTC 2017 ssl.sh: #1617: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:54 UTC 2017 ssl.sh: #1618: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:55 UTC 2017 ssl.sh: #1619: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6938 found at Fri Mar 31 14:49:55 UTC 2017 ssl.sh: #1620: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 6938 at Fri Mar 31 14:49:55 UTC 2017 kill -USR1 6938 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6938 killed at Fri Mar 31 14:49:56 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:49:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:49:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:50:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1621: Server never started - PASSED kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:02 UTC 2017 selfserv_9626 with PID 8377 started at Fri Mar 31 14:50:02 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:02 UTC 2017 ssl.sh: #1622: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:03 UTC 2017 ssl.sh: #1623: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:04 UTC 2017 ssl.sh: #1624: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:04 UTC 2017 ssl.sh: #1625: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:05 UTC 2017 ssl.sh: #1626: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:06 UTC 2017 ssl.sh: #1627: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:06 UTC 2017 ssl.sh: #1628: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:07 UTC 2017 ssl.sh: #1629: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:08 UTC 2017 ssl.sh: #1630: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:08 UTC 2017 ssl.sh: #1631: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:09 UTC 2017 ssl.sh: #1632: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:10 UTC 2017 ssl.sh: #1633: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:10 UTC 2017 ssl.sh: #1634: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:11 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1635: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:11 UTC 2017 ssl.sh: #1636: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:12 UTC 2017 ssl.sh: #1637: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:13 UTC 2017 ssl.sh: #1638: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:13 UTC 2017 ssl.sh: #1639: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:14 UTC 2017 ssl.sh: #1640: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:15 UTC 2017 ssl.sh: #1641: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:15 UTC 2017 ssl.sh: #1642: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:16 UTC 2017 ssl.sh: #1643: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:17 UTC 2017 ssl.sh: #1644: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:17 UTC 2017 ssl.sh: #1645: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:18 UTC 2017 ssl.sh: #1646: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:19 UTC 2017 ssl.sh: #1647: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:19 UTC 2017 ssl.sh: #1648: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:20 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1649: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:20 UTC 2017 ssl.sh: #1650: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:21 UTC 2017 ssl.sh: #1651: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:22 UTC 2017 ssl.sh: #1652: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:22 UTC 2017 ssl.sh: #1653: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:23 UTC 2017 ssl.sh: #1654: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:24 UTC 2017 ssl.sh: #1655: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:24 UTC 2017 ssl.sh: #1656: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:25 UTC 2017 ssl.sh: #1657: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:26 UTC 2017 ssl.sh: #1658: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:26 UTC 2017 ssl.sh: #1659: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:27 UTC 2017 ssl.sh: #1660: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:28 UTC 2017 ssl.sh: #1661: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8377 found at Fri Mar 31 14:50:28 UTC 2017 ssl.sh: #1662: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 8377 at Fri Mar 31 14:50:28 UTC 2017 kill -USR1 8377 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8377 killed at Fri Mar 31 14:50:29 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:50:29 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:50:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:50:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1663: Server never started - PASSED kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:35 UTC 2017 selfserv_9626 with PID 9828 started at Fri Mar 31 14:50:35 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:36 UTC 2017 ssl.sh: #1664: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:36 UTC 2017 ssl.sh: #1665: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:37 UTC 2017 ssl.sh: #1666: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:37 UTC 2017 ssl.sh: #1667: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:38 UTC 2017 ssl.sh: #1668: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:39 UTC 2017 ssl.sh: #1669: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:39 UTC 2017 ssl.sh: #1670: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:40 UTC 2017 ssl.sh: #1671: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:41 UTC 2017 ssl.sh: #1672: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:41 UTC 2017 ssl.sh: #1673: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:42 UTC 2017 ssl.sh: #1674: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:43 UTC 2017 ssl.sh: #1675: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:43 UTC 2017 ssl.sh: #1676: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:44 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1677: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:44 UTC 2017 ssl.sh: #1678: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:45 UTC 2017 ssl.sh: #1679: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:46 UTC 2017 ssl.sh: #1680: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:46 UTC 2017 ssl.sh: #1681: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:47 UTC 2017 ssl.sh: #1682: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:48 UTC 2017 ssl.sh: #1683: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:48 UTC 2017 ssl.sh: #1684: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:49 UTC 2017 ssl.sh: #1685: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:50 UTC 2017 ssl.sh: #1686: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:50 UTC 2017 ssl.sh: #1687: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:51 UTC 2017 ssl.sh: #1688: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:52 UTC 2017 ssl.sh: #1689: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:52 UTC 2017 ssl.sh: #1690: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:53 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1691: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:53 UTC 2017 ssl.sh: #1692: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:54 UTC 2017 ssl.sh: #1693: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:55 UTC 2017 ssl.sh: #1694: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:55 UTC 2017 ssl.sh: #1695: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:56 UTC 2017 ssl.sh: #1696: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:57 UTC 2017 ssl.sh: #1697: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:57 UTC 2017 ssl.sh: #1698: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:58 UTC 2017 ssl.sh: #1699: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:59 UTC 2017 ssl.sh: #1700: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:50:59 UTC 2017 ssl.sh: #1701: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:51:00 UTC 2017 ssl.sh: #1702: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:51:01 UTC 2017 ssl.sh: #1703: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9828 found at Fri Mar 31 14:51:01 UTC 2017 ssl.sh: #1704: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 9828 at Fri Mar 31 14:51:01 UTC 2017 kill -USR1 9828 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9828 killed at Fri Mar 31 14:51:02 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:51:02 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:51:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:51:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1705: Server never started - PASSED kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:08 UTC 2017 selfserv_9626 with PID 11279 started at Fri Mar 31 14:51:08 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:09 UTC 2017 ssl.sh: #1706: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:09 UTC 2017 ssl.sh: #1707: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:10 UTC 2017 ssl.sh: #1708: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:10 UTC 2017 ssl.sh: #1709: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:11 UTC 2017 ssl.sh: #1710: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:12 UTC 2017 ssl.sh: #1711: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:12 UTC 2017 ssl.sh: #1712: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:13 UTC 2017 ssl.sh: #1713: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:14 UTC 2017 ssl.sh: #1714: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:14 UTC 2017 ssl.sh: #1715: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:15 UTC 2017 ssl.sh: #1716: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:16 UTC 2017 ssl.sh: #1717: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:16 UTC 2017 ssl.sh: #1718: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:17 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1719: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:18 UTC 2017 ssl.sh: #1720: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:18 UTC 2017 ssl.sh: #1721: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:19 UTC 2017 ssl.sh: #1722: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:19 UTC 2017 ssl.sh: #1723: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:20 UTC 2017 ssl.sh: #1724: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:21 UTC 2017 ssl.sh: #1725: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:21 UTC 2017 ssl.sh: #1726: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:22 UTC 2017 ssl.sh: #1727: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:23 UTC 2017 ssl.sh: #1728: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:23 UTC 2017 ssl.sh: #1729: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:24 UTC 2017 ssl.sh: #1730: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:25 UTC 2017 ssl.sh: #1731: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:25 UTC 2017 ssl.sh: #1732: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:26 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1733: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:27 UTC 2017 ssl.sh: #1734: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:27 UTC 2017 ssl.sh: #1735: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:28 UTC 2017 ssl.sh: #1736: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:28 UTC 2017 ssl.sh: #1737: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:29 UTC 2017 ssl.sh: #1738: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:30 UTC 2017 ssl.sh: #1739: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:30 UTC 2017 ssl.sh: #1740: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:31 UTC 2017 ssl.sh: #1741: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:32 UTC 2017 ssl.sh: #1742: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:32 UTC 2017 ssl.sh: #1743: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:33 UTC 2017 ssl.sh: #1744: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:34 UTC 2017 ssl.sh: #1745: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11279 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11279 found at Fri Mar 31 14:51:34 UTC 2017 ssl.sh: #1746: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 11279 at Fri Mar 31 14:51:35 UTC 2017 kill -USR1 11279 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 11279 killed at Fri Mar 31 14:51:35 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:51:35 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:51:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:51:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1747: Server never started - PASSED kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:41 UTC 2017 selfserv_9626 with PID 12719 started at Fri Mar 31 14:51:41 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:42 UTC 2017 ssl.sh: #1748: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:42 UTC 2017 ssl.sh: #1749: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:43 UTC 2017 ssl.sh: #1750: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:43 UTC 2017 ssl.sh: #1751: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:44 UTC 2017 ssl.sh: #1752: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:45 UTC 2017 ssl.sh: #1753: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:45 UTC 2017 ssl.sh: #1754: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:46 UTC 2017 ssl.sh: #1755: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:47 UTC 2017 ssl.sh: #1756: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:47 UTC 2017 ssl.sh: #1757: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:48 UTC 2017 ssl.sh: #1758: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:49 UTC 2017 ssl.sh: #1759: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:49 UTC 2017 ssl.sh: #1760: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:50 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1761: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:51 UTC 2017 ssl.sh: #1762: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:51 UTC 2017 ssl.sh: #1763: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:52 UTC 2017 ssl.sh: #1764: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:52 UTC 2017 ssl.sh: #1765: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:53 UTC 2017 ssl.sh: #1766: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:54 UTC 2017 ssl.sh: #1767: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:54 UTC 2017 ssl.sh: #1768: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:55 UTC 2017 ssl.sh: #1769: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:56 UTC 2017 ssl.sh: #1770: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:56 UTC 2017 ssl.sh: #1771: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:57 UTC 2017 ssl.sh: #1772: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:58 UTC 2017 ssl.sh: #1773: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:58 UTC 2017 ssl.sh: #1774: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:51:59 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1775: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:52:00 UTC 2017 ssl.sh: #1776: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:52:00 UTC 2017 ssl.sh: #1777: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:52:01 UTC 2017 ssl.sh: #1778: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:52:02 UTC 2017 ssl.sh: #1779: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:52:02 UTC 2017 ssl.sh: #1780: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:52:03 UTC 2017 ssl.sh: #1781: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:52:04 UTC 2017 ssl.sh: #1782: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:52:04 UTC 2017 ssl.sh: #1783: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:52:05 UTC 2017 ssl.sh: #1784: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:52:05 UTC 2017 ssl.sh: #1785: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:52:06 UTC 2017 ssl.sh: #1786: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:52:07 UTC 2017 ssl.sh: #1787: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12719 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12719 found at Fri Mar 31 14:52:08 UTC 2017 ssl.sh: #1788: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 12719 at Fri Mar 31 14:52:08 UTC 2017 kill -USR1 12719 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12719 killed at Fri Mar 31 14:52:08 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:52:08 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:52:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:52:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1789: Server never started - PASSED kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:14 UTC 2017 selfserv_9626 with PID 14169 started at Fri Mar 31 14:52:14 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:15 UTC 2017 ssl.sh: #1790: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:15 UTC 2017 ssl.sh: #1791: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:16 UTC 2017 ssl.sh: #1792: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:17 UTC 2017 ssl.sh: #1793: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:17 UTC 2017 ssl.sh: #1794: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:18 UTC 2017 ssl.sh: #1795: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:19 UTC 2017 ssl.sh: #1796: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:19 UTC 2017 ssl.sh: #1797: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:20 UTC 2017 ssl.sh: #1798: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:21 UTC 2017 ssl.sh: #1799: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:21 UTC 2017 ssl.sh: #1800: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:22 UTC 2017 ssl.sh: #1801: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:23 UTC 2017 ssl.sh: #1802: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:23 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1803: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:24 UTC 2017 ssl.sh: #1804: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:24 UTC 2017 ssl.sh: #1805: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:25 UTC 2017 ssl.sh: #1806: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:26 UTC 2017 ssl.sh: #1807: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:26 UTC 2017 ssl.sh: #1808: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:27 UTC 2017 ssl.sh: #1809: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:28 UTC 2017 ssl.sh: #1810: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:28 UTC 2017 ssl.sh: #1811: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:29 UTC 2017 ssl.sh: #1812: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:30 UTC 2017 ssl.sh: #1813: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:30 UTC 2017 ssl.sh: #1814: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:31 UTC 2017 ssl.sh: #1815: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:32 UTC 2017 ssl.sh: #1816: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:32 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1817: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:33 UTC 2017 ssl.sh: #1818: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:33 UTC 2017 ssl.sh: #1819: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:34 UTC 2017 ssl.sh: #1820: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:35 UTC 2017 ssl.sh: #1821: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:35 UTC 2017 ssl.sh: #1822: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:36 UTC 2017 ssl.sh: #1823: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:37 UTC 2017 ssl.sh: #1824: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:37 UTC 2017 ssl.sh: #1825: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:38 UTC 2017 ssl.sh: #1826: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:39 UTC 2017 ssl.sh: #1827: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:39 UTC 2017 ssl.sh: #1828: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:40 UTC 2017 ssl.sh: #1829: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14169 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14169 found at Fri Mar 31 14:52:41 UTC 2017 ssl.sh: #1830: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 14169 at Fri Mar 31 14:52:41 UTC 2017 kill -USR1 14169 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14169 killed at Fri Mar 31 14:52:41 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:52:41 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:52:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:52:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1831: Server never started - PASSED kill -0 15611 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15611 found at Fri Mar 31 14:52:47 UTC 2017 selfserv_9626 with PID 15611 started at Fri Mar 31 14:52:47 UTC 2017 trying to kill selfserv_9626 with PID 15611 at Fri Mar 31 14:52:47 UTC 2017 kill -USR1 15611 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15611 killed at Fri Mar 31 14:52:48 UTC 2017 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -fips true -force FIPS mode enabled. ssl.sh: #1832: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -list ssl.sh: #1833: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1834: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -fips true -force FIPS mode enabled. ssl.sh: #1835: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -list ssl.sh: #1836: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1837: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal - with ECC =============================== selfserv_9626 starting at Fri Mar 31 14:52:50 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:52:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:52:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1838: Server never started - PASSED kill -0 15734 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15734 found at Fri Mar 31 14:52:56 UTC 2017 selfserv_9626 with PID 15734 started at Fri Mar 31 14:52:56 UTC 2017 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1839: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1840: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1841: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1842: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1843: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1844: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1845: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1846: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1847: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1848: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1849: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1850: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1851: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1852: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1853: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1854: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1855: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1856: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1857: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1858: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1859: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1860: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1861: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1862: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1863: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1864: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1865: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1866: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1867: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1868: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1869: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1870: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1871: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1872: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1873: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1874: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1875: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1876: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1877: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1878: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1879: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1880: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1881: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1882: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1883: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1884: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1885: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1886: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1887: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1888: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1889: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1890: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1891: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1892: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1893: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1894: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1895: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1896: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1897: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1898: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1899: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1900: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1901: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1902: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1903: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1904: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1905: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1906: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1907: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1908: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1909: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1910: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1911: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1912: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1913: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1914: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1915: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1916: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1917: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1918: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1919: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1920: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1921: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1922: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1923: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1924: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1925: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1926: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1927: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1928: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1929: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1930: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1931: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1932: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1933: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1934: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1935: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1936: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1937: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1938: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1939: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1940: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1941: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1942: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1943: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1944: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1945: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1946: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1947: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1948: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1949: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1950: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1951: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1952: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1953: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1954: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1955: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1956: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 15734 at Fri Mar 31 14:54:01 UTC 2017 kill -USR1 15734 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15734 killed at Fri Mar 31 14:54:01 UTC 2017 ssl.sh: SSL Client Authentication - server fips/client normal - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:54:02 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:54:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:54:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1957: Server never started - PASSED kill -0 18001 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18001 found at Fri Mar 31 14:54:08 UTC 2017 selfserv_9626 with PID 18001 started at Fri Mar 31 14:54:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1958: TLS Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 18001 at Fri Mar 31 14:54:08 UTC 2017 kill -USR1 18001 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18001 killed at Fri Mar 31 14:54:09 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:54:09 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:54:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:54:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1959: Server never started - PASSED kill -0 18075 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18075 found at Fri Mar 31 14:54:15 UTC 2017 selfserv_9626 with PID 18075 started at Fri Mar 31 14:54:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1960: TLS Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 18075 at Fri Mar 31 14:54:15 UTC 2017 kill -USR1 18075 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18075 killed at Fri Mar 31 14:54:16 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:54:16 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:54:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:54:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1961: Server never started - PASSED kill -0 18145 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18145 found at Fri Mar 31 14:54:22 UTC 2017 selfserv_9626 with PID 18145 started at Fri Mar 31 14:54:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1962: TLS Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 18145 at Fri Mar 31 14:54:22 UTC 2017 kill -USR1 18145 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18145 killed at Fri Mar 31 14:54:23 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:54:23 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:54:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:54:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1963: Server never started - PASSED kill -0 18214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18214 found at Fri Mar 31 14:54:29 UTC 2017 selfserv_9626 with PID 18214 started at Fri Mar 31 14:54:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1964: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 18214 at Fri Mar 31 14:54:29 UTC 2017 kill -USR1 18214 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18214 killed at Fri Mar 31 14:54:30 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:54:30 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:54:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:54:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1965: Server never started - PASSED kill -0 18283 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18283 found at Fri Mar 31 14:54:36 UTC 2017 selfserv_9626 with PID 18283 started at Fri Mar 31 14:54:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1966: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 18283 at Fri Mar 31 14:54:36 UTC 2017 kill -USR1 18283 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18283 killed at Fri Mar 31 14:54:37 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:54:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:54:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:54:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1967: Server never started - PASSED kill -0 18356 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18356 found at Fri Mar 31 14:54:43 UTC 2017 selfserv_9626 with PID 18356 started at Fri Mar 31 14:54:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1968: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 18356 at Fri Mar 31 14:54:44 UTC 2017 kill -USR1 18356 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18356 killed at Fri Mar 31 14:54:44 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:54:44 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:54:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:54:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1969: Server never started - PASSED kill -0 18425 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18425 found at Fri Mar 31 14:54:50 UTC 2017 selfserv_9626 with PID 18425 started at Fri Mar 31 14:54:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1970: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 18425 at Fri Mar 31 14:54:51 UTC 2017 kill -USR1 18425 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18425 killed at Fri Mar 31 14:54:51 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:54:51 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:54:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:54:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1971: Server never started - PASSED kill -0 18494 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18494 found at Fri Mar 31 14:54:57 UTC 2017 selfserv_9626 with PID 18494 started at Fri Mar 31 14:54:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1972: SSL3 Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 18494 at Fri Mar 31 14:54:58 UTC 2017 kill -USR1 18494 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18494 killed at Fri Mar 31 14:54:58 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:54:58 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:54:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:55:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1973: Server never started - PASSED kill -0 18564 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18564 found at Fri Mar 31 14:55:04 UTC 2017 selfserv_9626 with PID 18564 started at Fri Mar 31 14:55:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1974: SSL3 Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 18564 at Fri Mar 31 14:55:05 UTC 2017 kill -USR1 18564 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18564 killed at Fri Mar 31 14:55:05 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:55:05 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:55:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:55:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1975: Server never started - PASSED kill -0 18646 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18646 found at Fri Mar 31 14:55:11 UTC 2017 selfserv_9626 with PID 18646 started at Fri Mar 31 14:55:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1976: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 18646 at Fri Mar 31 14:55:12 UTC 2017 kill -USR1 18646 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18646 killed at Fri Mar 31 14:55:12 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:55:12 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:55:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:55:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1977: Server never started - PASSED kill -0 18715 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18715 found at Fri Mar 31 14:55:18 UTC 2017 selfserv_9626 with PID 18715 started at Fri Mar 31 14:55:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1978: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 18715 at Fri Mar 31 14:55:19 UTC 2017 kill -USR1 18715 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18715 killed at Fri Mar 31 14:55:19 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:55:20 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:55:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:55:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1979: Server never started - PASSED kill -0 18786 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18786 found at Fri Mar 31 14:55:26 UTC 2017 selfserv_9626 with PID 18786 started at Fri Mar 31 14:55:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1980: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 18786 at Fri Mar 31 14:55:26 UTC 2017 kill -USR1 18786 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18786 killed at Fri Mar 31 14:55:27 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:55:27 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:55:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:55:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1981: Server never started - PASSED kill -0 18855 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18855 found at Fri Mar 31 14:55:33 UTC 2017 selfserv_9626 with PID 18855 started at Fri Mar 31 14:55:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1982: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 18855 at Fri Mar 31 14:55:33 UTC 2017 kill -USR1 18855 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18855 killed at Fri Mar 31 14:55:34 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:55:34 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:55:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:55:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1983: Server never started - PASSED kill -0 18925 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18925 found at Fri Mar 31 14:55:40 UTC 2017 selfserv_9626 with PID 18925 started at Fri Mar 31 14:55:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1984: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 18925 at Fri Mar 31 14:55:40 UTC 2017 kill -USR1 18925 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18925 killed at Fri Mar 31 14:55:41 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:55:41 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:55:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:55:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1985: Server never started - PASSED kill -0 18997 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18997 found at Fri Mar 31 14:55:47 UTC 2017 selfserv_9626 with PID 18997 started at Fri Mar 31 14:55:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1986: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 18997 at Fri Mar 31 14:55:47 UTC 2017 kill -USR1 18997 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18997 killed at Fri Mar 31 14:55:48 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:55:48 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:55:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:55:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1987: Server never started - PASSED kill -0 19066 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19066 found at Fri Mar 31 14:55:54 UTC 2017 selfserv_9626 with PID 19066 started at Fri Mar 31 14:55:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1988: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 19066 at Fri Mar 31 14:55:54 UTC 2017 kill -USR1 19066 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19066 killed at Fri Mar 31 14:55:55 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:55:55 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:55:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:56:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1989: Server never started - PASSED kill -0 19136 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19136 found at Fri Mar 31 14:56:01 UTC 2017 selfserv_9626 with PID 19136 started at Fri Mar 31 14:56:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1990: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 19136 at Fri Mar 31 14:56:02 UTC 2017 kill -USR1 19136 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19136 killed at Fri Mar 31 14:56:02 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:56:02 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:56:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:56:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1991: Server never started - PASSED kill -0 19220 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19220 found at Fri Mar 31 14:56:08 UTC 2017 selfserv_9626 with PID 19220 started at Fri Mar 31 14:56:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1992: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 19220 at Fri Mar 31 14:56:09 UTC 2017 kill -USR1 19220 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19220 killed at Fri Mar 31 14:56:09 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:56:09 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:56:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:56:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1993: Server never started - PASSED kill -0 19289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19289 found at Fri Mar 31 14:56:15 UTC 2017 selfserv_9626 with PID 19289 started at Fri Mar 31 14:56:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1994: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 19289 at Fri Mar 31 14:56:16 UTC 2017 kill -USR1 19289 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19289 killed at Fri Mar 31 14:56:16 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:56:16 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:56:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:56:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1995: Server never started - PASSED kill -0 19359 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19359 found at Fri Mar 31 14:56:22 UTC 2017 selfserv_9626 with PID 19359 started at Fri Mar 31 14:56:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1996: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 19359 at Fri Mar 31 14:56:23 UTC 2017 kill -USR1 19359 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19359 killed at Fri Mar 31 14:56:23 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:56:23 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:56:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:56:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1997: Server never started - PASSED kill -0 19428 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19428 found at Fri Mar 31 14:56:29 UTC 2017 selfserv_9626 with PID 19428 started at Fri Mar 31 14:56:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1998: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 19428 at Fri Mar 31 14:56:30 UTC 2017 kill -USR1 19428 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19428 killed at Fri Mar 31 14:56:30 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:56:31 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:56:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:56:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #1999: Server never started - PASSED kill -0 19497 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19497 found at Fri Mar 31 14:56:37 UTC 2017 selfserv_9626 with PID 19497 started at Fri Mar 31 14:56:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2000: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 19497 at Fri Mar 31 14:56:37 UTC 2017 kill -USR1 19497 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19497 killed at Fri Mar 31 14:56:37 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:56:38 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:56:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:56:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2001: Server never started - PASSED kill -0 19570 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19570 found at Fri Mar 31 14:56:44 UTC 2017 selfserv_9626 with PID 19570 started at Fri Mar 31 14:56:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2002: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 19570 at Fri Mar 31 14:56:44 UTC 2017 kill -USR1 19570 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19570 killed at Fri Mar 31 14:56:45 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:56:45 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:56:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:56:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2003: Server never started - PASSED kill -0 19639 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19639 found at Fri Mar 31 14:56:51 UTC 2017 selfserv_9626 with PID 19639 started at Fri Mar 31 14:56:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2004: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 19639 at Fri Mar 31 14:56:51 UTC 2017 kill -USR1 19639 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19639 killed at Fri Mar 31 14:56:52 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:56:52 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:56:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:56:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2005: Server never started - PASSED kill -0 19708 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19708 found at Fri Mar 31 14:56:58 UTC 2017 selfserv_9626 with PID 19708 started at Fri Mar 31 14:56:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2006: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 19708 at Fri Mar 31 14:56:58 UTC 2017 kill -USR1 19708 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19708 killed at Fri Mar 31 14:56:59 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:56:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:56:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:57:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2007: Server never started - PASSED kill -0 19778 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19778 found at Fri Mar 31 14:57:05 UTC 2017 selfserv_9626 with PID 19778 started at Fri Mar 31 14:57:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2008: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 19778 at Fri Mar 31 14:57:05 UTC 2017 kill -USR1 19778 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19778 killed at Fri Mar 31 14:57:06 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:57:06 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:57:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:57:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2009: Server never started - PASSED kill -0 19861 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19861 found at Fri Mar 31 14:57:12 UTC 2017 selfserv_9626 with PID 19861 started at Fri Mar 31 14:57:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2010: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 19861 at Fri Mar 31 14:57:13 UTC 2017 kill -USR1 19861 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19861 killed at Fri Mar 31 14:57:13 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 14:57:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:57:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:57:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2011: Server never started - PASSED kill -0 19930 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19930 found at Fri Mar 31 14:57:19 UTC 2017 selfserv_9626 with PID 19930 started at Fri Mar 31 14:57:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2012: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 19930 at Fri Mar 31 14:57:20 UTC 2017 kill -USR1 19930 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19930 killed at Fri Mar 31 14:57:20 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:57:20 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:57:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:57:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2013: Server never started - PASSED kill -0 19999 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19999 found at Fri Mar 31 14:57:26 UTC 2017 selfserv_9626 with PID 19999 started at Fri Mar 31 14:57:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2014: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 19999 at Fri Mar 31 14:57:27 UTC 2017 kill -USR1 19999 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19999 killed at Fri Mar 31 14:57:27 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:57:27 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:57:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:57:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2015: Server never started - PASSED kill -0 20069 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20069 found at Fri Mar 31 14:57:33 UTC 2017 selfserv_9626 with PID 20069 started at Fri Mar 31 14:57:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2016: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 20069 at Fri Mar 31 14:57:34 UTC 2017 kill -USR1 20069 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20069 killed at Fri Mar 31 14:57:34 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:57:34 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:57:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:57:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2017: Server never started - PASSED kill -0 20156 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20156 found at Fri Mar 31 14:57:40 UTC 2017 selfserv_9626 with PID 20156 started at Fri Mar 31 14:57:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2018: TLS Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 20156 at Fri Mar 31 14:57:41 UTC 2017 kill -USR1 20156 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20156 killed at Fri Mar 31 14:57:41 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:57:42 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:57:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:57:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2019: Server never started - PASSED kill -0 20225 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20225 found at Fri Mar 31 14:57:48 UTC 2017 selfserv_9626 with PID 20225 started at Fri Mar 31 14:57:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2020: TLS Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 20225 at Fri Mar 31 14:57:48 UTC 2017 kill -USR1 20225 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20225 killed at Fri Mar 31 14:57:48 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:57:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:57:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:57:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2021: Server never started - PASSED kill -0 20295 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20295 found at Fri Mar 31 14:57:55 UTC 2017 selfserv_9626 with PID 20295 started at Fri Mar 31 14:57:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2022: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 20295 at Fri Mar 31 14:57:55 UTC 2017 kill -USR1 20295 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20295 killed at Fri Mar 31 14:57:56 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:57:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:57:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:58:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2023: Server never started - PASSED kill -0 20364 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20364 found at Fri Mar 31 14:58:02 UTC 2017 selfserv_9626 with PID 20364 started at Fri Mar 31 14:58:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2024: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 20364 at Fri Mar 31 14:58:02 UTC 2017 kill -USR1 20364 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20364 killed at Fri Mar 31 14:58:03 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:58:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:58:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:58:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2025: Server never started - PASSED kill -0 20447 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20447 found at Fri Mar 31 14:58:09 UTC 2017 selfserv_9626 with PID 20447 started at Fri Mar 31 14:58:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2026: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 20447 at Fri Mar 31 14:58:09 UTC 2017 kill -USR1 20447 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20447 killed at Fri Mar 31 14:58:10 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:58:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:58:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:58:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2027: Server never started - PASSED kill -0 20517 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20517 found at Fri Mar 31 14:58:16 UTC 2017 selfserv_9626 with PID 20517 started at Fri Mar 31 14:58:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2028: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 20517 at Fri Mar 31 14:58:16 UTC 2017 kill -USR1 20517 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20517 killed at Fri Mar 31 14:58:17 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:58:17 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:58:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:58:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2029: Server never started - PASSED kill -0 20586 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20586 found at Fri Mar 31 14:58:23 UTC 2017 selfserv_9626 with PID 20586 started at Fri Mar 31 14:58:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2030: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 20586 at Fri Mar 31 14:58:24 UTC 2017 kill -USR1 20586 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20586 killed at Fri Mar 31 14:58:24 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:58:24 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:58:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:58:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2031: Server never started - PASSED kill -0 20655 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20655 found at Fri Mar 31 14:58:30 UTC 2017 selfserv_9626 with PID 20655 started at Fri Mar 31 14:58:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2032: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 20655 at Fri Mar 31 14:58:31 UTC 2017 kill -USR1 20655 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20655 killed at Fri Mar 31 14:58:31 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:58:31 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:58:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:58:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2033: Server never started - PASSED kill -0 20725 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20725 found at Fri Mar 31 14:58:37 UTC 2017 selfserv_9626 with PID 20725 started at Fri Mar 31 14:58:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2034: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 20725 at Fri Mar 31 14:58:38 UTC 2017 kill -USR1 20725 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20725 killed at Fri Mar 31 14:58:38 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:58:38 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:58:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:58:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2035: Server never started - PASSED kill -0 20797 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20797 found at Fri Mar 31 14:58:44 UTC 2017 selfserv_9626 with PID 20797 started at Fri Mar 31 14:58:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2036: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 20797 at Fri Mar 31 14:58:45 UTC 2017 kill -USR1 20797 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20797 killed at Fri Mar 31 14:58:45 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:58:45 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:58:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:58:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2037: Server never started - PASSED kill -0 20866 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20866 found at Fri Mar 31 14:58:51 UTC 2017 selfserv_9626 with PID 20866 started at Fri Mar 31 14:58:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2038: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 20866 at Fri Mar 31 14:58:52 UTC 2017 kill -USR1 20866 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20866 killed at Fri Mar 31 14:58:52 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:58:52 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:58:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:58:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2039: Server never started - PASSED kill -0 20936 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20936 found at Fri Mar 31 14:58:58 UTC 2017 selfserv_9626 with PID 20936 started at Fri Mar 31 14:58:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2040: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 20936 at Fri Mar 31 14:58:59 UTC 2017 kill -USR1 20936 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20936 killed at Fri Mar 31 14:58:59 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:59:00 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:59:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:59:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2041: Server never started - PASSED kill -0 21005 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21005 found at Fri Mar 31 14:59:05 UTC 2017 selfserv_9626 with PID 21005 started at Fri Mar 31 14:59:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2042: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 21005 at Fri Mar 31 14:59:06 UTC 2017 kill -USR1 21005 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21005 killed at Fri Mar 31 14:59:06 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:59:07 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:59:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:59:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2043: Server never started - PASSED kill -0 21087 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21087 found at Fri Mar 31 14:59:13 UTC 2017 selfserv_9626 with PID 21087 started at Fri Mar 31 14:59:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2044: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 21087 at Fri Mar 31 14:59:13 UTC 2017 kill -USR1 21087 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21087 killed at Fri Mar 31 14:59:14 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:59:14 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:59:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:59:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2045: Server never started - PASSED kill -0 21157 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21157 found at Fri Mar 31 14:59:20 UTC 2017 selfserv_9626 with PID 21157 started at Fri Mar 31 14:59:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2046: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 21157 at Fri Mar 31 14:59:20 UTC 2017 kill -USR1 21157 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21157 killed at Fri Mar 31 14:59:21 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:59:21 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:59:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:59:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2047: Server never started - PASSED kill -0 21226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21226 found at Fri Mar 31 14:59:27 UTC 2017 selfserv_9626 with PID 21226 started at Fri Mar 31 14:59:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2048: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 21226 at Fri Mar 31 14:59:27 UTC 2017 kill -USR1 21226 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21226 killed at Fri Mar 31 14:59:28 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:59:28 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:59:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:59:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2049: Server never started - PASSED kill -0 21295 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21295 found at Fri Mar 31 14:59:34 UTC 2017 selfserv_9626 with PID 21295 started at Fri Mar 31 14:59:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2050: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 21295 at Fri Mar 31 14:59:34 UTC 2017 kill -USR1 21295 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21295 killed at Fri Mar 31 14:59:35 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:59:35 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:59:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:59:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2051: Server never started - PASSED kill -0 21367 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21367 found at Fri Mar 31 14:59:41 UTC 2017 selfserv_9626 with PID 21367 started at Fri Mar 31 14:59:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2052: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 21367 at Fri Mar 31 14:59:41 UTC 2017 kill -USR1 21367 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21367 killed at Fri Mar 31 14:59:42 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 14:59:42 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:59:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:59:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2053: Server never started - PASSED kill -0 21436 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21436 found at Fri Mar 31 14:59:48 UTC 2017 selfserv_9626 with PID 21436 started at Fri Mar 31 14:59:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2054: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 21436 at Fri Mar 31 14:59:49 UTC 2017 kill -USR1 21436 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21436 killed at Fri Mar 31 14:59:49 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 14:59:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:59:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 14:59:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2055: Server never started - PASSED kill -0 21505 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21505 found at Fri Mar 31 14:59:55 UTC 2017 selfserv_9626 with PID 21505 started at Fri Mar 31 14:59:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2056: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 21505 at Fri Mar 31 14:59:56 UTC 2017 kill -USR1 21505 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21505 killed at Fri Mar 31 14:59:56 UTC 2017 ssl.sh: TLS Server hello response without SNI ---- selfserv_9626 starting at Fri Mar 31 14:59:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 14:59:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:00:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2057: Server never started - PASSED kill -0 21595 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21595 found at Fri Mar 31 15:00:02 UTC 2017 selfserv_9626 with PID 21595 started at Fri Mar 31 15:00:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2058: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 21595 at Fri Mar 31 15:00:03 UTC 2017 kill -USR1 21595 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21595 killed at Fri Mar 31 15:00:03 UTC 2017 ssl.sh: TLS Server hello response with SNI ---- selfserv_9626 starting at Fri Mar 31 15:00:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:00:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:00:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2059: Server never started - PASSED kill -0 21684 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21684 found at Fri Mar 31 15:00:09 UTC 2017 selfserv_9626 with PID 21684 started at Fri Mar 31 15:00:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2060: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 21684 at Fri Mar 31 15:00:10 UTC 2017 kill -USR1 21684 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21684 killed at Fri Mar 31 15:00:10 UTC 2017 ssl.sh: TLS Server response with alert ---- selfserv_9626 starting at Fri Mar 31 15:00:11 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:00:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:00:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2061: Server never started - PASSED kill -0 21759 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21759 found at Fri Mar 31 15:00:17 UTC 2017 selfserv_9626 with PID 21759 started at Fri Mar 31 15:00:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2062: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 21759 at Fri Mar 31 15:00:17 UTC 2017 kill -USR1 21759 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21759 killed at Fri Mar 31 15:00:18 UTC 2017 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9626 starting at Fri Mar 31 15:00:18 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:00:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:00:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2063: Server never started - PASSED kill -0 21835 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21835 found at Fri Mar 31 15:00:24 UTC 2017 selfserv_9626 with PID 21835 started at Fri Mar 31 15:00:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2064: SSL3 Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 21835 at Fri Mar 31 15:00:24 UTC 2017 kill -USR1 21835 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21835 killed at Fri Mar 31 15:00:25 UTC 2017 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9626 starting at Fri Mar 31 15:00:25 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:00:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:00:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2065: Server never started - PASSED kill -0 21911 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21911 found at Fri Mar 31 15:00:31 UTC 2017 selfserv_9626 with PID 21911 started at Fri Mar 31 15:00:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2066: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 21911 at Fri Mar 31 15:00:31 UTC 2017 kill -USR1 21911 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21911 killed at Fri Mar 31 15:00:32 UTC 2017 ssl.sh: TLS Server hello response without SNI ---- selfserv_9626 starting at Fri Mar 31 15:00:32 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:00:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:00:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2067: Server never started - PASSED kill -0 21986 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21986 found at Fri Mar 31 15:00:38 UTC 2017 selfserv_9626 with PID 21986 started at Fri Mar 31 15:00:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2068: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 21986 at Fri Mar 31 15:00:39 UTC 2017 kill -USR1 21986 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21986 killed at Fri Mar 31 15:00:39 UTC 2017 ssl.sh: TLS Server hello response with SNI ---- selfserv_9626 starting at Fri Mar 31 15:00:39 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:00:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:00:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2069: Server never started - PASSED kill -0 22064 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22064 found at Fri Mar 31 15:00:45 UTC 2017 selfserv_9626 with PID 22064 started at Fri Mar 31 15:00:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2070: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 22064 at Fri Mar 31 15:00:46 UTC 2017 kill -USR1 22064 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22064 killed at Fri Mar 31 15:00:46 UTC 2017 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9626 starting at Fri Mar 31 15:00:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:00:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:00:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2071: Server never started - PASSED kill -0 22140 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22140 found at Fri Mar 31 15:00:52 UTC 2017 selfserv_9626 with PID 22140 started at Fri Mar 31 15:00:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v-w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat Usage: tstclnt -h host [-a 1st_hs_name ] [-a 2nd_hs_name ] [-p port] [-D | -d certdir] [-C] [-b | -R root-module] [-n nickname] [-Bafosvx] [-c ciphers] [-Y] [-Z] [-V [min-version]:[max-version]] [-K] [-T] [-U] [-r N] [-w passwd] [-W pwfile] [-q [-t seconds]] [-I groups] [-A requestfile] [-L totalconnections]-a name Send different SNI name. 1st_hs_name - at first handshake, 2nd_hs_name - at second handshake. Default is host from the -h argument. -h host Hostname to connect with -p port Port number for SSL server -d certdir Directory with cert database (default is ~/.netscape) -D Run without a cert database -b Load the default "builtins" root CA module -R Load the given root CA module -C Print certificate chain information (use -C twice to print more certificate details) (use -C three times to include PEM format certificate dumps) -n nickname Nickname of key and cert for client auth -V [min]:[max] Restricts the set of enabled SSL/TLS protocols versions. All versions are enabled by default. Possible values for min/max: ssl3 tls1.0 tls1.1 tls1.2 tls1.3 Example: "-V ssl3:" enables SSL 3 and newer. -K Send TLS_FALLBACK_SCSV -S Prints only payload data. Skips HTTP header. -f Client speaks first. -O Use synchronous certificate validation -o Override bad server cert. Make it OK. -s Disable SSL socket locking. -v Verbose progress reporting. -q Ping the server and then exit. -t seconds Timeout for server ping (default: no timeout). -r N Renegotiate N times (resuming session if N>1). -u Enable the session ticket extension. -z Enable compression. -g Enable false start. -T Enable the cert_status extension (OCSP stapling). -U Enable the signed_certificate_timestamp extension. -F Require fresh revocation info from side channel. -F once means: require for server cert only -F twice means: require for intermediates, too (Connect, handshake with server, disable dynamic download of OCSP/CRL, verify cert using CERT_PKIXVerifyCert.) Exit code: 0: have fresh and valid revocation data, status good 1: cert failed to verify, prior to revocation checking 2: missing, old or invalid revocation data 3: have fresh and valid revocation data, status revoked -M Test -F allows 0=any (default), 1=only OCSP, 2=only CRL -c ciphers Restrict ciphers -Y Print cipher values allowed for parameter -c and exit -4 Enforce using an IPv4 destination address -6 Enforce using an IPv6 destination address (Options -4 and -6 cannot be combined.) -G Enable the extended master secret extension [RFC7627] -H Require the use of FFDHE supported groups [I-D.ietf-tls-negotiated-ff-dhe] -A Read from a file instead of stdin -Z Allow 0-RTT data (TLS 1.3 only) -L Disconnect and reconnect up to N times total -I Comma separated list of enabled groups for TLS key exchange. The following values are valid: P256, P384, P521, x25519, FF2048, FF3072, FF4096, FF6144, FF8192 ssl.sh: #2072: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 22140 at Fri Mar 31 15:00:53 UTC 2017 kill -USR1 22140 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22140 killed at Fri Mar 31 15:00:53 UTC 2017 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9626 starting at Fri Mar 31 15:00:53 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:00:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:00:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2073: Server never started - PASSED kill -0 22215 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22215 found at Fri Mar 31 15:00:59 UTC 2017 selfserv_9626 with PID 22215 started at Fri Mar 31 15:00:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2074: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 22215 at Fri Mar 31 15:01:00 UTC 2017 kill -USR1 22215 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22215 killed at Fri Mar 31 15:01:00 UTC 2017 ssl.sh: TLS Server response with alert ---- selfserv_9626 starting at Fri Mar 31 15:01:01 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:01:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:01:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2075: Server never started - PASSED kill -0 22290 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22290 found at Fri Mar 31 15:01:07 UTC 2017 selfserv_9626 with PID 22290 started at Fri Mar 31 15:01:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2076: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 22290 at Fri Mar 31 15:01:07 UTC 2017 kill -USR1 22290 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22290 killed at Fri Mar 31 15:01:08 UTC 2017 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status (non-FIPS only) ssl.sh: skipping OCSP stapling, signed response, revoked status (non-FIPS only) ssl.sh: skipping OCSP stapling, signed response, unknown status (non-FIPS only) ssl.sh: skipping OCSP stapling, unsigned failure response (non-FIPS only) ssl.sh: skipping OCSP stapling, good status, bad signature (non-FIPS only) ssl.sh: skipping OCSP stapling, invalid cert status data (non-FIPS only) ssl.sh: skipping Valid cert, Server doesn't staple (non-FIPS only) ssl.sh: skipping Stress OCSP stapling, server uses random status (non-FIPS only) ssl.sh: SSL Stress Test - server fips/client normal - with ECC =============================== ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9626 starting at Fri Mar 31 15:01:08 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:01:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:01:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2077: Server never started - PASSED kill -0 22437 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22437 found at Fri Mar 31 15:01:14 UTC 2017 selfserv_9626 with PID 22437 started at Fri Mar 31 15:01:14 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -c 1000 -C c -V ssl3:ssl3 \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:01:14 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:01:14 UTC 2017 ssl.sh: #2078: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 22437 at Fri Mar 31 15:01:15 UTC 2017 kill -USR1 22437 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22437 killed at Fri Mar 31 15:01:15 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9626 starting at Fri Mar 31 15:01:15 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:01:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:01:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2079: Server never started - PASSED kill -0 22511 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22511 found at Fri Mar 31 15:01:21 UTC 2017 selfserv_9626 with PID 22511 started at Fri Mar 31 15:01:21 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -c 1000 -C c \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:01:21 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:01:22 UTC 2017 ssl.sh: #2080: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 22511 at Fri Mar 31 15:01:22 UTC 2017 kill -USR1 22511 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22511 killed at Fri Mar 31 15:01:22 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9626 starting at Fri Mar 31 15:01:22 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:01:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:01:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2081: Server never started - PASSED kill -0 22586 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22586 found at Fri Mar 31 15:01:28 UTC 2017 selfserv_9626 with PID 22586 started at Fri Mar 31 15:01:28 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -c 1000 -C c -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:01:28 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:01:29 UTC 2017 ssl.sh: #2082: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 22586 at Fri Mar 31 15:01:29 UTC 2017 kill -USR1 22586 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22586 killed at Fri Mar 31 15:01:29 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9626 starting at Fri Mar 31 15:01:30 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:01:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:01:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2083: Server never started - PASSED kill -0 22660 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22660 found at Fri Mar 31 15:01:35 UTC 2017 selfserv_9626 with PID 22660 started at Fri Mar 31 15:01:36 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C c -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:01:36 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:01:36 UTC 2017 ssl.sh: #2084: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 22660 at Fri Mar 31 15:01:36 UTC 2017 kill -USR1 22660 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22660 killed at Fri Mar 31 15:01:37 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9626 starting at Fri Mar 31 15:01:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:01:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:01:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2085: Server never started - PASSED kill -0 22737 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22737 found at Fri Mar 31 15:01:43 UTC 2017 selfserv_9626 with PID 22737 started at Fri Mar 31 15:01:43 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C c -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:01:43 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:01:43 UTC 2017 ssl.sh: #2086: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 22737 at Fri Mar 31 15:01:43 UTC 2017 kill -USR1 22737 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22737 killed at Fri Mar 31 15:01:44 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9626 starting at Fri Mar 31 15:01:44 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:01:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:01:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2087: Server never started - PASSED kill -0 22812 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22812 found at Fri Mar 31 15:01:50 UTC 2017 selfserv_9626 with PID 22812 started at Fri Mar 31 15:01:50 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:01:50 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:01:50 UTC 2017 ssl.sh: #2088: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 22812 at Fri Mar 31 15:01:51 UTC 2017 kill -USR1 22812 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22812 killed at Fri Mar 31 15:01:51 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9626 starting at Fri Mar 31 15:01:51 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:01:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:01:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2089: Server never started - PASSED kill -0 22886 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22886 found at Fri Mar 31 15:01:57 UTC 2017 selfserv_9626 with PID 22886 started at Fri Mar 31 15:01:57 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:01:57 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:01:58 UTC 2017 ssl.sh: #2090: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 22886 at Fri Mar 31 15:01:58 UTC 2017 kill -USR1 22886 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22886 killed at Fri Mar 31 15:01:58 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9626 starting at Fri Mar 31 15:01:58 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:01:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:02:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2091: Server never started - PASSED kill -0 22966 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22966 found at Fri Mar 31 15:02:04 UTC 2017 selfserv_9626 with PID 22966 started at Fri Mar 31 15:02:04 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:02:04 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:02:05 UTC 2017 ssl.sh: #2092: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 22966 at Fri Mar 31 15:02:05 UTC 2017 kill -USR1 22966 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22966 killed at Fri Mar 31 15:02:05 UTC 2017 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:02:06 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:02:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:02:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2093: Server never started - PASSED kill -0 23069 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23069 found at Fri Mar 31 15:02:12 UTC 2017 selfserv_9626 with PID 23069 started at Fri Mar 31 15:02:12 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:02:12 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:02:12 UTC 2017 ssl.sh: #2094: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 23069 at Fri Mar 31 15:02:12 UTC 2017 kill -USR1 23069 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23069 killed at Fri Mar 31 15:02:13 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:02:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:02:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:02:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2095: Server never started - PASSED kill -0 23143 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23143 found at Fri Mar 31 15:02:19 UTC 2017 selfserv_9626 with PID 23143 started at Fri Mar 31 15:02:19 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -c 100 -C c -N -n TestUser \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:02:19 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:02:19 UTC 2017 ssl.sh: #2096: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 23143 at Fri Mar 31 15:02:19 UTC 2017 kill -USR1 23143 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23143 killed at Fri Mar 31 15:02:20 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:02:20 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:02:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:02:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2097: Server never started - PASSED kill -0 23217 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23217 found at Fri Mar 31 15:02:26 UTC 2017 selfserv_9626 with PID 23217 started at Fri Mar 31 15:02:26 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:02:26 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:02:26 UTC 2017 ssl.sh: #2098: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 23217 at Fri Mar 31 15:02:27 UTC 2017 kill -USR1 23217 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23217 killed at Fri Mar 31 15:02:27 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:02:27 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:02:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:02:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2099: Server never started - PASSED kill -0 23292 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23292 found at Fri Mar 31 15:02:33 UTC 2017 selfserv_9626 with PID 23292 started at Fri Mar 31 15:02:33 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:02:33 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:02:34 UTC 2017 ssl.sh: #2100: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 23292 at Fri Mar 31 15:02:34 UTC 2017 kill -USR1 23292 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23292 killed at Fri Mar 31 15:02:34 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9626 starting at Fri Mar 31 15:02:34 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:02:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:02:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2101: Server never started - PASSED kill -0 23366 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23366 found at Fri Mar 31 15:02:40 UTC 2017 selfserv_9626 with PID 23366 started at Fri Mar 31 15:02:40 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:02:40 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:02:41 UTC 2017 ssl.sh: #2102: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 23366 at Fri Mar 31 15:02:41 UTC 2017 kill -USR1 23366 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23366 killed at Fri Mar 31 15:02:41 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:02:42 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:02:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:02:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2103: Server never started - PASSED kill -0 23443 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23443 found at Fri Mar 31 15:02:48 UTC 2017 selfserv_9626 with PID 23443 started at Fri Mar 31 15:02:48 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:02:48 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:02:48 UTC 2017 ssl.sh: #2104: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 23443 at Fri Mar 31 15:02:48 UTC 2017 kill -USR1 23443 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23443 killed at Fri Mar 31 15:02:49 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9626 starting at Fri Mar 31 15:02:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:02:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:02:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2105: Server never started - PASSED kill -0 23518 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23518 found at Fri Mar 31 15:02:55 UTC 2017 selfserv_9626 with PID 23518 started at Fri Mar 31 15:02:55 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:02:55 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:02:55 UTC 2017 ssl.sh: #2106: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 23518 at Fri Mar 31 15:02:55 UTC 2017 kill -USR1 23518 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23518 killed at Fri Mar 31 15:02:56 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9626 starting at Fri Mar 31 15:02:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:02:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:03:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2107: Server never started - PASSED kill -0 23598 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23598 found at Fri Mar 31 15:03:02 UTC 2017 selfserv_9626 with PID 23598 started at Fri Mar 31 15:03:02 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:03:02 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:03:03 UTC 2017 ssl.sh: #2108: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 23598 at Fri Mar 31 15:03:03 UTC 2017 kill -USR1 23598 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23598 killed at Fri Mar 31 15:03:03 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9626 starting at Fri Mar 31 15:03:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:03:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:03:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2109: Server never started - PASSED kill -0 23691 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23691 found at Fri Mar 31 15:03:09 UTC 2017 selfserv_9626 with PID 23691 started at Fri Mar 31 15:03:09 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V tls1.0:tls1.2 -c 1000 -C c -u -a localhost-sni.localdomain \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:03:09 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:03:10 UTC 2017 ssl.sh: #2110: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 23691 at Fri Mar 31 15:03:10 UTC 2017 kill -USR1 23691 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23691 killed at Fri Mar 31 15:03:10 UTC 2017 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:03:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:03:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:03:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2111: Server never started - PASSED kill -0 23781 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23781 found at Fri Mar 31 15:03:16 UTC 2017 selfserv_9626 with PID 23781 started at Fri Mar 31 15:03:16 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:03:17 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:03:17 UTC 2017 ssl.sh: #2112: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 23781 at Fri Mar 31 15:03:17 UTC 2017 kill -USR1 23781 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23781 killed at Fri Mar 31 15:03:18 UTC 2017 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:03:18 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:03:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:03:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2113: Server never started - PASSED kill -0 23855 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23855 found at Fri Mar 31 15:03:24 UTC 2017 selfserv_9626 with PID 23855 started at Fri Mar 31 15:03:24 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:03:24 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:03:24 UTC 2017 ssl.sh: #2114: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 23855 at Fri Mar 31 15:03:24 UTC 2017 kill -USR1 23855 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23855 killed at Fri Mar 31 15:03:25 UTC 2017 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:03:25 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:03:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:03:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2115: Server never started - PASSED kill -0 23929 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23929 found at Fri Mar 31 15:03:31 UTC 2017 selfserv_9626 with PID 23929 started at Fri Mar 31 15:03:31 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:03:31 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:03:31 UTC 2017 ssl.sh: #2116: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 23929 at Fri Mar 31 15:03:31 UTC 2017 kill -USR1 23929 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23929 killed at Fri Mar 31 15:03:32 UTC 2017 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:03:32 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:03:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:03:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2117: Server never started - PASSED kill -0 24004 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24004 found at Fri Mar 31 15:03:38 UTC 2017 selfserv_9626 with PID 24004 started at Fri Mar 31 15:03:38 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:03:38 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:03:39 UTC 2017 ssl.sh: #2118: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 24004 at Fri Mar 31 15:03:39 UTC 2017 kill -USR1 24004 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24004 killed at Fri Mar 31 15:03:39 UTC 2017 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:03:39 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:03:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:03:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2119: Server never started - PASSED kill -0 24081 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24081 found at Fri Mar 31 15:03:45 UTC 2017 selfserv_9626 with PID 24081 started at Fri Mar 31 15:03:45 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:03:45 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:03:46 UTC 2017 ssl.sh: #2120: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 24081 at Fri Mar 31 15:03:46 UTC 2017 kill -USR1 24081 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24081 killed at Fri Mar 31 15:03:46 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9626 starting at Fri Mar 31 15:03:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:03:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:03:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2121: Server never started - PASSED kill -0 24156 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24156 found at Fri Mar 31 15:03:52 UTC 2017 selfserv_9626 with PID 24156 started at Fri Mar 31 15:03:52 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:03:52 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:03:53 UTC 2017 ssl.sh: #2122: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 24156 at Fri Mar 31 15:03:53 UTC 2017 kill -USR1 24156 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24156 killed at Fri Mar 31 15:03:53 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9626 starting at Fri Mar 31 15:03:54 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:03:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:03:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2123: Server never started - PASSED kill -0 24230 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24230 found at Fri Mar 31 15:04:00 UTC 2017 selfserv_9626 with PID 24230 started at Fri Mar 31 15:04:00 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:04:00 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:04:00 UTC 2017 ssl.sh: #2124: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 24230 at Fri Mar 31 15:04:00 UTC 2017 kill -USR1 24230 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24230 killed at Fri Mar 31 15:04:01 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9626 starting at Fri Mar 31 15:04:01 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:04:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:04:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2125: Server never started - PASSED kill -0 24304 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24304 found at Fri Mar 31 15:04:07 UTC 2017 selfserv_9626 with PID 24304 started at Fri Mar 31 15:04:07 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:04:07 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:04:07 UTC 2017 ssl.sh: #2126: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 24304 at Fri Mar 31 15:04:07 UTC 2017 kill -USR1 24304 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24304 killed at Fri Mar 31 15:04:08 UTC 2017 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9626 starting at Fri Mar 31 15:04:08 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:04:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:04:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2127: Server never started - PASSED kill -0 24392 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24392 found at Fri Mar 31 15:04:14 UTC 2017 selfserv_9626 with PID 24392 started at Fri Mar 31 15:04:14 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:04:14 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:04:15 UTC 2017 ssl.sh: #2128: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 24392 at Fri Mar 31 15:04:15 UTC 2017 kill -USR1 24392 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24392 killed at Fri Mar 31 15:04:15 UTC 2017 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9626 starting at Fri Mar 31 15:04:15 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:04:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:04:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2129: Server never started - PASSED kill -0 24466 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24466 found at Fri Mar 31 15:04:21 UTC 2017 selfserv_9626 with PID 24466 started at Fri Mar 31 15:04:21 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:04:21 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:04:22 UTC 2017 ssl.sh: #2130: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 24466 at Fri Mar 31 15:04:22 UTC 2017 kill -USR1 24466 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24466 killed at Fri Mar 31 15:04:22 UTC 2017 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:04:23 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:04:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:04:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2131: Server never started - PASSED kill -0 24555 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24555 found at Fri Mar 31 15:04:28 UTC 2017 selfserv_9626 with PID 24555 started at Fri Mar 31 15:04:29 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n TestUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:04:29 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:04:29 UTC 2017 ssl.sh: #2132: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 24555 at Fri Mar 31 15:04:29 UTC 2017 kill -USR1 24555 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24555 killed at Fri Mar 31 15:04:30 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:04:30 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:04:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:04:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2133: Server never started - PASSED kill -0 24630 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24630 found at Fri Mar 31 15:04:36 UTC 2017 selfserv_9626 with PID 24630 started at Fri Mar 31 15:04:36 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:04:36 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:04:36 UTC 2017 ssl.sh: #2134: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 24630 at Fri Mar 31 15:04:36 UTC 2017 kill -USR1 24630 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24630 killed at Fri Mar 31 15:04:37 UTC 2017 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:04:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:04:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:04:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2135: Server never started - PASSED kill -0 24707 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24707 found at Fri Mar 31 15:04:43 UTC 2017 selfserv_9626 with PID 24707 started at Fri Mar 31 15:04:43 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n TestUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:04:43 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:04:43 UTC 2017 ssl.sh: #2136: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 24707 at Fri Mar 31 15:04:44 UTC 2017 kill -USR1 24707 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24707 killed at Fri Mar 31 15:04:44 UTC 2017 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:04:44 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:04:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:04:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2137: Server never started - PASSED kill -0 24781 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24781 found at Fri Mar 31 15:04:50 UTC 2017 selfserv_9626 with PID 24781 started at Fri Mar 31 15:04:50 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n TestUser-ecmixed \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:04:50 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:04:51 UTC 2017 ssl.sh: #2138: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 24781 at Fri Mar 31 15:04:51 UTC 2017 kill -USR1 24781 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24781 killed at Fri Mar 31 15:04:51 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9626 starting at Fri Mar 31 15:04:51 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:04:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:04:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2139: Server never started - PASSED kill -0 24856 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24856 found at Fri Mar 31 15:04:57 UTC 2017 selfserv_9626 with PID 24856 started at Fri Mar 31 15:04:57 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:04:57 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:04:58 UTC 2017 ssl.sh: #2140: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 24856 at Fri Mar 31 15:04:58 UTC 2017 kill -USR1 24856 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24856 killed at Fri Mar 31 15:04:58 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:04:58 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:04:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:05:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2141: Server never started - PASSED kill -0 24930 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24930 found at Fri Mar 31 15:05:04 UTC 2017 selfserv_9626 with PID 24930 started at Fri Mar 31 15:05:04 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:05:05 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:05:05 UTC 2017 ssl.sh: #2142: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 24930 at Fri Mar 31 15:05:05 UTC 2017 kill -USR1 24930 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24930 killed at Fri Mar 31 15:05:06 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:05:06 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:05:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:05:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2143: Server never started - PASSED kill -0 25032 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25032 found at Fri Mar 31 15:05:12 UTC 2017 selfserv_9626 with PID 25032 started at Fri Mar 31 15:05:12 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:05:12 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:05:12 UTC 2017 ssl.sh: #2144: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 25032 at Fri Mar 31 15:05:12 UTC 2017 kill -USR1 25032 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25032 killed at Fri Mar 31 15:05:13 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9626 starting at Fri Mar 31 15:05:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:05:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:05:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2145: Server never started - PASSED kill -0 25107 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25107 found at Fri Mar 31 15:05:19 UTC 2017 selfserv_9626 with PID 25107 started at Fri Mar 31 15:05:19 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:05:19 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:05:19 UTC 2017 ssl.sh: #2146: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 25107 at Fri Mar 31 15:05:20 UTC 2017 kill -USR1 25107 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25107 killed at Fri Mar 31 15:05:20 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:05:20 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:05:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:05:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2147: Server never started - PASSED kill -0 25181 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25181 found at Fri Mar 31 15:05:26 UTC 2017 selfserv_9626 with PID 25181 started at Fri Mar 31 15:05:26 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:05:26 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:05:27 UTC 2017 ssl.sh: #2148: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 25181 at Fri Mar 31 15:05:27 UTC 2017 kill -USR1 25181 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25181 killed at Fri Mar 31 15:05:27 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:05:27 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:05:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:05:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2149: Server never started - PASSED kill -0 25255 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25255 found at Fri Mar 31 15:05:33 UTC 2017 selfserv_9626 with PID 25255 started at Fri Mar 31 15:05:33 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:05:33 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:05:34 UTC 2017 ssl.sh: #2150: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 25255 at Fri Mar 31 15:05:34 UTC 2017 kill -USR1 25255 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25255 killed at Fri Mar 31 15:05:34 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:05:35 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:05:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:05:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2151: Server never started - PASSED kill -0 25340 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25340 found at Fri Mar 31 15:05:41 UTC 2017 selfserv_9626 with PID 25340 started at Fri Mar 31 15:05:41 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:05:41 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:05:41 UTC 2017 ssl.sh: #2152: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 25340 at Fri Mar 31 15:05:41 UTC 2017 kill -USR1 25340 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25340 killed at Fri Mar 31 15:05:42 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9626 starting at Fri Mar 31 15:05:42 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:05:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:05:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2153: Server never started - PASSED kill -0 25427 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25427 found at Fri Mar 31 15:05:48 UTC 2017 selfserv_9626 with PID 25427 started at Fri Mar 31 15:05:48 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:05:48 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:05:48 UTC 2017 ssl.sh: #2154: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 25427 at Fri Mar 31 15:05:48 UTC 2017 kill -USR1 25427 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25427 killed at Fri Mar 31 15:05:49 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:05:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:05:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:05:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2155: Server never started - PASSED kill -0 25501 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25501 found at Fri Mar 31 15:05:55 UTC 2017 selfserv_9626 with PID 25501 started at Fri Mar 31 15:05:55 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:05:55 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:05:56 UTC 2017 ssl.sh: #2156: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 25501 at Fri Mar 31 15:05:56 UTC 2017 kill -USR1 25501 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25501 killed at Fri Mar 31 15:05:56 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:05:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:05:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:06:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2157: Server never started - PASSED kill -0 25576 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25576 found at Fri Mar 31 15:06:02 UTC 2017 selfserv_9626 with PID 25576 started at Fri Mar 31 15:06:02 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:06:02 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:06:03 UTC 2017 ssl.sh: #2158: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 25576 at Fri Mar 31 15:06:03 UTC 2017 kill -USR1 25576 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25576 killed at Fri Mar 31 15:06:03 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:06:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009F -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:06:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:06:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2159: Server never started - PASSED kill -0 25664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25664 found at Fri Mar 31 15:06:09 UTC 2017 selfserv_9626 with PID 25664 started at Fri Mar 31 15:06:09 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:06:09 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:06:10 UTC 2017 ssl.sh: #2160: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 25664 at Fri Mar 31 15:06:10 UTC 2017 kill -USR1 25664 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25664 killed at Fri Mar 31 15:06:10 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:06:11 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:06:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:06:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2161: Server never started - PASSED kill -0 25753 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25753 found at Fri Mar 31 15:06:17 UTC 2017 selfserv_9626 with PID 25753 started at Fri Mar 31 15:06:17 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n TestUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:06:17 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:06:17 UTC 2017 ssl.sh: #2162: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 25753 at Fri Mar 31 15:06:17 UTC 2017 kill -USR1 25753 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25753 killed at Fri Mar 31 15:06:18 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:06:18 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:06:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:06:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2163: Server never started - PASSED kill -0 25828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25828 found at Fri Mar 31 15:06:24 UTC 2017 selfserv_9626 with PID 25828 started at Fri Mar 31 15:06:24 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n TestUser-dsamixed \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:06:24 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:06:24 UTC 2017 ssl.sh: #2164: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 25828 at Fri Mar 31 15:06:25 UTC 2017 kill -USR1 25828 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25828 killed at Fri Mar 31 15:06:25 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:06:25 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:06:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:06:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2165: Server never started - PASSED kill -0 25917 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25917 found at Fri Mar 31 15:06:31 UTC 2017 selfserv_9626 with PID 25917 started at Fri Mar 31 15:06:31 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n TestUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:06:31 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:06:32 UTC 2017 ssl.sh: #2166: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 25917 at Fri Mar 31 15:06:32 UTC 2017 kill -USR1 25917 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25917 killed at Fri Mar 31 15:06:32 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:06:32 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:06:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:06:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2167: Server never started - PASSED kill -0 25992 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25992 found at Fri Mar 31 15:06:38 UTC 2017 selfserv_9626 with PID 25992 started at Fri Mar 31 15:06:38 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n TestUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:06:38 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:06:39 UTC 2017 ssl.sh: #2168: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 25992 at Fri Mar 31 15:06:39 UTC 2017 kill -USR1 25992 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25992 killed at Fri Mar 31 15:06:39 UTC 2017 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal - with ECC =============================== selfserv_9626 starting at Fri Mar 31 15:06:40 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:06:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:06:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2169: Server never started - PASSED kill -0 26061 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26061 found at Fri Mar 31 15:06:45 UTC 2017 selfserv_9626 with PID 26061 started at Fri Mar 31 15:06:46 UTC 2017 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2170: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2171: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2172: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2173: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2174: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2175: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2176: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2177: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2178: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2179: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2180: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2181: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2182: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2183: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2184: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2185: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2186: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2187: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2188: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2189: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2190: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2191: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2192: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2193: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2194: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2195: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2196: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2197: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2198: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2199: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2200: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2201: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2202: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2203: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2204: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2205: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2206: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2207: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2208: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2209: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2210: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2211: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2212: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2213: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2214: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2215: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2216: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2217: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2218: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2219: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2220: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2221: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2222: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2223: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2224: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2225: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2226: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2227: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2228: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2229: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2230: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2231: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2232: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2233: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2234: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2235: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2236: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2237: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2238: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2239: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2240: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2241: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2242: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2243: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2244: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2245: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2246: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2247: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2248: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2249: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2250: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2251: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2252: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2253: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2254: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2255: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2256: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2257: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2258: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2259: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2260: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2261: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2262: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2263: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2264: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2265: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2266: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2267: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2268: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2269: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2270: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2271: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2272: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2273: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2274: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2275: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2276: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2277: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2278: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2279: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2280: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2281: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2282: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2283: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2284: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2285: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2286: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2287: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 26061 at Fri Mar 31 15:07:50 UTC 2017 kill -USR1 26061 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 26061 killed at Fri Mar 31 15:07:51 UTC 2017 ssl.sh: SSL Client Authentication Extended Test - server fips/client normal - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 15:07:51 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:07:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:07:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2288: Server never started - PASSED kill -0 28323 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28323 found at Fri Mar 31 15:07:57 UTC 2017 selfserv_9626 with PID 28323 started at Fri Mar 31 15:07:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2289: TLS Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 28323 at Fri Mar 31 15:07:58 UTC 2017 kill -USR1 28323 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28323 killed at Fri Mar 31 15:07:58 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:07:58 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:07:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:08:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2290: Server never started - PASSED kill -0 28393 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28393 found at Fri Mar 31 15:08:04 UTC 2017 selfserv_9626 with PID 28393 started at Fri Mar 31 15:08:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2291: TLS Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 28393 at Fri Mar 31 15:08:05 UTC 2017 kill -USR1 28393 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28393 killed at Fri Mar 31 15:08:05 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:08:05 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:08:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:08:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2292: Server never started - PASSED kill -0 28479 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28479 found at Fri Mar 31 15:08:11 UTC 2017 selfserv_9626 with PID 28479 started at Fri Mar 31 15:08:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2293: TLS Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 28479 at Fri Mar 31 15:08:12 UTC 2017 kill -USR1 28479 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28479 killed at Fri Mar 31 15:08:12 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 15:08:12 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:08:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:08:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2294: Server never started - PASSED kill -0 28548 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28548 found at Fri Mar 31 15:08:18 UTC 2017 selfserv_9626 with PID 28548 started at Fri Mar 31 15:08:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2295: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 28548 at Fri Mar 31 15:08:19 UTC 2017 kill -USR1 28548 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28548 killed at Fri Mar 31 15:08:19 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:08:19 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:08:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:08:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2296: Server never started - PASSED kill -0 28618 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28618 found at Fri Mar 31 15:08:25 UTC 2017 selfserv_9626 with PID 28618 started at Fri Mar 31 15:08:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2297: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 28618 at Fri Mar 31 15:08:26 UTC 2017 kill -USR1 28618 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28618 killed at Fri Mar 31 15:08:26 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:08:26 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:08:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:08:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2298: Server never started - PASSED kill -0 28687 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28687 found at Fri Mar 31 15:08:32 UTC 2017 selfserv_9626 with PID 28687 started at Fri Mar 31 15:08:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2299: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 28687 at Fri Mar 31 15:08:33 UTC 2017 kill -USR1 28687 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28687 killed at Fri Mar 31 15:08:33 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 15:08:34 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:08:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:08:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2300: Server never started - PASSED kill -0 28756 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28756 found at Fri Mar 31 15:08:40 UTC 2017 selfserv_9626 with PID 28756 started at Fri Mar 31 15:08:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2301: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 28756 at Fri Mar 31 15:08:40 UTC 2017 kill -USR1 28756 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28756 killed at Fri Mar 31 15:08:41 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:08:41 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:08:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:08:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2302: Server never started - PASSED kill -0 28829 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28829 found at Fri Mar 31 15:08:47 UTC 2017 selfserv_9626 with PID 28829 started at Fri Mar 31 15:08:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2303: SSL3 Request don't require client auth (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 28829 at Fri Mar 31 15:08:47 UTC 2017 kill -USR1 28829 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28829 killed at Fri Mar 31 15:08:48 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:08:48 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:08:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:08:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2304: Server never started - PASSED kill -0 28898 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28898 found at Fri Mar 31 15:08:54 UTC 2017 selfserv_9626 with PID 28898 started at Fri Mar 31 15:08:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2305: SSL3 Request don't require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 28898 at Fri Mar 31 15:08:54 UTC 2017 kill -USR1 28898 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28898 killed at Fri Mar 31 15:08:55 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 15:08:55 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:08:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:09:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2306: Server never started - PASSED kill -0 28967 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28967 found at Fri Mar 31 15:09:01 UTC 2017 selfserv_9626 with PID 28967 started at Fri Mar 31 15:09:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2307: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 28967 at Fri Mar 31 15:09:01 UTC 2017 kill -USR1 28967 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28967 killed at Fri Mar 31 15:09:02 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:09:02 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:09:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:09:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2308: Server never started - PASSED kill -0 29051 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29051 found at Fri Mar 31 15:09:08 UTC 2017 selfserv_9626 with PID 29051 started at Fri Mar 31 15:09:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2309: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 29051 at Fri Mar 31 15:09:09 UTC 2017 kill -USR1 29051 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29051 killed at Fri Mar 31 15:09:09 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:09:09 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:09:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:09:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2310: Server never started - PASSED kill -0 29120 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29120 found at Fri Mar 31 15:09:15 UTC 2017 selfserv_9626 with PID 29120 started at Fri Mar 31 15:09:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2311: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 29120 at Fri Mar 31 15:09:16 UTC 2017 kill -USR1 29120 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29120 killed at Fri Mar 31 15:09:16 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 15:09:16 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:09:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:09:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2312: Server never started - PASSED kill -0 29190 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29190 found at Fri Mar 31 15:09:22 UTC 2017 selfserv_9626 with PID 29190 started at Fri Mar 31 15:09:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2313: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 29190 at Fri Mar 31 15:09:23 UTC 2017 kill -USR1 29190 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29190 killed at Fri Mar 31 15:09:23 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:09:23 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:09:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:09:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2314: Server never started - PASSED kill -0 29259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29259 found at Fri Mar 31 15:09:29 UTC 2017 selfserv_9626 with PID 29259 started at Fri Mar 31 15:09:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2315: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 29259 at Fri Mar 31 15:09:30 UTC 2017 kill -USR1 29259 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29259 killed at Fri Mar 31 15:09:30 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:09:30 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:09:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:09:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2316: Server never started - PASSED kill -0 29328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29328 found at Fri Mar 31 15:09:36 UTC 2017 selfserv_9626 with PID 29328 started at Fri Mar 31 15:09:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2317: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 29328 at Fri Mar 31 15:09:37 UTC 2017 kill -USR1 29328 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29328 killed at Fri Mar 31 15:09:37 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 15:09:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:09:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:09:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2318: Server never started - PASSED kill -0 29401 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29401 found at Fri Mar 31 15:09:43 UTC 2017 selfserv_9626 with PID 29401 started at Fri Mar 31 15:09:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2319: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 29401 at Fri Mar 31 15:09:44 UTC 2017 kill -USR1 29401 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29401 killed at Fri Mar 31 15:09:44 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:09:45 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:09:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:09:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2320: Server never started - PASSED kill -0 29470 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29470 found at Fri Mar 31 15:09:51 UTC 2017 selfserv_9626 with PID 29470 started at Fri Mar 31 15:09:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2321: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 29470 at Fri Mar 31 15:09:51 UTC 2017 kill -USR1 29470 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29470 killed at Fri Mar 31 15:09:52 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:09:52 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:09:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:09:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2322: Server never started - PASSED kill -0 29539 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29539 found at Fri Mar 31 15:09:58 UTC 2017 selfserv_9626 with PID 29539 started at Fri Mar 31 15:09:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2323: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 29539 at Fri Mar 31 15:09:58 UTC 2017 kill -USR1 29539 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29539 killed at Fri Mar 31 15:09:59 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 15:09:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:09:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:10:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2324: Server never started - PASSED kill -0 29609 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29609 found at Fri Mar 31 15:10:05 UTC 2017 selfserv_9626 with PID 29609 started at Fri Mar 31 15:10:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2325: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 29609 at Fri Mar 31 15:10:05 UTC 2017 kill -USR1 29609 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29609 killed at Fri Mar 31 15:10:06 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:10:06 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:10:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:10:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2326: Server never started - PASSED kill -0 29692 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29692 found at Fri Mar 31 15:10:12 UTC 2017 selfserv_9626 with PID 29692 started at Fri Mar 31 15:10:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2327: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 29692 at Fri Mar 31 15:10:12 UTC 2017 kill -USR1 29692 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29692 killed at Fri Mar 31 15:10:13 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:10:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:10:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:10:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2328: Server never started - PASSED kill -0 29761 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29761 found at Fri Mar 31 15:10:19 UTC 2017 selfserv_9626 with PID 29761 started at Fri Mar 31 15:10:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2329: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 29761 at Fri Mar 31 15:10:19 UTC 2017 kill -USR1 29761 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29761 killed at Fri Mar 31 15:10:20 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 15:10:20 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:10:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:10:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2330: Server never started - PASSED kill -0 29831 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29831 found at Fri Mar 31 15:10:26 UTC 2017 selfserv_9626 with PID 29831 started at Fri Mar 31 15:10:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2331: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 29831 at Fri Mar 31 15:10:27 UTC 2017 kill -USR1 29831 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29831 killed at Fri Mar 31 15:10:27 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:10:27 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:10:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:10:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2332: Server never started - PASSED kill -0 29900 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29900 found at Fri Mar 31 15:10:33 UTC 2017 selfserv_9626 with PID 29900 started at Fri Mar 31 15:10:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2333: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 29900 at Fri Mar 31 15:10:34 UTC 2017 kill -USR1 29900 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29900 killed at Fri Mar 31 15:10:34 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:10:34 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:10:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:10:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2334: Server never started - PASSED kill -0 29969 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29969 found at Fri Mar 31 15:10:40 UTC 2017 selfserv_9626 with PID 29969 started at Fri Mar 31 15:10:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2335: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 29969 at Fri Mar 31 15:10:41 UTC 2017 kill -USR1 29969 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29969 killed at Fri Mar 31 15:10:41 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 15:10:41 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:10:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:10:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2336: Server never started - PASSED kill -0 30042 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30042 found at Fri Mar 31 15:10:47 UTC 2017 selfserv_9626 with PID 30042 started at Fri Mar 31 15:10:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2337: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 30042 at Fri Mar 31 15:10:48 UTC 2017 kill -USR1 30042 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30042 killed at Fri Mar 31 15:10:48 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:10:48 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:10:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:10:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2338: Server never started - PASSED kill -0 30111 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30111 found at Fri Mar 31 15:10:54 UTC 2017 selfserv_9626 with PID 30111 started at Fri Mar 31 15:10:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2339: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 30111 at Fri Mar 31 15:10:55 UTC 2017 kill -USR1 30111 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30111 killed at Fri Mar 31 15:10:55 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:10:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:10:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:11:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2340: Server never started - PASSED kill -0 30180 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30180 found at Fri Mar 31 15:11:01 UTC 2017 selfserv_9626 with PID 30180 started at Fri Mar 31 15:11:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2341: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 30180 at Fri Mar 31 15:11:02 UTC 2017 kill -USR1 30180 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30180 killed at Fri Mar 31 15:11:02 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 15:11:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:11:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:11:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2342: Server never started - PASSED kill -0 30263 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30263 found at Fri Mar 31 15:11:09 UTC 2017 selfserv_9626 with PID 30263 started at Fri Mar 31 15:11:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2343: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 30263 at Fri Mar 31 15:11:09 UTC 2017 kill -USR1 30263 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30263 killed at Fri Mar 31 15:11:10 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:11:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:11:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:11:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2344: Server never started - PASSED kill -0 30332 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30332 found at Fri Mar 31 15:11:16 UTC 2017 selfserv_9626 with PID 30332 started at Fri Mar 31 15:11:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2345: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 30332 at Fri Mar 31 15:11:16 UTC 2017 kill -USR1 30332 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30332 killed at Fri Mar 31 15:11:17 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:11:17 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:11:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:11:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2346: Server never started - PASSED kill -0 30401 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30401 found at Fri Mar 31 15:11:23 UTC 2017 selfserv_9626 with PID 30401 started at Fri Mar 31 15:11:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2347: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 30401 at Fri Mar 31 15:11:23 UTC 2017 kill -USR1 30401 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30401 killed at Fri Mar 31 15:11:24 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:11:24 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:11:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:11:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2348: Server never started - PASSED kill -0 30486 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30486 found at Fri Mar 31 15:11:30 UTC 2017 selfserv_9626 with PID 30486 started at Fri Mar 31 15:11:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2349: TLS Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 30486 at Fri Mar 31 15:11:31 UTC 2017 kill -USR1 30486 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30486 killed at Fri Mar 31 15:11:31 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:11:31 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:11:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:11:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2350: Server never started - PASSED kill -0 30555 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30555 found at Fri Mar 31 15:11:37 UTC 2017 selfserv_9626 with PID 30555 started at Fri Mar 31 15:11:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2351: TLS Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 30555 at Fri Mar 31 15:11:38 UTC 2017 kill -USR1 30555 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30555 killed at Fri Mar 31 15:11:38 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:11:38 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:11:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:11:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2352: Server never started - PASSED kill -0 30627 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30627 found at Fri Mar 31 15:11:44 UTC 2017 selfserv_9626 with PID 30627 started at Fri Mar 31 15:11:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2353: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 30627 at Fri Mar 31 15:11:45 UTC 2017 kill -USR1 30627 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30627 killed at Fri Mar 31 15:11:45 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:11:45 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:11:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:11:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2354: Server never started - PASSED kill -0 30697 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30697 found at Fri Mar 31 15:11:51 UTC 2017 selfserv_9626 with PID 30697 started at Fri Mar 31 15:11:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2355: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 30697 at Fri Mar 31 15:11:52 UTC 2017 kill -USR1 30697 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30697 killed at Fri Mar 31 15:11:52 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:11:52 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:11:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:11:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2356: Server never started - PASSED kill -0 30766 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30766 found at Fri Mar 31 15:11:58 UTC 2017 selfserv_9626 with PID 30766 started at Fri Mar 31 15:11:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2357: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 30766 at Fri Mar 31 15:11:59 UTC 2017 kill -USR1 30766 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30766 killed at Fri Mar 31 15:11:59 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:11:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:12:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:12:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2358: Server never started - PASSED kill -0 30835 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30835 found at Fri Mar 31 15:12:05 UTC 2017 selfserv_9626 with PID 30835 started at Fri Mar 31 15:12:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2359: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 30835 at Fri Mar 31 15:12:06 UTC 2017 kill -USR1 30835 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30835 killed at Fri Mar 31 15:12:06 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:12:07 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:12:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:12:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2360: Server never started - PASSED kill -0 30918 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30918 found at Fri Mar 31 15:12:13 UTC 2017 selfserv_9626 with PID 30918 started at Fri Mar 31 15:12:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2361: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 30918 at Fri Mar 31 15:12:13 UTC 2017 kill -USR1 30918 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30918 killed at Fri Mar 31 15:12:14 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:12:14 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:12:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:12:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2362: Server never started - PASSED kill -0 30987 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30987 found at Fri Mar 31 15:12:20 UTC 2017 selfserv_9626 with PID 30987 started at Fri Mar 31 15:12:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2363: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 30987 at Fri Mar 31 15:12:20 UTC 2017 kill -USR1 30987 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30987 killed at Fri Mar 31 15:12:21 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:12:21 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:12:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:12:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2364: Server never started - PASSED kill -0 31056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31056 found at Fri Mar 31 15:12:27 UTC 2017 selfserv_9626 with PID 31056 started at Fri Mar 31 15:12:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2365: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 31056 at Fri Mar 31 15:12:27 UTC 2017 kill -USR1 31056 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31056 killed at Fri Mar 31 15:12:28 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:12:28 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:12:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:12:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2366: Server never started - PASSED kill -0 31126 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31126 found at Fri Mar 31 15:12:34 UTC 2017 selfserv_9626 with PID 31126 started at Fri Mar 31 15:12:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2367: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 31126 at Fri Mar 31 15:12:34 UTC 2017 kill -USR1 31126 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31126 killed at Fri Mar 31 15:12:35 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:12:35 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:12:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:12:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2368: Server never started - PASSED kill -0 31195 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31195 found at Fri Mar 31 15:12:41 UTC 2017 selfserv_9626 with PID 31195 started at Fri Mar 31 15:12:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2369: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 31195 at Fri Mar 31 15:12:41 UTC 2017 kill -USR1 31195 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31195 killed at Fri Mar 31 15:12:42 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:12:42 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:12:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:12:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2370: Server never started - PASSED kill -0 31268 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31268 found at Fri Mar 31 15:12:48 UTC 2017 selfserv_9626 with PID 31268 started at Fri Mar 31 15:12:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2371: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 31268 at Fri Mar 31 15:12:49 UTC 2017 kill -USR1 31268 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31268 killed at Fri Mar 31 15:12:49 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:12:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:12:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:12:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2372: Server never started - PASSED kill -0 31337 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31337 found at Fri Mar 31 15:12:55 UTC 2017 selfserv_9626 with PID 31337 started at Fri Mar 31 15:12:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2373: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 31337 at Fri Mar 31 15:12:56 UTC 2017 kill -USR1 31337 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31337 killed at Fri Mar 31 15:12:56 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:12:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:12:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:13:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2374: Server never started - PASSED kill -0 31406 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31406 found at Fri Mar 31 15:13:02 UTC 2017 selfserv_9626 with PID 31406 started at Fri Mar 31 15:13:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2375: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 31406 at Fri Mar 31 15:13:03 UTC 2017 kill -USR1 31406 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31406 killed at Fri Mar 31 15:13:03 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:13:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:13:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:13:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2376: Server never started - PASSED kill -0 31489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31489 found at Fri Mar 31 15:13:09 UTC 2017 selfserv_9626 with PID 31489 started at Fri Mar 31 15:13:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2377: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 31489 at Fri Mar 31 15:13:10 UTC 2017 kill -USR1 31489 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31489 killed at Fri Mar 31 15:13:10 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:13:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:13:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:13:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2378: Server never started - PASSED kill -0 31559 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31559 found at Fri Mar 31 15:13:16 UTC 2017 selfserv_9626 with PID 31559 started at Fri Mar 31 15:13:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2379: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 31559 at Fri Mar 31 15:13:17 UTC 2017 kill -USR1 31559 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31559 killed at Fri Mar 31 15:13:17 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:13:18 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:13:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:13:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2380: Server never started - PASSED kill -0 31628 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31628 found at Fri Mar 31 15:13:24 UTC 2017 selfserv_9626 with PID 31628 started at Fri Mar 31 15:13:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2381: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 31628 at Fri Mar 31 15:13:24 UTC 2017 kill -USR1 31628 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31628 killed at Fri Mar 31 15:13:25 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:13:25 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:13:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:13:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2382: Server never started - PASSED kill -0 31698 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31698 found at Fri Mar 31 15:13:31 UTC 2017 selfserv_9626 with PID 31698 started at Fri Mar 31 15:13:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2383: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 31698 at Fri Mar 31 15:13:31 UTC 2017 kill -USR1 31698 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31698 killed at Fri Mar 31 15:13:32 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:13:32 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:13:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:13:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2384: Server never started - PASSED kill -0 31767 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31767 found at Fri Mar 31 15:13:38 UTC 2017 selfserv_9626 with PID 31767 started at Fri Mar 31 15:13:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2385: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 31767 at Fri Mar 31 15:13:38 UTC 2017 kill -USR1 31767 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31767 killed at Fri Mar 31 15:13:39 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:13:39 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:13:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:13:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2386: Server never started - PASSED kill -0 31839 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31839 found at Fri Mar 31 15:13:45 UTC 2017 selfserv_9626 with PID 31839 started at Fri Mar 31 15:13:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2387: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 31839 at Fri Mar 31 15:13:45 UTC 2017 kill -USR1 31839 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31839 killed at Fri Mar 31 15:13:46 UTC 2017 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server fips/client normal - with ECC =============================== ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9626 starting at Fri Mar 31 15:13:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:13:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:13:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2388: Server never started - PASSED kill -0 31994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31994 found at Fri Mar 31 15:13:52 UTC 2017 selfserv_9626 with PID 31994 started at Fri Mar 31 15:13:52 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -c 1000 -C c -V ssl3:ssl3 \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:13:52 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:13:53 UTC 2017 ssl.sh: #2389: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 31994 at Fri Mar 31 15:13:53 UTC 2017 kill -USR1 31994 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31994 killed at Fri Mar 31 15:13:54 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9626 starting at Fri Mar 31 15:13:54 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:13:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:13:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2390: Server never started - PASSED kill -0 32068 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32068 found at Fri Mar 31 15:14:00 UTC 2017 selfserv_9626 with PID 32068 started at Fri Mar 31 15:14:00 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -c 1000 -C c \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:14:00 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:14:00 UTC 2017 ssl.sh: #2391: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 32068 at Fri Mar 31 15:14:00 UTC 2017 kill -USR1 32068 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32068 killed at Fri Mar 31 15:14:01 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9626 starting at Fri Mar 31 15:14:01 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:14:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:14:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2392: Server never started - PASSED kill -0 32153 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32153 found at Fri Mar 31 15:14:07 UTC 2017 selfserv_9626 with PID 32153 started at Fri Mar 31 15:14:07 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -c 1000 -C c -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:14:07 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:14:07 UTC 2017 ssl.sh: #2393: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 32153 at Fri Mar 31 15:14:08 UTC 2017 kill -USR1 32153 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32153 killed at Fri Mar 31 15:14:08 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9626 starting at Fri Mar 31 15:14:08 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:14:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:14:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2394: Server never started - PASSED kill -0 32231 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32231 found at Fri Mar 31 15:14:14 UTC 2017 selfserv_9626 with PID 32231 started at Fri Mar 31 15:14:14 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C c -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:14:14 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:14:15 UTC 2017 ssl.sh: #2395: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 32231 at Fri Mar 31 15:14:15 UTC 2017 kill -USR1 32231 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32231 killed at Fri Mar 31 15:14:15 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9626 starting at Fri Mar 31 15:14:15 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:14:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:14:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2396: Server never started - PASSED kill -0 32305 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32305 found at Fri Mar 31 15:14:21 UTC 2017 selfserv_9626 with PID 32305 started at Fri Mar 31 15:14:21 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C c -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:14:21 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:14:22 UTC 2017 ssl.sh: #2397: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 32305 at Fri Mar 31 15:14:22 UTC 2017 kill -USR1 32305 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32305 killed at Fri Mar 31 15:14:22 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9626 starting at Fri Mar 31 15:14:23 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:14:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:14:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2398: Server never started - PASSED kill -0 32379 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32379 found at Fri Mar 31 15:14:28 UTC 2017 selfserv_9626 with PID 32379 started at Fri Mar 31 15:14:29 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:14:29 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:14:29 UTC 2017 ssl.sh: #2399: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 32379 at Fri Mar 31 15:14:29 UTC 2017 kill -USR1 32379 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32379 killed at Fri Mar 31 15:14:30 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9626 starting at Fri Mar 31 15:14:30 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:14:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:14:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2400: Server never started - PASSED kill -0 32454 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32454 found at Fri Mar 31 15:14:36 UTC 2017 selfserv_9626 with PID 32454 started at Fri Mar 31 15:14:36 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:14:36 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:14:36 UTC 2017 ssl.sh: #2401: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 32454 at Fri Mar 31 15:14:36 UTC 2017 kill -USR1 32454 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32454 killed at Fri Mar 31 15:14:37 UTC 2017 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:14:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:14:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:14:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2402: Server never started - PASSED kill -0 32548 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32548 found at Fri Mar 31 15:14:43 UTC 2017 selfserv_9626 with PID 32548 started at Fri Mar 31 15:14:43 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:14:43 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:14:44 UTC 2017 ssl.sh: #2403: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 32548 at Fri Mar 31 15:14:44 UTC 2017 kill -USR1 32548 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32548 killed at Fri Mar 31 15:14:44 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:14:44 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:14:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:14:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2404: Server never started - PASSED kill -0 32622 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32622 found at Fri Mar 31 15:14:50 UTC 2017 selfserv_9626 with PID 32622 started at Fri Mar 31 15:14:50 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:14:50 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:14:51 UTC 2017 ssl.sh: #2405: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 32622 at Fri Mar 31 15:14:51 UTC 2017 kill -USR1 32622 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32622 killed at Fri Mar 31 15:14:51 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:14:51 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:14:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:14:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2406: Server never started - PASSED kill -0 32697 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32697 found at Fri Mar 31 15:14:57 UTC 2017 selfserv_9626 with PID 32697 started at Fri Mar 31 15:14:57 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:14:57 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:14:58 UTC 2017 ssl.sh: #2407: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 32697 at Fri Mar 31 15:14:58 UTC 2017 kill -USR1 32697 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32697 killed at Fri Mar 31 15:14:58 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:14:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:14:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:15:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2408: Server never started - PASSED kill -0 303 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 303 found at Fri Mar 31 15:15:05 UTC 2017 selfserv_9626 with PID 303 started at Fri Mar 31 15:15:05 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:15:05 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:15:05 UTC 2017 ssl.sh: #2409: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 303 at Fri Mar 31 15:15:05 UTC 2017 kill -USR1 303 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 303 killed at Fri Mar 31 15:15:06 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9626 starting at Fri Mar 31 15:15:06 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:15:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:15:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2410: Server never started - PASSED kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 395 found at Fri Mar 31 15:15:12 UTC 2017 selfserv_9626 with PID 395 started at Fri Mar 31 15:15:12 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:15:12 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:15:12 UTC 2017 ssl.sh: #2411: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 395 at Fri Mar 31 15:15:12 UTC 2017 kill -USR1 395 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 395 killed at Fri Mar 31 15:15:13 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:15:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:15:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:15:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2412: Server never started - PASSED kill -0 470 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 470 found at Fri Mar 31 15:15:19 UTC 2017 selfserv_9626 with PID 470 started at Fri Mar 31 15:15:19 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:15:19 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:15:20 UTC 2017 ssl.sh: #2413: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 470 at Fri Mar 31 15:15:20 UTC 2017 kill -USR1 470 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 470 killed at Fri Mar 31 15:15:20 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9626 starting at Fri Mar 31 15:15:20 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:15:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:15:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2414: Server never started - PASSED kill -0 545 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 545 found at Fri Mar 31 15:15:26 UTC 2017 selfserv_9626 with PID 545 started at Fri Mar 31 15:15:26 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:15:26 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:15:27 UTC 2017 ssl.sh: #2415: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 545 at Fri Mar 31 15:15:27 UTC 2017 kill -USR1 545 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 545 killed at Fri Mar 31 15:15:27 UTC 2017 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:15:28 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:15:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:15:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2416: Server never started - PASSED kill -0 639 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 639 found at Fri Mar 31 15:15:33 UTC 2017 selfserv_9626 with PID 639 started at Fri Mar 31 15:15:33 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:15:34 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:15:34 UTC 2017 ssl.sh: #2417: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 639 at Fri Mar 31 15:15:34 UTC 2017 kill -USR1 639 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 639 killed at Fri Mar 31 15:15:35 UTC 2017 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:15:35 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:15:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:15:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2418: Server never started - PASSED kill -0 713 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 713 found at Fri Mar 31 15:15:41 UTC 2017 selfserv_9626 with PID 713 started at Fri Mar 31 15:15:41 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:15:41 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:15:41 UTC 2017 ssl.sh: #2419: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 713 at Fri Mar 31 15:15:41 UTC 2017 kill -USR1 713 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 713 killed at Fri Mar 31 15:15:42 UTC 2017 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:15:42 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:15:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:15:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2420: Server never started - PASSED kill -0 790 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 790 found at Fri Mar 31 15:15:48 UTC 2017 selfserv_9626 with PID 790 started at Fri Mar 31 15:15:48 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:15:48 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:15:48 UTC 2017 ssl.sh: #2421: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 790 at Fri Mar 31 15:15:48 UTC 2017 kill -USR1 790 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 790 killed at Fri Mar 31 15:15:49 UTC 2017 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:15:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:15:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:15:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2422: Server never started - PASSED kill -0 865 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 865 found at Fri Mar 31 15:15:55 UTC 2017 selfserv_9626 with PID 865 started at Fri Mar 31 15:15:55 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:15:55 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:15:56 UTC 2017 ssl.sh: #2423: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 865 at Fri Mar 31 15:15:56 UTC 2017 kill -USR1 865 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 865 killed at Fri Mar 31 15:15:56 UTC 2017 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:15:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:15:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:16:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2424: Server never started - PASSED kill -0 939 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 939 found at Fri Mar 31 15:16:02 UTC 2017 selfserv_9626 with PID 939 started at Fri Mar 31 15:16:02 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:16:02 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:16:03 UTC 2017 ssl.sh: #2425: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 939 at Fri Mar 31 15:16:03 UTC 2017 kill -USR1 939 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 939 killed at Fri Mar 31 15:16:03 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9626 starting at Fri Mar 31 15:16:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:16:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:16:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2426: Server never started - PASSED kill -0 1043 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1043 found at Fri Mar 31 15:16:09 UTC 2017 selfserv_9626 with PID 1043 started at Fri Mar 31 15:16:09 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:16:09 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:16:10 UTC 2017 ssl.sh: #2427: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 1043 at Fri Mar 31 15:16:10 UTC 2017 kill -USR1 1043 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1043 killed at Fri Mar 31 15:16:10 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9626 starting at Fri Mar 31 15:16:11 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:16:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:16:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2428: Server never started - PASSED kill -0 1119 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1119 found at Fri Mar 31 15:16:17 UTC 2017 selfserv_9626 with PID 1119 started at Fri Mar 31 15:16:17 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:16:17 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:16:17 UTC 2017 ssl.sh: #2429: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 1119 at Fri Mar 31 15:16:17 UTC 2017 kill -USR1 1119 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1119 killed at Fri Mar 31 15:16:18 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9626 starting at Fri Mar 31 15:16:18 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:16:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:16:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2430: Server never started - PASSED kill -0 1197 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1197 found at Fri Mar 31 15:16:24 UTC 2017 selfserv_9626 with PID 1197 started at Fri Mar 31 15:16:24 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:16:24 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:16:24 UTC 2017 ssl.sh: #2431: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 1197 at Fri Mar 31 15:16:24 UTC 2017 kill -USR1 1197 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1197 killed at Fri Mar 31 15:16:25 UTC 2017 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9626 starting at Fri Mar 31 15:16:25 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:16:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:16:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2432: Server never started - PASSED kill -0 1271 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1271 found at Fri Mar 31 15:16:31 UTC 2017 selfserv_9626 with PID 1271 started at Fri Mar 31 15:16:31 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:16:31 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:16:32 UTC 2017 ssl.sh: #2433: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 1271 at Fri Mar 31 15:16:32 UTC 2017 kill -USR1 1271 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1271 killed at Fri Mar 31 15:16:32 UTC 2017 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9626 starting at Fri Mar 31 15:16:32 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:16:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:16:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2434: Server never started - PASSED kill -0 1346 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1346 found at Fri Mar 31 15:16:38 UTC 2017 selfserv_9626 with PID 1346 started at Fri Mar 31 15:16:38 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:16:38 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:16:39 UTC 2017 ssl.sh: #2435: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 1346 at Fri Mar 31 15:16:39 UTC 2017 kill -USR1 1346 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1346 killed at Fri Mar 31 15:16:39 UTC 2017 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:16:40 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:16:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:16:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2436: Server never started - PASSED kill -0 1438 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1438 found at Fri Mar 31 15:16:45 UTC 2017 selfserv_9626 with PID 1438 started at Fri Mar 31 15:16:46 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:16:46 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:16:46 UTC 2017 ssl.sh: #2437: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 1438 at Fri Mar 31 15:16:46 UTC 2017 kill -USR1 1438 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1438 killed at Fri Mar 31 15:16:47 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:16:47 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:16:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:16:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2438: Server never started - PASSED kill -0 1512 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1512 found at Fri Mar 31 15:16:53 UTC 2017 selfserv_9626 with PID 1512 started at Fri Mar 31 15:16:53 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:16:53 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:16:53 UTC 2017 ssl.sh: #2439: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 1512 at Fri Mar 31 15:16:53 UTC 2017 kill -USR1 1512 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1512 killed at Fri Mar 31 15:16:54 UTC 2017 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:16:54 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:16:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:16:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2440: Server never started - PASSED kill -0 1587 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1587 found at Fri Mar 31 15:17:00 UTC 2017 selfserv_9626 with PID 1587 started at Fri Mar 31 15:17:00 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:17:00 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:17:00 UTC 2017 ssl.sh: #2441: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 1587 at Fri Mar 31 15:17:01 UTC 2017 kill -USR1 1587 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1587 killed at Fri Mar 31 15:17:01 UTC 2017 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:17:01 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:17:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:17:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2442: Server never started - PASSED kill -0 1675 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1675 found at Fri Mar 31 15:17:07 UTC 2017 selfserv_9626 with PID 1675 started at Fri Mar 31 15:17:07 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:17:07 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:17:08 UTC 2017 ssl.sh: #2443: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 1675 at Fri Mar 31 15:17:08 UTC 2017 kill -USR1 1675 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1675 killed at Fri Mar 31 15:17:08 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9626 starting at Fri Mar 31 15:17:08 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:17:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:17:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2444: Server never started - PASSED kill -0 1749 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1749 found at Fri Mar 31 15:17:14 UTC 2017 selfserv_9626 with PID 1749 started at Fri Mar 31 15:17:14 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:17:14 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:17:15 UTC 2017 ssl.sh: #2445: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 1749 at Fri Mar 31 15:17:15 UTC 2017 kill -USR1 1749 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1749 killed at Fri Mar 31 15:17:15 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:17:16 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:17:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:17:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2446: Server never started - PASSED kill -0 1828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1828 found at Fri Mar 31 15:17:22 UTC 2017 selfserv_9626 with PID 1828 started at Fri Mar 31 15:17:22 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:17:22 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:17:22 UTC 2017 ssl.sh: #2447: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 1828 at Fri Mar 31 15:17:22 UTC 2017 kill -USR1 1828 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1828 killed at Fri Mar 31 15:17:23 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:17:23 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:17:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:17:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2448: Server never started - PASSED kill -0 1917 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1917 found at Fri Mar 31 15:17:29 UTC 2017 selfserv_9626 with PID 1917 started at Fri Mar 31 15:17:29 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:17:29 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:17:29 UTC 2017 ssl.sh: #2449: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 1917 at Fri Mar 31 15:17:29 UTC 2017 kill -USR1 1917 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1917 killed at Fri Mar 31 15:17:30 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9626 starting at Fri Mar 31 15:17:30 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:17:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:17:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2450: Server never started - PASSED kill -0 1992 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1992 found at Fri Mar 31 15:17:36 UTC 2017 selfserv_9626 with PID 1992 started at Fri Mar 31 15:17:36 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:17:36 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:17:37 UTC 2017 ssl.sh: #2451: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 1992 at Fri Mar 31 15:17:37 UTC 2017 kill -USR1 1992 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1992 killed at Fri Mar 31 15:17:37 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:17:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:17:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:17:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2452: Server never started - PASSED kill -0 2069 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2069 found at Fri Mar 31 15:17:43 UTC 2017 selfserv_9626 with PID 2069 started at Fri Mar 31 15:17:43 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:17:43 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:17:44 UTC 2017 ssl.sh: #2453: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 2069 at Fri Mar 31 15:17:44 UTC 2017 kill -USR1 2069 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2069 killed at Fri Mar 31 15:17:44 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:17:44 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:17:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:17:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2454: Server never started - PASSED kill -0 2143 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2143 found at Fri Mar 31 15:17:50 UTC 2017 selfserv_9626 with PID 2143 started at Fri Mar 31 15:17:50 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:17:50 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:17:51 UTC 2017 ssl.sh: #2455: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 2143 at Fri Mar 31 15:17:51 UTC 2017 kill -USR1 2143 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2143 killed at Fri Mar 31 15:17:51 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:17:52 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:17:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:17:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2456: Server never started - PASSED kill -0 2228 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2228 found at Fri Mar 31 15:17:58 UTC 2017 selfserv_9626 with PID 2228 started at Fri Mar 31 15:17:58 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:17:58 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:17:58 UTC 2017 ssl.sh: #2457: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 2228 at Fri Mar 31 15:17:58 UTC 2017 kill -USR1 2228 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2228 killed at Fri Mar 31 15:17:59 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9626 starting at Fri Mar 31 15:17:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:17:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:18:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2458: Server never started - PASSED kill -0 2312 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2312 found at Fri Mar 31 15:18:05 UTC 2017 selfserv_9626 with PID 2312 started at Fri Mar 31 15:18:05 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:18:05 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:18:05 UTC 2017 ssl.sh: #2459: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 2312 at Fri Mar 31 15:18:06 UTC 2017 kill -USR1 2312 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2312 killed at Fri Mar 31 15:18:06 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:18:06 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:18:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:18:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2460: Server never started - PASSED kill -0 2406 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2406 found at Fri Mar 31 15:18:12 UTC 2017 selfserv_9626 with PID 2406 started at Fri Mar 31 15:18:12 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:18:12 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:18:13 UTC 2017 ssl.sh: #2461: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 2406 at Fri Mar 31 15:18:13 UTC 2017 kill -USR1 2406 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2406 killed at Fri Mar 31 15:18:13 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:18:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:18:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:18:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2462: Server never started - PASSED kill -0 2484 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2484 found at Fri Mar 31 15:18:19 UTC 2017 selfserv_9626 with PID 2484 started at Fri Mar 31 15:18:19 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:18:19 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:18:20 UTC 2017 ssl.sh: #2463: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 2484 at Fri Mar 31 15:18:20 UTC 2017 kill -USR1 2484 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2484 killed at Fri Mar 31 15:18:20 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ---- selfserv_9626 starting at Fri Mar 31 15:18:21 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009F -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:18:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:18:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2464: Server never started - PASSED kill -0 2558 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2558 found at Fri Mar 31 15:18:26 UTC 2017 selfserv_9626 with PID 2558 started at Fri Mar 31 15:18:27 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:18:27 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:18:27 UTC 2017 ssl.sh: #2465: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 2558 at Fri Mar 31 15:18:27 UTC 2017 kill -USR1 2558 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2558 killed at Fri Mar 31 15:18:28 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:18:28 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:18:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:18:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2466: Server never started - PASSED kill -0 2650 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2650 found at Fri Mar 31 15:18:34 UTC 2017 selfserv_9626 with PID 2650 started at Fri Mar 31 15:18:34 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:18:34 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:18:34 UTC 2017 ssl.sh: #2467: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 2650 at Fri Mar 31 15:18:34 UTC 2017 kill -USR1 2650 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2650 killed at Fri Mar 31 15:18:35 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:18:35 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:18:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:18:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2468: Server never started - PASSED kill -0 2725 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2725 found at Fri Mar 31 15:18:41 UTC 2017 selfserv_9626 with PID 2725 started at Fri Mar 31 15:18:41 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:18:41 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:18:42 UTC 2017 ssl.sh: #2469: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 2725 at Fri Mar 31 15:18:42 UTC 2017 kill -USR1 2725 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2725 killed at Fri Mar 31 15:18:42 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:18:42 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:18:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:18:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2470: Server never started - PASSED kill -0 2817 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2817 found at Fri Mar 31 15:18:48 UTC 2017 selfserv_9626 with PID 2817 started at Fri Mar 31 15:18:48 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:18:48 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:18:49 UTC 2017 ssl.sh: #2471: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 2817 at Fri Mar 31 15:18:49 UTC 2017 kill -USR1 2817 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2817 killed at Fri Mar 31 15:18:49 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:18:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:18:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:18:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2472: Server never started - PASSED kill -0 2891 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2891 found at Fri Mar 31 15:18:55 UTC 2017 selfserv_9626 with PID 2891 started at Fri Mar 31 15:18:55 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n ExtendedSSLUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:18:56 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:18:56 UTC 2017 ssl.sh: #2473: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 2891 at Fri Mar 31 15:18:56 UTC 2017 kill -USR1 2891 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2891 killed at Fri Mar 31 15:18:57 UTC 2017 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -fips false -force FIPS mode disabled. ssl.sh: #2474: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/server -list ssl.sh: #2475: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #2476: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -fips false -force FIPS mode disabled. ssl.sh: #2477: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_server -list ssl.sh: #2478: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #2479: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -fips true -force FIPS mode enabled. ssl.sh: #2480: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -list ssl.sh: #2481: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #2482: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -fips true -force FIPS mode enabled. ssl.sh: #2483: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -list ssl.sh: #2484: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #2485: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips - with ECC =============================== selfserv_9626 starting at Fri Mar 31 15:19:02 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:19:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:19:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2486: Server never started - PASSED kill -0 3097 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3097 found at Fri Mar 31 15:19:08 UTC 2017 selfserv_9626 with PID 3097 started at Fri Mar 31 15:19:08 UTC 2017 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2487: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2488: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2489: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2490: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2491: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2492: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2493: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2494: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2495: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2496: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2497: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2498: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2499: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2500: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2501: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2502: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2503: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2504: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2505: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2506: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2507: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2508: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2509: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2510: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2511: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2512: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2513: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2514: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2515: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2516: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2517: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2518: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2519: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2520: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2521: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2522: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2523: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2524: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2525: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2526: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2527: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2528: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2529: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2530: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2531: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2532: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2533: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2534: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2535: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2536: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2537: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2538: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2539: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2540: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2541: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2542: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2543: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2544: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2545: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2546: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2547: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2548: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2549: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2550: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2551: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2552: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2553: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2554: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2555: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2556: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2557: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2558: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2559: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2560: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2561: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2562: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2563: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2564: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2565: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2566: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2567: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2568: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2569: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2570: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2571: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2572: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2573: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2574: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2575: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2576: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2577: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2578: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2579: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2580: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2581: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2582: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2583: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2584: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2585: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2586: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2587: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2588: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2589: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2590: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2591: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2592: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2593: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2594: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2595: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2596: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2597: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2598: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2599: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2600: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2601: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2602: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2603: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2604: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 3097 at Fri Mar 31 15:20:12 UTC 2017 kill -USR1 3097 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 3097 killed at Fri Mar 31 15:20:13 UTC 2017 ssl.sh: SSL Client Authentication - server normal/client fips - with ECC =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 15:20:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:20:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:20:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2605: Server never started - PASSED kill -0 5422 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5422 found at Fri Mar 31 15:20:19 UTC 2017 selfserv_9626 with PID 5422 started at Fri Mar 31 15:20:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2606: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 5422 at Fri Mar 31 15:20:20 UTC 2017 kill -USR1 5422 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5422 killed at Fri Mar 31 15:20:20 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:20:20 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:20:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:20:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2607: Server never started - PASSED kill -0 5491 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5491 found at Fri Mar 31 15:20:26 UTC 2017 selfserv_9626 with PID 5491 started at Fri Mar 31 15:20:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2608: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 5491 at Fri Mar 31 15:20:27 UTC 2017 kill -USR1 5491 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5491 killed at Fri Mar 31 15:20:27 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:20:27 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:20:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:20:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2609: Server never started - PASSED kill -0 5560 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5560 found at Fri Mar 31 15:20:33 UTC 2017 selfserv_9626 with PID 5560 started at Fri Mar 31 15:20:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2610: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 5560 at Fri Mar 31 15:20:34 UTC 2017 kill -USR1 5560 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5560 killed at Fri Mar 31 15:20:34 UTC 2017 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 15:20:35 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:20:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:20:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2611: Server never started - PASSED kill -0 5636 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5636 found at Fri Mar 31 15:20:40 UTC 2017 selfserv_9626 with PID 5636 started at Fri Mar 31 15:20:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2612: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 5636 at Fri Mar 31 15:20:41 UTC 2017 kill -USR1 5636 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5636 killed at Fri Mar 31 15:20:41 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:20:42 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:20:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:20:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2613: Server never started - PASSED kill -0 5708 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5708 found at Fri Mar 31 15:20:48 UTC 2017 selfserv_9626 with PID 5708 started at Fri Mar 31 15:20:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2614: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 5708 at Fri Mar 31 15:20:48 UTC 2017 kill -USR1 5708 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5708 killed at Fri Mar 31 15:20:49 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:20:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:20:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:20:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2615: Server never started - PASSED kill -0 5779 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5779 found at Fri Mar 31 15:20:55 UTC 2017 selfserv_9626 with PID 5779 started at Fri Mar 31 15:20:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2616: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 5779 at Fri Mar 31 15:20:55 UTC 2017 kill -USR1 5779 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5779 killed at Fri Mar 31 15:20:56 UTC 2017 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 15:20:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:20:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:21:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2617: Server never started - PASSED kill -0 5855 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5855 found at Fri Mar 31 15:21:02 UTC 2017 selfserv_9626 with PID 5855 started at Fri Mar 31 15:21:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2618: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 5855 at Fri Mar 31 15:21:02 UTC 2017 kill -USR1 5855 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5855 killed at Fri Mar 31 15:21:03 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:21:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:21:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:21:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2619: Server never started - PASSED kill -0 5937 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5937 found at Fri Mar 31 15:21:09 UTC 2017 selfserv_9626 with PID 5937 started at Fri Mar 31 15:21:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2620: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 5937 at Fri Mar 31 15:21:10 UTC 2017 kill -USR1 5937 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5937 killed at Fri Mar 31 15:21:10 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:21:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:21:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:21:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2621: Server never started - PASSED kill -0 6006 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6006 found at Fri Mar 31 15:21:16 UTC 2017 selfserv_9626 with PID 6006 started at Fri Mar 31 15:21:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2622: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 6006 at Fri Mar 31 15:21:17 UTC 2017 kill -USR1 6006 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6006 killed at Fri Mar 31 15:21:17 UTC 2017 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 15:21:17 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:21:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:21:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2623: Server never started - PASSED kill -0 6084 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6084 found at Fri Mar 31 15:21:23 UTC 2017 selfserv_9626 with PID 6084 started at Fri Mar 31 15:21:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2624: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 6084 at Fri Mar 31 15:21:24 UTC 2017 kill -USR1 6084 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6084 killed at Fri Mar 31 15:21:24 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:21:24 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:21:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:21:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2625: Server never started - PASSED kill -0 6154 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6154 found at Fri Mar 31 15:21:30 UTC 2017 selfserv_9626 with PID 6154 started at Fri Mar 31 15:21:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2626: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 6154 at Fri Mar 31 15:21:31 UTC 2017 kill -USR1 6154 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6154 killed at Fri Mar 31 15:21:31 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:21:32 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:21:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:21:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2627: Server never started - PASSED kill -0 6223 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6223 found at Fri Mar 31 15:21:38 UTC 2017 selfserv_9626 with PID 6223 started at Fri Mar 31 15:21:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2628: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 6223 at Fri Mar 31 15:21:38 UTC 2017 kill -USR1 6223 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6223 killed at Fri Mar 31 15:21:39 UTC 2017 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 15:21:39 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:21:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:21:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2629: Server never started - PASSED kill -0 6302 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6302 found at Fri Mar 31 15:21:45 UTC 2017 selfserv_9626 with PID 6302 started at Fri Mar 31 15:21:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2630: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 6302 at Fri Mar 31 15:21:45 UTC 2017 kill -USR1 6302 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6302 killed at Fri Mar 31 15:21:46 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:21:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:21:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:21:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2631: Server never started - PASSED kill -0 6371 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6371 found at Fri Mar 31 15:21:52 UTC 2017 selfserv_9626 with PID 6371 started at Fri Mar 31 15:21:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2632: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 6371 at Fri Mar 31 15:21:52 UTC 2017 kill -USR1 6371 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6371 killed at Fri Mar 31 15:21:53 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:21:53 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:21:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:21:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2633: Server never started - PASSED kill -0 6440 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6440 found at Fri Mar 31 15:21:59 UTC 2017 selfserv_9626 with PID 6440 started at Fri Mar 31 15:21:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2634: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 6440 at Fri Mar 31 15:21:59 UTC 2017 kill -USR1 6440 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6440 killed at Fri Mar 31 15:22:00 UTC 2017 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:22:00 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:22:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:22:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2635: Server never started - PASSED kill -0 6529 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6529 found at Fri Mar 31 15:22:06 UTC 2017 selfserv_9626 with PID 6529 started at Fri Mar 31 15:22:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2636: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 6529 at Fri Mar 31 15:22:07 UTC 2017 kill -USR1 6529 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6529 killed at Fri Mar 31 15:22:07 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:22:07 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:22:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:22:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2637: Server never started - PASSED kill -0 6611 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6611 found at Fri Mar 31 15:22:13 UTC 2017 selfserv_9626 with PID 6611 started at Fri Mar 31 15:22:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2638: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 6611 at Fri Mar 31 15:22:14 UTC 2017 kill -USR1 6611 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6611 killed at Fri Mar 31 15:22:14 UTC 2017 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:22:14 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:22:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:22:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2639: Server never started - PASSED kill -0 6684 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6684 found at Fri Mar 31 15:22:20 UTC 2017 selfserv_9626 with PID 6684 started at Fri Mar 31 15:22:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2640: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 6684 at Fri Mar 31 15:22:21 UTC 2017 kill -USR1 6684 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6684 killed at Fri Mar 31 15:22:21 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:22:21 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:22:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:22:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2641: Server never started - PASSED kill -0 6754 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6754 found at Fri Mar 31 15:22:27 UTC 2017 selfserv_9626 with PID 6754 started at Fri Mar 31 15:22:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2642: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 6754 at Fri Mar 31 15:22:28 UTC 2017 kill -USR1 6754 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6754 killed at Fri Mar 31 15:22:28 UTC 2017 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:22:29 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:22:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:22:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2643: Server never started - PASSED kill -0 6827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6827 found at Fri Mar 31 15:22:35 UTC 2017 selfserv_9626 with PID 6827 started at Fri Mar 31 15:22:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2644: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 6827 at Fri Mar 31 15:22:35 UTC 2017 kill -USR1 6827 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6827 killed at Fri Mar 31 15:22:36 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:22:36 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:22:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:22:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2645: Server never started - PASSED kill -0 6896 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6896 found at Fri Mar 31 15:22:42 UTC 2017 selfserv_9626 with PID 6896 started at Fri Mar 31 15:22:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2646: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 6896 at Fri Mar 31 15:22:42 UTC 2017 kill -USR1 6896 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6896 killed at Fri Mar 31 15:22:43 UTC 2017 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:22:43 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:22:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:22:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2647: Server never started - PASSED kill -0 6973 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6973 found at Fri Mar 31 15:22:49 UTC 2017 selfserv_9626 with PID 6973 started at Fri Mar 31 15:22:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2648: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 6973 at Fri Mar 31 15:22:49 UTC 2017 kill -USR1 6973 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6973 killed at Fri Mar 31 15:22:50 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:22:50 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:22:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:22:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2649: Server never started - PASSED kill -0 7042 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7042 found at Fri Mar 31 15:22:56 UTC 2017 selfserv_9626 with PID 7042 started at Fri Mar 31 15:22:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2650: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 7042 at Fri Mar 31 15:22:56 UTC 2017 kill -USR1 7042 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7042 killed at Fri Mar 31 15:22:57 UTC 2017 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:22:57 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:22:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:23:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2651: Server never started - PASSED kill -0 7115 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7115 found at Fri Mar 31 15:23:03 UTC 2017 selfserv_9626 with PID 7115 started at Fri Mar 31 15:23:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2652: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 7115 at Fri Mar 31 15:23:04 UTC 2017 kill -USR1 7115 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7115 killed at Fri Mar 31 15:23:04 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:23:04 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:23:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:23:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2653: Server never started - PASSED kill -0 7200 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7200 found at Fri Mar 31 15:23:10 UTC 2017 selfserv_9626 with PID 7200 started at Fri Mar 31 15:23:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2654: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 7200 at Fri Mar 31 15:23:11 UTC 2017 kill -USR1 7200 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7200 killed at Fri Mar 31 15:23:11 UTC 2017 ssl.sh: TLS Server hello response without SNI ---- selfserv_9626 starting at Fri Mar 31 15:23:11 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:23:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:23:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2655: Server never started - PASSED kill -0 7290 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7290 found at Fri Mar 31 15:23:17 UTC 2017 selfserv_9626 with PID 7290 started at Fri Mar 31 15:23:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2656: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 7290 at Fri Mar 31 15:23:18 UTC 2017 kill -USR1 7290 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7290 killed at Fri Mar 31 15:23:18 UTC 2017 ssl.sh: TLS Server hello response with SNI ---- selfserv_9626 starting at Fri Mar 31 15:23:18 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:23:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:23:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2657: Server never started - PASSED kill -0 7366 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7366 found at Fri Mar 31 15:23:24 UTC 2017 selfserv_9626 with PID 7366 started at Fri Mar 31 15:23:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2658: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 7366 at Fri Mar 31 15:23:25 UTC 2017 kill -USR1 7366 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7366 killed at Fri Mar 31 15:23:25 UTC 2017 ssl.sh: TLS Server response with alert ---- selfserv_9626 starting at Fri Mar 31 15:23:26 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:23:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:23:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2659: Server never started - PASSED kill -0 7441 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7441 found at Fri Mar 31 15:23:32 UTC 2017 selfserv_9626 with PID 7441 started at Fri Mar 31 15:23:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2660: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 7441 at Fri Mar 31 15:23:32 UTC 2017 kill -USR1 7441 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7441 killed at Fri Mar 31 15:23:33 UTC 2017 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9626 starting at Fri Mar 31 15:23:33 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:23:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:23:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2661: Server never started - PASSED kill -0 7516 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7516 found at Fri Mar 31 15:23:39 UTC 2017 selfserv_9626 with PID 7516 started at Fri Mar 31 15:23:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2662: SSL3 Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 7516 at Fri Mar 31 15:23:39 UTC 2017 kill -USR1 7516 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7516 killed at Fri Mar 31 15:23:40 UTC 2017 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9626 starting at Fri Mar 31 15:23:40 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:23:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:23:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2663: Server never started - PASSED kill -0 7595 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7595 found at Fri Mar 31 15:23:46 UTC 2017 selfserv_9626 with PID 7595 started at Fri Mar 31 15:23:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2664: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 7595 at Fri Mar 31 15:23:46 UTC 2017 kill -USR1 7595 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7595 killed at Fri Mar 31 15:23:47 UTC 2017 ssl.sh: TLS Server hello response without SNI ---- selfserv_9626 starting at Fri Mar 31 15:23:47 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:23:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:23:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2665: Server never started - PASSED kill -0 7670 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7670 found at Fri Mar 31 15:23:53 UTC 2017 selfserv_9626 with PID 7670 started at Fri Mar 31 15:23:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2666: TLS Server hello response without SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 7670 at Fri Mar 31 15:23:54 UTC 2017 kill -USR1 7670 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7670 killed at Fri Mar 31 15:23:54 UTC 2017 ssl.sh: TLS Server hello response with SNI ---- selfserv_9626 starting at Fri Mar 31 15:23:54 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:23:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:24:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2667: Server never started - PASSED kill -0 7745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7745 found at Fri Mar 31 15:24:00 UTC 2017 selfserv_9626 with PID 7745 started at Fri Mar 31 15:24:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2668: TLS Server hello response with SNI produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 7745 at Fri Mar 31 15:24:01 UTC 2017 kill -USR1 7745 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7745 killed at Fri Mar 31 15:24:01 UTC 2017 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9626 starting at Fri Mar 31 15:24:01 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:24:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:24:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2669: Server never started - PASSED kill -0 7823 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7823 found at Fri Mar 31 15:24:07 UTC 2017 selfserv_9626 with PID 7823 started at Fri Mar 31 15:24:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v-w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat Usage: tstclnt -h host [-a 1st_hs_name ] [-a 2nd_hs_name ] [-p port] [-D | -d certdir] [-C] [-b | -R root-module] [-n nickname] [-Bafosvx] [-c ciphers] [-Y] [-Z] [-V [min-version]:[max-version]] [-K] [-T] [-U] [-r N] [-w passwd] [-W pwfile] [-q [-t seconds]] [-I groups] [-A requestfile] [-L totalconnections]-a name Send different SNI name. 1st_hs_name - at first handshake, 2nd_hs_name - at second handshake. Default is host from the -h argument. -h host Hostname to connect with -p port Port number for SSL server -d certdir Directory with cert database (default is ~/.netscape) -D Run without a cert database -b Load the default "builtins" root CA module -R Load the given root CA module -C Print certificate chain information (use -C twice to print more certificate details) (use -C three times to include PEM format certificate dumps) -n nickname Nickname of key and cert for client auth -V [min]:[max] Restricts the set of enabled SSL/TLS protocols versions. All versions are enabled by default. Possible values for min/max: ssl3 tls1.0 tls1.1 tls1.2 tls1.3 Example: "-V ssl3:" enables SSL 3 and newer. -K Send TLS_FALLBACK_SCSV -S Prints only payload data. Skips HTTP header. -f Client speaks first. -O Use synchronous certificate validation -o Override bad server cert. Make it OK. -s Disable SSL socket locking. -v Verbose progress reporting. -q Ping the server and then exit. -t seconds Timeout for server ping (default: no timeout). -r N Renegotiate N times (resuming session if N>1). -u Enable the session ticket extension. -z Enable compression. -g Enable false start. -T Enable the cert_status extension (OCSP stapling). -U Enable the signed_certificate_timestamp extension. -F Require fresh revocation info from side channel. -F once means: require for server cert only -F twice means: require for intermediates, too (Connect, handshake with server, disable dynamic download of OCSP/CRL, verify cert using CERT_PKIXVerifyCert.) Exit code: 0: have fresh and valid revocation data, status good 1: cert failed to verify, prior to revocation checking 2: missing, old or invalid revocation data 3: have fresh and valid revocation data, status revoked -M Test -F allows 0=any (default), 1=only OCSP, 2=only CRL -c ciphers Restrict ciphers -Y Print cipher values allowed for parameter -c and exit -4 Enforce using an IPv4 destination address -6 Enforce using an IPv6 destination address (Options -4 and -6 cannot be combined.) -G Enable the extended master secret extension [RFC7627] -H Require the use of FFDHE supported groups [I-D.ietf-tls-negotiated-ff-dhe] -A Read from a file instead of stdin -Z Allow 0-RTT data (TLS 1.3 only) -L Disconnect and reconnect up to N times total -I Comma separated list of enabled groups for TLS key exchange. The following values are valid: P256, P384, P521, x25519, FF2048, FF3072, FF4096, FF6144, FF8192 ssl.sh: #2670: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 7823 at Fri Mar 31 15:24:08 UTC 2017 kill -USR1 7823 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7823 killed at Fri Mar 31 15:24:08 UTC 2017 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9626 starting at Fri Mar 31 15:24:08 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:24:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:24:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2671: Server never started - PASSED kill -0 7911 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7911 found at Fri Mar 31 15:24:14 UTC 2017 selfserv_9626 with PID 7911 started at Fri Mar 31 15:24:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2672: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 7911 at Fri Mar 31 15:24:15 UTC 2017 kill -USR1 7911 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7911 killed at Fri Mar 31 15:24:15 UTC 2017 ssl.sh: TLS Server response with alert ---- selfserv_9626 starting at Fri Mar 31 15:24:16 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:24:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:24:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2673: Server never started - PASSED kill -0 7986 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7986 found at Fri Mar 31 15:24:22 UTC 2017 selfserv_9626 with PID 7986 started at Fri Mar 31 15:24:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2674: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 7986 at Fri Mar 31 15:24:22 UTC 2017 kill -USR1 7986 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7986 killed at Fri Mar 31 15:24:23 UTC 2017 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status (non-FIPS only) ssl.sh: skipping OCSP stapling, signed response, revoked status (non-FIPS only) ssl.sh: skipping OCSP stapling, signed response, unknown status (non-FIPS only) ssl.sh: skipping OCSP stapling, unsigned failure response (non-FIPS only) ssl.sh: skipping OCSP stapling, good status, bad signature (non-FIPS only) ssl.sh: skipping OCSP stapling, invalid cert status data (non-FIPS only) ssl.sh: skipping Valid cert, Server doesn't staple (non-FIPS only) ssl.sh: skipping Stress OCSP stapling, server uses random status (non-FIPS only) ssl.sh: SSL Stress Test - server normal/client fips - with ECC =============================== ssl.sh: skipping Form is subject to the terms of the Mozilla Public (non-FIPS only) ssl.sh: skipping If a copy of the MPL was not distributed with this (non-FIPS only) ssl.sh: skipping obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the stress tests for SSL/TLS. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping client Test Case name (non-FIPS only) ssl.sh: skipping params (non-FIPS only) ssl.sh: skipping ------ --------------- (non-FIPS only) ssl.sh: skipping Stress SSL3 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:24:23 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:24:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:24:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2675: Server never started - PASSED kill -0 8098 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8098 found at Fri Mar 31 15:24:29 UTC 2017 selfserv_9626 with PID 8098 started at Fri Mar 31 15:24:29 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:24:29 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:24:30 UTC 2017 ssl.sh: #2676: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 8098 at Fri Mar 31 15:24:30 UTC 2017 kill -USR1 8098 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8098 killed at Fri Mar 31 15:24:30 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:24:30 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:24:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:24:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2677: Server never started - PASSED kill -0 8172 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8172 found at Fri Mar 31 15:24:36 UTC 2017 selfserv_9626 with PID 8172 started at Fri Mar 31 15:24:36 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -c 100 -C c -N -n TestUser \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:24:36 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:24:37 UTC 2017 ssl.sh: #2678: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 8172 at Fri Mar 31 15:24:37 UTC 2017 kill -USR1 8172 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8172 killed at Fri Mar 31 15:24:37 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:24:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:24:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:24:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2679: Server never started - PASSED kill -0 8249 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8249 found at Fri Mar 31 15:24:43 UTC 2017 selfserv_9626 with PID 8249 started at Fri Mar 31 15:24:43 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:24:43 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:24:44 UTC 2017 ssl.sh: #2680: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 8249 at Fri Mar 31 15:24:44 UTC 2017 kill -USR1 8249 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8249 killed at Fri Mar 31 15:24:44 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:24:45 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:24:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:24:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2681: Server never started - PASSED kill -0 8324 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8324 found at Fri Mar 31 15:24:51 UTC 2017 selfserv_9626 with PID 8324 started at Fri Mar 31 15:24:51 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:24:51 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:24:51 UTC 2017 ssl.sh: #2682: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 8324 at Fri Mar 31 15:24:51 UTC 2017 kill -USR1 8324 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8324 killed at Fri Mar 31 15:24:52 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9626 starting at Fri Mar 31 15:24:52 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:24:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:24:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2683: Server never started - PASSED kill -0 8398 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8398 found at Fri Mar 31 15:24:58 UTC 2017 selfserv_9626 with PID 8398 started at Fri Mar 31 15:24:58 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:24:58 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:24:58 UTC 2017 ssl.sh: #2684: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 8398 at Fri Mar 31 15:24:58 UTC 2017 kill -USR1 8398 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8398 killed at Fri Mar 31 15:24:59 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:24:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:24:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:25:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2685: Server never started - PASSED kill -0 8472 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8472 found at Fri Mar 31 15:25:05 UTC 2017 selfserv_9626 with PID 8472 started at Fri Mar 31 15:25:05 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:25:05 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:25:06 UTC 2017 ssl.sh: #2686: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 8472 at Fri Mar 31 15:25:06 UTC 2017 kill -USR1 8472 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8472 killed at Fri Mar 31 15:25:06 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9626 starting at Fri Mar 31 15:25:06 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:25:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:25:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2687: Server never started - PASSED kill -0 8560 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8560 found at Fri Mar 31 15:25:12 UTC 2017 selfserv_9626 with PID 8560 started at Fri Mar 31 15:25:12 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:25:12 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:25:13 UTC 2017 ssl.sh: #2688: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 8560 at Fri Mar 31 15:25:13 UTC 2017 kill -USR1 8560 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8560 killed at Fri Mar 31 15:25:13 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9626 starting at Fri Mar 31 15:25:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:25:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:25:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2689: Server never started - PASSED kill -0 8640 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8640 found at Fri Mar 31 15:25:19 UTC 2017 selfserv_9626 with PID 8640 started at Fri Mar 31 15:25:19 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:25:19 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:25:20 UTC 2017 ssl.sh: #2690: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 8640 at Fri Mar 31 15:25:20 UTC 2017 kill -USR1 8640 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8640 killed at Fri Mar 31 15:25:21 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9626 starting at Fri Mar 31 15:25:21 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:25:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:25:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2691: Server never started - PASSED kill -0 8720 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8720 found at Fri Mar 31 15:25:27 UTC 2017 selfserv_9626 with PID 8720 started at Fri Mar 31 15:25:27 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V tls1.0:tls1.2 -c 1000 -C c -u -a localhost-sni.localdomain \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:25:27 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:25:27 UTC 2017 ssl.sh: #2692: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 8720 at Fri Mar 31 15:25:27 UTC 2017 kill -USR1 8720 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8720 killed at Fri Mar 31 15:25:28 UTC 2017 ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA256 (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 GCM (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:25:28 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:25:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:25:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2693: Server never started - PASSED kill -0 8827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8827 found at Fri Mar 31 15:25:34 UTC 2017 selfserv_9626 with PID 8827 started at Fri Mar 31 15:25:34 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n TestUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:25:34 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:25:35 UTC 2017 ssl.sh: #2694: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 8827 at Fri Mar 31 15:25:35 UTC 2017 kill -USR1 8827 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8827 killed at Fri Mar 31 15:25:35 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:25:35 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:25:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:25:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2695: Server never started - PASSED kill -0 8901 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8901 found at Fri Mar 31 15:25:41 UTC 2017 selfserv_9626 with PID 8901 started at Fri Mar 31 15:25:41 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:25:41 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:25:42 UTC 2017 ssl.sh: #2696: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 8901 at Fri Mar 31 15:25:42 UTC 2017 kill -USR1 8901 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8901 killed at Fri Mar 31 15:25:42 UTC 2017 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:25:43 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:25:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:25:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2697: Server never started - PASSED kill -0 8979 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8979 found at Fri Mar 31 15:25:49 UTC 2017 selfserv_9626 with PID 8979 started at Fri Mar 31 15:25:49 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n TestUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:25:49 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:25:49 UTC 2017 ssl.sh: #2698: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 8979 at Fri Mar 31 15:25:49 UTC 2017 kill -USR1 8979 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8979 killed at Fri Mar 31 15:25:50 UTC 2017 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:25:50 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:25:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:25:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2699: Server never started - PASSED kill -0 9053 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9053 found at Fri Mar 31 15:25:56 UTC 2017 selfserv_9626 with PID 9053 started at Fri Mar 31 15:25:56 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n TestUser-ecmixed \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:25:56 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:25:56 UTC 2017 ssl.sh: #2700: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 9053 at Fri Mar 31 15:25:56 UTC 2017 kill -USR1 9053 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9053 killed at Fri Mar 31 15:25:57 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9626 starting at Fri Mar 31 15:25:57 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:25:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:26:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2701: Server never started - PASSED kill -0 9127 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9127 found at Fri Mar 31 15:26:03 UTC 2017 selfserv_9626 with PID 9127 started at Fri Mar 31 15:26:03 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:26:03 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:26:04 UTC 2017 ssl.sh: #2702: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 9127 at Fri Mar 31 15:26:04 UTC 2017 kill -USR1 9127 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9127 killed at Fri Mar 31 15:26:04 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:26:04 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:26:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:26:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2703: Server never started - PASSED kill -0 9219 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9219 found at Fri Mar 31 15:26:10 UTC 2017 selfserv_9626 with PID 9219 started at Fri Mar 31 15:26:10 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:26:10 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:26:11 UTC 2017 ssl.sh: #2704: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 9219 at Fri Mar 31 15:26:11 UTC 2017 kill -USR1 9219 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9219 killed at Fri Mar 31 15:26:11 UTC 2017 ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping -V_ssl3:tls1.2_-c_1000_-C_:0038_-u Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (session ticket) (non-FIPS only) ssl.sh: skipping session ticket test, once session tickets with DHE_DSS are working (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping -V_ssl3:tls1.2_-c_1000_-C_:006A Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (non-FIPS only) ssl.sh: skipping reuse test, once the session cache with DHE_DSS is working (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:26:12 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:26:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:26:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2705: Server never started - PASSED kill -0 9331 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9331 found at Fri Mar 31 15:26:18 UTC 2017 selfserv_9626 with PID 9331 started at Fri Mar 31 15:26:18 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n TestUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:26:18 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:26:18 UTC 2017 ssl.sh: #2706: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 9331 at Fri Mar 31 15:26:18 UTC 2017 kill -USR1 9331 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9331 killed at Fri Mar 31 15:26:19 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:26:19 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:26:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:26:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2707: Server never started - PASSED kill -0 9405 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9405 found at Fri Mar 31 15:26:25 UTC 2017 selfserv_9626 with PID 9405 started at Fri Mar 31 15:26:25 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n TestUser-dsamixed \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:26:25 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:26:25 UTC 2017 ssl.sh: #2708: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 9405 at Fri Mar 31 15:26:25 UTC 2017 kill -USR1 9405 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9405 killed at Fri Mar 31 15:26:26 UTC 2017 ssl.sh: skipping session ticket test, once session tickets with DHE_DSS are working (non-FIPS only) ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:26:26 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:26:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:26:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2709: Server never started - PASSED kill -0 9492 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9492 found at Fri Mar 31 15:26:32 UTC 2017 selfserv_9626 with PID 9492 started at Fri Mar 31 15:26:32 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n TestUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:26:32 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:26:33 UTC 2017 ssl.sh: #2710: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 9492 at Fri Mar 31 15:26:33 UTC 2017 kill -USR1 9492 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9492 killed at Fri Mar 31 15:26:33 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:26:33 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:26:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:26:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2711: Server never started - PASSED kill -0 9566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9566 found at Fri Mar 31 15:26:39 UTC 2017 selfserv_9626 with PID 9566 started at Fri Mar 31 15:26:39 UTC 2017 strsclnt -q -p 9626 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n TestUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:26:39 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:26:40 UTC 2017 ssl.sh: #2712: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 9566 at Fri Mar 31 15:26:40 UTC 2017 kill -USR1 9566 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9566 killed at Fri Mar 31 15:26:40 UTC 2017 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips - with ECC =============================== selfserv_9626 starting at Fri Mar 31 15:26:40 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:26:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:26:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2713: Server never started - PASSED kill -0 9635 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9635 found at Fri Mar 31 15:26:46 UTC 2017 selfserv_9626 with PID 9635 started at Fri Mar 31 15:26:46 UTC 2017 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2714: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2715: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2716: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2717: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2718: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2719: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2720: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2721: SSL3_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2722: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2723: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2724: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2725: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2726: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2727: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2728: TLS_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2729: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2730: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2731: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2732: TLS_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2733: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2734: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2735: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2736: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2737: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2738: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2739: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2740: TLS11_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2741: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2742: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2743: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2744: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2745: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2746: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2747: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2748: TLS12_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2749: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2750: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2751: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2752: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2753: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2754: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2755: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2756: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2757: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2758: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2759: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2760: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2761: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2762: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2763: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2764: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2765: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2766: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2767: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2768: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2769: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2770: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2771: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2772: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2773: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2774: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2775: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2776: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2777: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2778: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2779: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2780: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2781: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2782: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2783: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2784: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2785: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2786: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2787: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2788: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2789: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2790: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2791: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2792: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2793: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2794: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2795: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2796: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2797: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2798: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2799: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2800: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2801: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2802: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2803: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2804: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2805: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2806: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2807: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2808: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2809: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2810: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2811: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2812: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2813: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2814: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2815: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2816: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2817: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2818: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2819: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2820: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2821: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2822: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2823: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2824: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2825: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2826: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2827: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2828: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2829: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2830: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 1, expected is 0 - FAILED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9626 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2831: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 9635 at Fri Mar 31 15:27:51 UTC 2017 kill -USR1 9635 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9635 killed at Fri Mar 31 15:27:52 UTC 2017 ssl.sh: SSL Client Authentication Extended Test - server normal/client fips - with ECC =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 15:27:52 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:27:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:27:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2832: Server never started - PASSED kill -0 11902 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11902 found at Fri Mar 31 15:27:58 UTC 2017 selfserv_9626 with PID 11902 started at Fri Mar 31 15:27:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2833: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 11902 at Fri Mar 31 15:27:59 UTC 2017 kill -USR1 11902 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 11902 killed at Fri Mar 31 15:27:59 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:27:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:27:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:28:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2834: Server never started - PASSED kill -0 11971 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11971 found at Fri Mar 31 15:28:05 UTC 2017 selfserv_9626 with PID 11971 started at Fri Mar 31 15:28:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2835: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 11971 at Fri Mar 31 15:28:06 UTC 2017 kill -USR1 11971 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 11971 killed at Fri Mar 31 15:28:06 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:28:06 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:28:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:28:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2836: Server never started - PASSED kill -0 12054 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12054 found at Fri Mar 31 15:28:12 UTC 2017 selfserv_9626 with PID 12054 started at Fri Mar 31 15:28:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2837: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 12054 at Fri Mar 31 15:28:13 UTC 2017 kill -USR1 12054 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12054 killed at Fri Mar 31 15:28:13 UTC 2017 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 15:28:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:28:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:28:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2838: Server never started - PASSED kill -0 12129 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12129 found at Fri Mar 31 15:28:19 UTC 2017 selfserv_9626 with PID 12129 started at Fri Mar 31 15:28:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2839: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 12129 at Fri Mar 31 15:28:20 UTC 2017 kill -USR1 12129 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12129 killed at Fri Mar 31 15:28:20 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:28:21 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:28:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:28:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2840: Server never started - PASSED kill -0 12198 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12198 found at Fri Mar 31 15:28:27 UTC 2017 selfserv_9626 with PID 12198 started at Fri Mar 31 15:28:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2841: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 12198 at Fri Mar 31 15:28:27 UTC 2017 kill -USR1 12198 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12198 killed at Fri Mar 31 15:28:28 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:28:28 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:28:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:28:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2842: Server never started - PASSED kill -0 12268 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12268 found at Fri Mar 31 15:28:34 UTC 2017 selfserv_9626 with PID 12268 started at Fri Mar 31 15:28:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2843: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 12268 at Fri Mar 31 15:28:34 UTC 2017 kill -USR1 12268 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12268 killed at Fri Mar 31 15:28:35 UTC 2017 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 15:28:35 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:28:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:28:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2844: Server never started - PASSED kill -0 12343 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12343 found at Fri Mar 31 15:28:41 UTC 2017 selfserv_9626 with PID 12343 started at Fri Mar 31 15:28:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2845: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 12343 at Fri Mar 31 15:28:41 UTC 2017 kill -USR1 12343 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12343 killed at Fri Mar 31 15:28:42 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:28:42 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:28:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:28:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2846: Server never started - PASSED kill -0 12415 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12415 found at Fri Mar 31 15:28:48 UTC 2017 selfserv_9626 with PID 12415 started at Fri Mar 31 15:28:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2847: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 12415 at Fri Mar 31 15:28:48 UTC 2017 kill -USR1 12415 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12415 killed at Fri Mar 31 15:28:49 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:28:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:28:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:28:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2848: Server never started - PASSED kill -0 12485 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12485 found at Fri Mar 31 15:28:55 UTC 2017 selfserv_9626 with PID 12485 started at Fri Mar 31 15:28:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2849: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 12485 at Fri Mar 31 15:28:56 UTC 2017 kill -USR1 12485 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12485 killed at Fri Mar 31 15:28:56 UTC 2017 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 15:28:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:28:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:29:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2850: Server never started - PASSED kill -0 12560 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12560 found at Fri Mar 31 15:29:02 UTC 2017 selfserv_9626 with PID 12560 started at Fri Mar 31 15:29:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2851: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 12560 at Fri Mar 31 15:29:03 UTC 2017 kill -USR1 12560 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12560 killed at Fri Mar 31 15:29:03 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:29:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:29:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:29:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2852: Server never started - PASSED kill -0 12642 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12642 found at Fri Mar 31 15:29:09 UTC 2017 selfserv_9626 with PID 12642 started at Fri Mar 31 15:29:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2853: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 12642 at Fri Mar 31 15:29:10 UTC 2017 kill -USR1 12642 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12642 killed at Fri Mar 31 15:29:10 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:29:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:29:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:29:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2854: Server never started - PASSED kill -0 12712 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12712 found at Fri Mar 31 15:29:16 UTC 2017 selfserv_9626 with PID 12712 started at Fri Mar 31 15:29:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2855: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 12712 at Fri Mar 31 15:29:17 UTC 2017 kill -USR1 12712 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12712 killed at Fri Mar 31 15:29:17 UTC 2017 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 15:29:17 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:29:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:29:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2856: Server never started - PASSED kill -0 12787 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12787 found at Fri Mar 31 15:29:23 UTC 2017 selfserv_9626 with PID 12787 started at Fri Mar 31 15:29:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2857: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 12787 at Fri Mar 31 15:29:24 UTC 2017 kill -USR1 12787 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12787 killed at Fri Mar 31 15:29:24 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:29:25 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:29:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:29:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2858: Server never started - PASSED kill -0 12856 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12856 found at Fri Mar 31 15:29:31 UTC 2017 selfserv_9626 with PID 12856 started at Fri Mar 31 15:29:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2859: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 12856 at Fri Mar 31 15:29:31 UTC 2017 kill -USR1 12856 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12856 killed at Fri Mar 31 15:29:32 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:29:32 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:29:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:29:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2860: Server never started - PASSED kill -0 12926 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12926 found at Fri Mar 31 15:29:38 UTC 2017 selfserv_9626 with PID 12926 started at Fri Mar 31 15:29:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2861: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 12926 at Fri Mar 31 15:29:38 UTC 2017 kill -USR1 12926 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12926 killed at Fri Mar 31 15:29:39 UTC 2017 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:29:39 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:29:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:29:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2862: Server never started - PASSED kill -0 13014 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13014 found at Fri Mar 31 15:29:45 UTC 2017 selfserv_9626 with PID 13014 started at Fri Mar 31 15:29:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2863: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 13014 at Fri Mar 31 15:29:45 UTC 2017 kill -USR1 13014 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13014 killed at Fri Mar 31 15:29:46 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:29:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:29:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:29:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2864: Server never started - PASSED kill -0 13086 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13086 found at Fri Mar 31 15:29:52 UTC 2017 selfserv_9626 with PID 13086 started at Fri Mar 31 15:29:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2865: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 13086 at Fri Mar 31 15:29:53 UTC 2017 kill -USR1 13086 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13086 killed at Fri Mar 31 15:29:53 UTC 2017 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:29:53 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:29:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:29:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2866: Server never started - PASSED kill -0 13160 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13160 found at Fri Mar 31 15:29:59 UTC 2017 selfserv_9626 with PID 13160 started at Fri Mar 31 15:29:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2867: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 13160 at Fri Mar 31 15:30:00 UTC 2017 kill -USR1 13160 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13160 killed at Fri Mar 31 15:30:00 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:30:00 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:30:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:30:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2868: Server never started - PASSED kill -0 13229 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13229 found at Fri Mar 31 15:30:06 UTC 2017 selfserv_9626 with PID 13229 started at Fri Mar 31 15:30:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2869: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 13229 at Fri Mar 31 15:30:07 UTC 2017 kill -USR1 13229 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13229 killed at Fri Mar 31 15:30:07 UTC 2017 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:30:07 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:30:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:30:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2870: Server never started - PASSED kill -0 13315 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13315 found at Fri Mar 31 15:30:13 UTC 2017 selfserv_9626 with PID 13315 started at Fri Mar 31 15:30:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2871: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 13315 at Fri Mar 31 15:30:14 UTC 2017 kill -USR1 13315 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13315 killed at Fri Mar 31 15:30:14 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:30:14 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:30:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:30:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2872: Server never started - PASSED kill -0 13385 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13385 found at Fri Mar 31 15:30:20 UTC 2017 selfserv_9626 with PID 13385 started at Fri Mar 31 15:30:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2873: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 13385 at Fri Mar 31 15:30:21 UTC 2017 kill -USR1 13385 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13385 killed at Fri Mar 31 15:30:21 UTC 2017 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:30:22 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:30:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:30:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2874: Server never started - PASSED kill -0 13458 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13458 found at Fri Mar 31 15:30:28 UTC 2017 selfserv_9626 with PID 13458 started at Fri Mar 31 15:30:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2875: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 13458 at Fri Mar 31 15:30:28 UTC 2017 kill -USR1 13458 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13458 killed at Fri Mar 31 15:30:29 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:30:29 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:30:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:30:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2876: Server never started - PASSED kill -0 13527 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13527 found at Fri Mar 31 15:30:35 UTC 2017 selfserv_9626 with PID 13527 started at Fri Mar 31 15:30:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2877: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 13527 at Fri Mar 31 15:30:35 UTC 2017 kill -USR1 13527 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13527 killed at Fri Mar 31 15:30:36 UTC 2017 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 15:30:36 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:30:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:30:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2878: Server never started - PASSED kill -0 13602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13602 found at Fri Mar 31 15:30:42 UTC 2017 selfserv_9626 with PID 13602 started at Fri Mar 31 15:30:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2879: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 13602 at Fri Mar 31 15:30:42 UTC 2017 kill -USR1 13602 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13602 killed at Fri Mar 31 15:30:43 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:30:43 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:30:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:30:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2880: Server never started - PASSED kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13674 found at Fri Mar 31 15:30:49 UTC 2017 selfserv_9626 with PID 13674 started at Fri Mar 31 15:30:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2881: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 13674 at Fri Mar 31 15:30:49 UTC 2017 kill -USR1 13674 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13674 killed at Fri Mar 31 15:30:50 UTC 2017 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server normal/client fips - with ECC =============================== ssl.sh: skipping Form is subject to the terms of the Mozilla Public (non-FIPS only) ssl.sh: skipping If a copy of the MPL was not distributed with this (non-FIPS only) ssl.sh: skipping obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the stress tests for SSL/TLS. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping client Test Case name (non-FIPS only) ssl.sh: skipping params (non-FIPS only) ssl.sh: skipping ------ --------------- (non-FIPS only) ssl.sh: skipping Stress SSL3 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:30:51 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:30:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:30:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2882: Server never started - PASSED kill -0 13821 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13821 found at Fri Mar 31 15:30:57 UTC 2017 selfserv_9626 with PID 13821 started at Fri Mar 31 15:30:57 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:30:57 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:30:57 UTC 2017 ssl.sh: #2883: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 13821 at Fri Mar 31 15:30:57 UTC 2017 kill -USR1 13821 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13821 killed at Fri Mar 31 15:30:58 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:30:58 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:30:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:31:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2884: Server never started - PASSED kill -0 13895 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13895 found at Fri Mar 31 15:31:04 UTC 2017 selfserv_9626 with PID 13895 started at Fri Mar 31 15:31:04 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:31:04 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:31:04 UTC 2017 ssl.sh: #2885: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 13895 at Fri Mar 31 15:31:04 UTC 2017 kill -USR1 13895 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13895 killed at Fri Mar 31 15:31:05 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:31:05 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:31:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:31:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2886: Server never started - PASSED kill -0 13984 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13984 found at Fri Mar 31 15:31:11 UTC 2017 selfserv_9626 with PID 13984 started at Fri Mar 31 15:31:11 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:31:11 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:31:12 UTC 2017 ssl.sh: #2887: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 13984 at Fri Mar 31 15:31:12 UTC 2017 kill -USR1 13984 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13984 killed at Fri Mar 31 15:31:12 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:31:12 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:31:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:31:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2888: Server never started - PASSED kill -0 14059 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14059 found at Fri Mar 31 15:31:18 UTC 2017 selfserv_9626 with PID 14059 started at Fri Mar 31 15:31:18 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:31:18 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:31:19 UTC 2017 ssl.sh: #2889: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 14059 at Fri Mar 31 15:31:19 UTC 2017 kill -USR1 14059 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14059 killed at Fri Mar 31 15:31:19 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9626 starting at Fri Mar 31 15:31:19 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:31:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:31:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2890: Server never started - PASSED kill -0 14133 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14133 found at Fri Mar 31 15:31:25 UTC 2017 selfserv_9626 with PID 14133 started at Fri Mar 31 15:31:25 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:31:25 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:31:26 UTC 2017 ssl.sh: #2891: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 14133 at Fri Mar 31 15:31:26 UTC 2017 kill -USR1 14133 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14133 killed at Fri Mar 31 15:31:26 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:31:27 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:31:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:31:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2892: Server never started - PASSED kill -0 14207 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14207 found at Fri Mar 31 15:31:33 UTC 2017 selfserv_9626 with PID 14207 started at Fri Mar 31 15:31:33 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:31:33 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:31:33 UTC 2017 ssl.sh: #2893: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 14207 at Fri Mar 31 15:31:33 UTC 2017 kill -USR1 14207 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14207 killed at Fri Mar 31 15:31:34 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9626 starting at Fri Mar 31 15:31:34 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:31:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:31:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2894: Server never started - PASSED kill -0 14282 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14282 found at Fri Mar 31 15:31:40 UTC 2017 selfserv_9626 with PID 14282 started at Fri Mar 31 15:31:40 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:31:40 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:31:40 UTC 2017 ssl.sh: #2895: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 14282 at Fri Mar 31 15:31:40 UTC 2017 kill -USR1 14282 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14282 killed at Fri Mar 31 15:31:41 UTC 2017 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA256 (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 GCM (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:31:41 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:31:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:31:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2896: Server never started - PASSED kill -0 14395 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14395 found at Fri Mar 31 15:31:47 UTC 2017 selfserv_9626 with PID 14395 started at Fri Mar 31 15:31:47 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:31:47 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:31:48 UTC 2017 ssl.sh: #2897: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 14395 at Fri Mar 31 15:31:48 UTC 2017 kill -USR1 14395 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14395 killed at Fri Mar 31 15:31:48 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:31:48 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:31:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:31:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2898: Server never started - PASSED kill -0 14469 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14469 found at Fri Mar 31 15:31:54 UTC 2017 selfserv_9626 with PID 14469 started at Fri Mar 31 15:31:54 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:31:55 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:31:55 UTC 2017 ssl.sh: #2899: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 14469 at Fri Mar 31 15:31:55 UTC 2017 kill -USR1 14469 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14469 killed at Fri Mar 31 15:31:56 UTC 2017 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:31:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:31:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:32:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2900: Server never started - PASSED kill -0 14544 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14544 found at Fri Mar 31 15:32:02 UTC 2017 selfserv_9626 with PID 14544 started at Fri Mar 31 15:32:02 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:32:02 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:32:02 UTC 2017 ssl.sh: #2901: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 14544 at Fri Mar 31 15:32:02 UTC 2017 kill -USR1 14544 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14544 killed at Fri Mar 31 15:32:03 UTC 2017 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:32:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:32:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:32:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2902: Server never started - PASSED kill -0 14631 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14631 found at Fri Mar 31 15:32:09 UTC 2017 selfserv_9626 with PID 14631 started at Fri Mar 31 15:32:09 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:32:09 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:32:09 UTC 2017 ssl.sh: #2903: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 14631 at Fri Mar 31 15:32:10 UTC 2017 kill -USR1 14631 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14631 killed at Fri Mar 31 15:32:10 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9626 starting at Fri Mar 31 15:32:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:32:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:32:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2904: Server never started - PASSED kill -0 14705 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14705 found at Fri Mar 31 15:32:16 UTC 2017 selfserv_9626 with PID 14705 started at Fri Mar 31 15:32:16 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:32:16 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:32:17 UTC 2017 ssl.sh: #2905: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 14705 at Fri Mar 31 15:32:17 UTC 2017 kill -USR1 14705 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14705 killed at Fri Mar 31 15:32:17 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:32:17 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:32:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:32:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2906: Server never started - PASSED kill -0 14780 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14780 found at Fri Mar 31 15:32:23 UTC 2017 selfserv_9626 with PID 14780 started at Fri Mar 31 15:32:23 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:32:23 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:32:24 UTC 2017 ssl.sh: #2907: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 14780 at Fri Mar 31 15:32:24 UTC 2017 kill -USR1 14780 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14780 killed at Fri Mar 31 15:32:24 UTC 2017 ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping -V_ssl3:tls1.2_-c_1000_-C_:0038_-u Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (session ticket) (non-FIPS only) ssl.sh: skipping session ticket test, once session tickets with DHE_DSS are working (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping -V_ssl3:tls1.2_-c_1000_-C_:006A Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (non-FIPS only) ssl.sh: skipping reuse test, once the session cache with DHE_DSS is working (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:32:25 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:32:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:32:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2908: Server never started - PASSED kill -0 14892 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14892 found at Fri Mar 31 15:32:31 UTC 2017 selfserv_9626 with PID 14892 started at Fri Mar 31 15:32:31 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:32:31 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:32:31 UTC 2017 ssl.sh: #2909: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 14892 at Fri Mar 31 15:32:31 UTC 2017 kill -USR1 14892 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14892 killed at Fri Mar 31 15:32:32 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9626 starting at Fri Mar 31 15:32:32 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:32:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:32:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2910: Server never started - PASSED kill -0 14966 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14966 found at Fri Mar 31 15:32:38 UTC 2017 selfserv_9626 with PID 14966 started at Fri Mar 31 15:32:38 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:32:38 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Fri Mar 31 15:32:39 UTC 2017 ssl.sh: #2911: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9626 with PID 14966 at Fri Mar 31 15:32:39 UTC 2017 kill -USR1 14966 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14966 killed at Fri Mar 31 15:32:39 UTC 2017 ssl.sh: skipping session ticket test, once session tickets with DHE_DSS are working (non-FIPS only) ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:32:39 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:32:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:32:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2912: Server never started - PASSED kill -0 15053 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15053 found at Fri Mar 31 15:32:45 UTC 2017 selfserv_9626 with PID 15053 started at Fri Mar 31 15:32:45 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:32:45 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:32:46 UTC 2017 ssl.sh: #2913: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 15053 at Fri Mar 31 15:32:46 UTC 2017 kill -USR1 15053 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15053 killed at Fri Mar 31 15:32:46 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ---- selfserv_9626 starting at Fri Mar 31 15:32:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 15:32:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 15:32:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #2914: Server never started - PASSED kill -0 15130 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15130 found at Fri Mar 31 15:32:52 UTC 2017 selfserv_9626 with PID 15130 started at Fri Mar 31 15:32:52 UTC 2017 strsclnt -q -p 9626 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n ExtendedSSLUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Fri Mar 31 15:32:52 UTC 2017 strsclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 0 server certificates tested. strsclnt completed at Fri Mar 31 15:32:53 UTC 2017 ssl.sh: #2915: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED trying to kill selfserv_9626 with PID 15130 at Fri Mar 31 15:32:53 UTC 2017 kill -USR1 15130 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15130 killed at Fri Mar 31 15:32:54 UTC 2017 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -fips false -force FIPS mode disabled. ssl.sh: #2916: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/client -list ssl.sh: #2917: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #2918: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -fips false -force FIPS mode disabled. ssl.sh: #2919: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/ext_client -list ssl.sh: #2920: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #2921: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Fri Mar 31 15:32:56 UTC 2017 Running tests for ocsp TIMESTAMP ocsp BEGIN: Fri Mar 31 15:32:56 UTC 2017 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Fri Mar 31 15:32:56 UTC 2017 Running tests for merge TIMESTAMP merge BEGIN: Fri Mar 31 15:32:56 UTC 2017 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests.v3.2460 -t Test2 -f ../tests.pw merge.sh: #2922: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2923: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2924: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2925: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2926: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2927: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:19:48 2017 Not After : Thu Mar 31 14:19:48 2022 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:94:b7:d4:83:d7:a1:15:8e:2c:3d:f1:67:58:5e:20: f0:d3:10:df:b3:21:e1:50:6b:94:0c:f7:53:c8:0b:56: 5b:f7:fb:3b:16:6b:3e:a9:4d:5f:6e:67:37:c7:41:2c: b7:8e:6b:66:ae:79:07:0b:6f:38:8b:73:ee:bb:8d:72: a7:43:34:79:a3:41:2c:c3:7a:88:67:ee:af:cc:01:6c: df:50:62:e0:11:93:8e:49:76:da:a8:0f:97:a5:c3:68: a8:32:17:76:51:39:33:15:ee:d7:bf:6e:df:75:34:d3: d8:58:f9:c1:7d:7a:00:61:76:c7:c9:64:bd:ae:7f:31: 87:a0:46:9f:6f:77:eb:e5:86:34:e9:74:3a:f3:6b:31: 7c:b7:fd:81:b1:cf:a1:bf:32:c2:cd:8c:9c:15:eb:b1: 62:e9:cc:80:64:7b:b9:34:84:9f:c8:15:e6:5c:bf:a6: 59:22:4c:ec:db:b9:88:25:5d:e5:22:3c:e5:cf:0b:60: 98:5c:eb:b0:fb:e1:17:3e:8c:65:71:81:69:b3:4a:c2: 36:6d:ea:c8:91:e3:79:42:6f:97:85:c8:cd:dd:90:a8: 67:95:9a:9d:bb:1b:0b:8f:2b:37:08:81:c5:5c:2e:db: 1c:f2:de:cf:b9:d5:7f:34:78:9f:77:df:71:37:62:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:31:61:a3:6a:de:5b:7a:05:02:7f:30:99:55:b7:f5: 48:f3:18:a3:43:38:5b:4a:c8:8f:41:c7:8b:28:02:ae: 73:92:ef:c7:ef:71:a5:13:e9:4b:6e:5c:7e:c2:b6:67: 18:19:ae:c5:02:f2:4c:18:07:ce:c2:3f:9f:61:62:2e: cb:ea:81:7c:59:06:da:96:0b:76:0c:00:54:b2:a3:c5: 92:73:81:18:77:58:3a:9e:3e:5d:b2:de:47:77:4f:98: c4:ef:f5:e4:f6:a1:ad:8f:1d:66:41:81:96:9e:bc:56: 4e:af:2f:e6:7e:cd:59:03:6e:25:a6:01:b9:cf:9e:fe: 48:e6:0e:b6:f8:94:42:d7:37:b3:1e:03:be:93:05:a4: 9b:03:11:b8:54:2e:d3:43:1b:5e:21:76:2c:1b:05:bb: f1:4e:c6:2e:20:ea:03:8c:ec:31:06:74:df:9e:1a:68: fa:ca:29:53:c6:37:c9:70:a9:69:17:6f:e7:56:eb:3a: c4:58:a9:06:35:0e:4d:e6:48:fc:71:ca:4a:06:8b:b9: 1c:8f:77:0b:d1:f4:f5:5b:c7:57:6e:59:11:1c:27:f5: 23:58:56:96:ff:32:62:e0:c6:32:52:0f:bd:5b:1f:d9: 18:57:6c:d1:ae:89:5e:4c:08:57:d2:16:66:1f:29:bd Fingerprint (SHA-256): 7C:60:48:87:6D:EE:6D:53:B1:60:D9:AA:99:CB:01:E2:19:DA:62:66:12:D7:CC:F7:B8:5F:C3:EC:EA:2A:69:A1 Fingerprint (SHA1): FD:B3:7E:B1:02:E4:33:52:4E:D7:E6:2D:45:88:AA:6B:76:20:05:2B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #2928: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:20:09 2017 Not After : Thu Mar 31 14:20:09 2022 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:76:c8:a9:8f:f9:b0:b4:77:50:66:c3:a7:12:14:5b: 51:45:4f:e1:cf:40:96:f1:9a:43:e0:63:8d:49:a2:66: e0:42:39:35:ed:9d:b9:3a:99:ec:70:c2:fd:4d:31:aa: 78:d0:50:60:3c:f2:d3:05:1a:62:02:71:fd:28:b5:ae: 4f:5e:bd:64:7a:43:12:0c:ec:46:20:f7:07:c2:40:6e: 2b:00:6d:41:1d:8e:8d:c8:26:3b:5c:e1:15:34:8d:11: 08:1f:4b:3e:d7:de:a4:1a:d1:fd:bc:3a:41:c9:5e:e1: a0:6b:66:75:8a:6a:6d:06:02:e8:f3:2b:06:de:f3:cd: a4:12:69:63:a1:bc:bb:ee:ea:39:96:d0:1a:a2:bd:88: ab:17:b1:bf:0f:fe:02:29:b3:31:dc:a3:5f:38:eb:66: 14:f9:d3:f3:ac:f9:de:74:c0:95:c4:63:95:71:7f:5b: c7:8d:26:73:e1:50:66:7b:5a:fe:81:01:67:99:27:28: 8a:d5:3d:40:df:f7:6f:e6:b0:89:cc:4d:f1:8a:92:65: 96:05:10:a9:60:55:2c:bb:da:50:b6:31:4c:55:83:37: d0:8f:8c:1a:4c:34:ea:06:21:a1:04:08:59:e2:8b:51: bb:85:6e:22:5b:e8:06:1a:ab:ed:a7:45:47:d1:6e:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:c1:db:34:90:99:23:b5:43:98:44:39:b4:33:b8:76: ea:1e:a6:e5:90:a4:2c:d5:c1:10:0a:1c:c1:bb:3c:f9: aa:5d:28:1f:57:ae:fd:05:3a:27:e7:e3:5a:34:14:5a: ea:22:18:47:54:14:b5:86:88:af:ef:4d:d8:b2:20:27: 9e:b6:f5:db:b7:ad:a2:2b:55:89:69:0e:9a:d5:37:ac: 70:92:35:f7:e9:f9:82:e7:f2:b8:b0:3b:68:f7:35:17: 88:c0:14:14:2d:19:e6:e5:3a:6f:0e:ea:5b:11:c6:67: fa:c8:1a:7c:44:1a:35:e2:59:e6:8a:d9:ba:1e:fe:f3: 56:a6:f5:d9:f7:9f:6d:1e:e3:52:a9:29:c9:de:6f:12: a9:78:03:84:cc:c7:e7:c8:d8:ec:75:bf:50:20:c9:43: 60:9f:16:fd:9c:a7:d6:d4:9f:52:89:c9:fb:e3:8b:59: fc:94:ba:c7:8b:47:eb:8a:57:2d:af:d6:bd:d2:14:6e: 7f:14:35:26:8e:44:5d:fd:0c:a9:a5:24:8f:36:44:aa: 4f:ce:d6:3f:10:1d:87:34:be:49:7a:ba:f4:cb:9b:83: 09:3b:b2:05:34:28:3d:83:9e:12:06:81:6f:cf:c4:ab: 7a:10:9e:70:f8:96:54:52:38:cb:76:b3:20:65:c8:30 Fingerprint (SHA-256): 3C:4A:31:79:CE:B8:98:1C:F0:3D:EE:3E:12:8D:86:B0:B8:02:18:5F:87:BD:A6:68:C6:97:C9:92:9B:49:00:3E Fingerprint (SHA1): AE:B2:1C:6B:79:BD:F3:0C:63:0C:18:51:5D:BC:B6:EB:9C:7A:C9:55 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #2929: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2930: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA-dsa CT,C,C Alice-ec u,u,u Dave u,u,u localhost.localdomain-dsamixed ,, serverCA-dsa C,C,C chain-2-clientCA-ec ,, Alice #1 ,, Dave-dsa ,, localhost.localdomain-ecmixed ,, localhost-sni.localdomain-dsamixed ,, Alice #99 ,, Alice-dsamixed u,u,u eve@bogus.com ,, bob-ec@bogus.com ,, localhost.localdomain u,u,u localhost-sni.localdomain-ecmixed ,, clientCA T,C,C Alice #3 ,, TestCA CT,C,C TestCA-ec CT,C,C Alice-ecmixed u,u,u Dave-ecmixed ,, localhost.localdomain-dsa ,, localhost-sni.localdomain u,u,u localhost-sni.localdomain-ec ,, ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-ec ,, serverCA-ec C,C,C chain-1-clientCA ,, clientCA-dsa T,C,C chain-1-clientCA-ec ,, Alice #2 ,, Alice #4 ,, Alice u,u,u Dave-ec ,, localhost-sni.localdomain-dsa ,, ExtendedSSLUser-dsa ,, ExtendedSSLUser-ecmixed ,, chain-1-clientCA-dsa ,, chain-2-clientCA ,, Alice #100 ,, Alice-dsa u,u,u ExtendedSSLUser-dsamixed ,, chain-2-clientCA-dsa ,, bob@bogus.com ,, Dave-dsamixed ,, localhost.localdomain-ec ,, clientCA-ec T,C,C CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests.v3.2460 -t Test2 -f ../tests.pw merge.sh: #2931: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests.v1.2460 -t Test1 -f ../tests.pw merge.sh: #2932: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #2933: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #2934: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #2935: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Fri Mar 31 14:22:15 2017 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Fri Mar 31 14:07:55 2017 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Fri Mar 31 14:22:08 2017 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #2936: Verifying TestCA CRL - PASSED TEST_MODE=STANDARD NSS_DEFAULT_DB_TYPE=dbm TIMESTAMP merge END: Fri Mar 31 15:33:11 UTC 2017 Running tests for pkits TIMESTAMP pkits BEGIN: Fri Mar 31 15:33:11 UTC 2017 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Fri Mar 31 15:33:11 UTC 2017 Running tests for chains TIMESTAMP chains BEGIN: Fri Mar 31 15:33:11 UTC 2017 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #2937: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153312 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2938: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #2939: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #2940: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #2941: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2942: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2943: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2944: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #2945: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #2946: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2947: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2948: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2949: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #2950: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #2951: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2952: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9637 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2953: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2954: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #2955: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #2956: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2957: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2958: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2959: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #2960: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2961: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2962: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2963: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #2964: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2965: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2966: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2967: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #2968: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2969: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2970: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2971: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #2972: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2973: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9637 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2974: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2975: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #2976: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2977: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2978: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2979: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #2980: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2981: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2982: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2983: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #2984: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2985: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9637 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2986: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2987: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #2988: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2989: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2990: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2991: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #2992: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2993: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2994: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2995: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #2996: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2997: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9637 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2998: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2999: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20170331153613Z nextupdate=20180331153613Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Mar 31 15:36:13 2017 Next Update: Sat Mar 31 15:36:13 2018 CRL Extensions: chains.sh: #3000: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20170331153614Z addcert 2 20170331153614Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Mar 31 15:36:14 2017 Next Update: Sat Mar 31 15:36:13 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 15:36:14 2017 CRL Extensions: chains.sh: #3001: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20170331153614Z nextupdate=20180331153614Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Mar 31 15:36:14 2017 Next Update: Sat Mar 31 15:36:14 2018 CRL Extensions: chains.sh: #3002: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20170331153615Z addcert 2 20170331153615Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Mar 31 15:36:15 2017 Next Update: Sat Mar 31 15:36:14 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 15:36:15 2017 CRL Extensions: chains.sh: #3003: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20170331153616Z addcert 4 20170331153616Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Mar 31 15:36:16 2017 Next Update: Sat Mar 31 15:36:14 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 15:36:15 2017 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Fri Mar 31 15:36:16 2017 CRL Extensions: chains.sh: #3004: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20170331153616Z nextupdate=20180331153616Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Mar 31 15:36:16 2017 Next Update: Sat Mar 31 15:36:16 2018 CRL Extensions: chains.sh: #3005: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20170331153617Z addcert 2 20170331153617Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Mar 31 15:36:17 2017 Next Update: Sat Mar 31 15:36:16 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 15:36:17 2017 CRL Extensions: chains.sh: #3006: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20170331153618Z addcert 3 20170331153618Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Mar 31 15:36:18 2017 Next Update: Sat Mar 31 15:36:16 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 15:36:17 2017 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Mar 31 15:36:18 2017 CRL Extensions: chains.sh: #3007: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20170331153618Z nextupdate=20180331153618Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Mar 31 15:36:18 2017 Next Update: Sat Mar 31 15:36:18 2018 CRL Extensions: chains.sh: #3008: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20170331153619Z addcert 2 20170331153619Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Mar 31 15:36:19 2017 Next Update: Sat Mar 31 15:36:18 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 15:36:19 2017 CRL Extensions: chains.sh: #3009: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20170331153620Z addcert 3 20170331153620Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Mar 31 15:36:20 2017 Next Update: Sat Mar 31 15:36:18 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 15:36:19 2017 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Mar 31 15:36:20 2017 CRL Extensions: chains.sh: #3010: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #3011: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #3012: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #3013: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #3014: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #3015: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #3016: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #3017: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #3018: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #3019: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #3020: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #3021: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #3022: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #3023: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #3024: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #3025: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #3026: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #3027: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #3028: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #3029: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #3030: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #3031: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #3032: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #3033: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #3034: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED httpserv starting at Fri Mar 31 15:36:35 UTC 2017 httpserv -D -p 9636 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/aiahttp/http_pid.2460 & trying to connect to httpserv at Fri Mar 31 15:36:35 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 retrying to connect to httpserv at Fri Mar 31 15:36:41 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 chains.sh: #3035: Waiting for Server - FAILED kill -0 16880 >/dev/null 2>/dev/null httpserv with PID 16880 found at Fri Mar 31 15:36:41 UTC 2017 httpserv with PID 16880 started at Fri Mar 31 15:36:41 UTC 2017 tstclnt -h localhost.localdomain -p 9636 -q -t 20 tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #3036: Test that OCSP server is reachable - FAILED trying to kill httpserv with PID 16880 at Fri Mar 31 15:36:43 UTC 2017 kill -USR1 16880 httpserv: normal termination httpserv -b -p 9636 2>/dev/null; httpserv with PID 16880 killed at Fri Mar 31 15:36:43 UTC 2017 httpserv starting at Fri Mar 31 15:36:43 UTC 2017 httpserv -D -p 9636 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/aiahttp/http_pid.2460 & trying to connect to httpserv at Fri Mar 31 15:36:43 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 retrying to connect to httpserv at Fri Mar 31 15:36:49 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 chains.sh: #3037: Waiting for Server - FAILED kill -0 16969 >/dev/null 2>/dev/null httpserv with PID 16969 found at Fri Mar 31 15:36:49 UTC 2017 httpserv with PID 16969 started at Fri Mar 31 15:36:49 UTC 2017 tstclnt -h localhost.localdomain -p 9636 -q -t 20 tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #3038: Test that OCSP server is reachable - FAILED trying to kill httpserv with PID 16969 at Fri Mar 31 15:36:51 UTC 2017 kill -USR1 16969 httpserv: normal termination httpserv -b -p 9636 2>/dev/null; httpserv with PID 16969 killed at Fri Mar 31 15:36:51 UTC 2017 httpserv starting at Fri Mar 31 15:36:51 UTC 2017 httpserv -D -p 9636 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/aiahttp/http_pid.2460 & trying to connect to httpserv at Fri Mar 31 15:36:51 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 retrying to connect to httpserv at Fri Mar 31 15:36:57 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 chains.sh: #3039: Waiting for Server - FAILED kill -0 17054 >/dev/null 2>/dev/null httpserv with PID 17054 found at Fri Mar 31 15:36:57 UTC 2017 httpserv with PID 17054 started at Fri Mar 31 15:36:57 UTC 2017 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3040: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153313 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3041: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3042: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3043: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153314 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3044: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3045: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3046: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3047: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 331153315 -7 Bridge@Army < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3048: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3049: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 331153316 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3050: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3051: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3052: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3053: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3054: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 331153317 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3055: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3056: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3057: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #3058: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #3059: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153314 (0x13bcffa2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 15:37:22 2017 Not After : Thu Mar 31 15:37:22 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:37:dc:22:b8:4d:19:87:06:f6:5a:49:e7:3e:a5:ec: a3:1c:79:b4:9e:32:df:1d:d1:6e:26:d9:62:23:be:c3: 07:84:36:7c:66:5c:f2:58:00:a6:63:88:43:be:da:c7: e1:60:3c:f0:c2:cc:a4:20:ea:fe:a6:45:33:92:57:dc: 63:99:2a:b7:39:24:c0:15:89:c9:8d:11:90:4c:f5:5c: cd:7d:ed:d0:35:23:9f:f4:b3:e3:87:50:62:b7:a6:09: 9d:87:7e:3c:db:a5:2d:c0:a9:5f:2f:bd:42:72:cc:eb: 88:6a:82:a5:e8:6f:0c:5b:b8:b9:40:1e:f0:2a:a8:3c: 6b:57:33:bc:78:f2:02:d8:14:cb:2d:dc:76:29:6a:8b: 78:b6:30:53:19:0c:63:59:4c:9f:55:24:00:e8:15:0c: e0:fd:7c:66:4b:3d:ab:d6:1c:22:c1:4c:55:34:d9:51: 27:ac:b4:ac:19:6e:86:e2:3d:60:32:d8:1a:6c:5d:36: fb:1a:e4:18:ed:5d:53:e6:54:14:fd:0f:fe:af:41:53: 6d:ca:53:bd:a0:cd:39:e4:75:49:6e:81:f5:fb:98:a2: 04:de:e8:bc:bb:ef:9f:d6:d4:53:fa:c6:5a:ab:36:dd: 73:06:a3:9b:f6:1d:08:e2:e3:6f:ae:6f:c6:fc:ae:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:93:41:ba:cb:98:3b:ba:3f:45:c4:b2:1b:1c:bc:63: 28:b4:7d:da:59:a4:e6:04:51:b1:a8:23:78:93:1c:e1: fc:35:b7:8b:a7:d2:b1:1d:b5:5b:8e:17:aa:ca:ea:b7: 1a:6f:e9:5b:04:4c:08:3f:10:a0:a3:d9:9d:cc:5d:12: 53:00:ad:d9:25:41:b6:6b:8b:9b:21:e6:75:cb:be:96: 9f:d7:a2:03:c4:8a:89:80:ef:99:3d:f1:6a:bf:ab:a2: 76:c1:4f:38:3c:58:6e:c8:71:e3:61:9c:b5:6b:9e:e7: 13:ea:c6:d6:8b:96:f5:48:3c:ed:0c:b2:0f:66:24:59: 2e:20:12:fc:78:7c:d7:7a:73:97:58:0d:20:9b:83:9e: 11:25:4e:70:f8:bc:2d:2a:82:13:9b:aa:90:c7:9c:01: c9:57:0d:a5:49:3a:27:f9:31:66:79:29:a5:fc:0b:98: 6b:a1:aa:c6:b9:57:ae:ab:00:44:4c:3f:8f:f5:25:f9: f0:f7:3d:48:86:94:84:21:0c:23:9d:44:50:4a:5e:91: e5:90:fc:b2:f5:48:52:19:d9:43:5e:f5:80:7e:21:18: 75:f7:c9:ec:ba:78:12:94:2b:cf:9a:63:91:c3:85:34: 8a:fb:0f:4e:f3:3d:62:91:5b:7c:02:7e:67:47:78:af Fingerprint (SHA-256): 6E:D6:31:CF:E2:14:D1:C4:A3:56:94:AE:70:D6:0E:D5:89:7A:74:BD:5A:E7:1C:F7:16:6E:C1:09:F7:B2:A4:FA Fingerprint (SHA1): 72:6D:B6:64:35:84:7A:56:D7:D2:32:47:4E:77:45:43:C6:EE:99:47 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3060: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153313 (0x13bcffa1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 15:37:13 2017 Not After : Thu Mar 31 15:37:13 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:95:51:bb:15:ef:55:92:c1:c3:37:85:0b:47:06:d9: 01:00:ab:25:ed:2e:5e:4a:82:e0:33:12:40:05:e2:29: 5c:c7:7c:75:48:12:2d:9b:6c:6e:1b:04:df:29:55:af: 45:37:7b:e7:3a:18:41:4b:f9:45:98:fe:47:f2:ef:24: 4c:d7:b8:a2:17:5a:dd:b7:38:98:0a:69:18:34:43:66: 8a:bb:b6:fc:10:92:52:66:88:f4:52:09:36:42:62:79: d5:1e:27:3c:9e:2a:c4:76:f9:9e:14:4d:28:10:43:4b: f3:ab:c6:e3:25:75:bb:7e:ab:4f:59:23:87:38:3b:c5: cb:13:88:9a:ca:15:5a:e0:dd:87:2d:21:e0:80:9f:ab: 11:fb:40:c2:60:42:ab:ab:5c:55:c4:33:59:51:5b:6c: 79:8f:92:5e:7c:cd:a2:db:3b:06:bb:e8:7f:6f:6c:49: d5:33:06:10:2d:ea:58:e4:29:15:00:01:8f:5e:f8:2e: d3:b3:eb:8b:69:1a:aa:32:89:49:2f:84:9c:f7:41:91: 1f:20:50:b2:75:14:3d:3c:2a:b0:94:94:62:3d:46:30: 6d:1b:17:99:fe:dc:6f:14:c5:5a:e3:40:9c:ef:13:67: de:f6:95:37:df:ab:57:1f:e9:61:f7:cc:2e:48:31:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c4:a0:f7:6b:93:6f:44:09:3a:0a:29:ec:ac:7d:ee:57: 45:a9:67:cf:a3:c1:3e:52:4f:cc:93:71:90:51:43:37: 42:fc:a2:8c:aa:d4:0c:7d:8f:15:bc:37:60:8a:2f:5f: 34:10:58:78:c2:6f:bf:4a:09:f5:ae:7f:3c:26:ab:87: 67:45:46:0e:23:4a:91:84:95:5f:95:b0:31:26:32:04: b9:0e:81:1e:d6:3b:ec:4f:c9:c5:5a:d5:35:35:a5:5e: b5:3b:e6:8d:6c:b1:d7:ad:23:ef:ed:f2:59:f2:56:e8: cc:64:c8:a2:30:fa:9d:31:91:22:71:3f:bf:5c:8d:6b: 8c:e5:60:83:99:a3:71:a2:aa:80:d8:0f:c0:ed:a5:b3: ad:50:64:d8:0a:51:3d:41:ed:c5:b8:e7:7b:29:1e:3b: 2c:0e:37:37:09:fe:fc:1b:73:e6:63:df:cd:4d:8c:cc: b9:ad:65:13:95:1d:ad:78:dd:af:25:81:41:fe:02:8d: 1f:f6:00:e7:89:e8:66:7d:e9:cd:ba:b3:44:e6:54:6f: 18:5d:83:7c:ce:e9:72:89:24:56:fb:cf:eb:f3:3c:51: 7e:c9:72:d7:ab:ad:0d:4f:92:e8:1b:52:0b:c2:d8:38: e4:a7:62:95:3c:08:0a:24:a2:ba:f5:7c:17:dc:e0:91 Fingerprint (SHA-256): 02:D6:AA:50:25:AD:68:D3:E9:65:36:A0:19:E0:E8:AE:FE:75:2B:61:D1:A0:68:8D:15:58:5B:46:86:BF:97:97 Fingerprint (SHA1): 01:03:E7:74:9F:9E:07:FE:16:7E:7B:25:C0:0F:99:59:E0:0D:1D:45 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3061: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #3062: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #3063: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #3064: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153313 (0x13bcffa1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 15:37:13 2017 Not After : Thu Mar 31 15:37:13 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:95:51:bb:15:ef:55:92:c1:c3:37:85:0b:47:06:d9: 01:00:ab:25:ed:2e:5e:4a:82:e0:33:12:40:05:e2:29: 5c:c7:7c:75:48:12:2d:9b:6c:6e:1b:04:df:29:55:af: 45:37:7b:e7:3a:18:41:4b:f9:45:98:fe:47:f2:ef:24: 4c:d7:b8:a2:17:5a:dd:b7:38:98:0a:69:18:34:43:66: 8a:bb:b6:fc:10:92:52:66:88:f4:52:09:36:42:62:79: d5:1e:27:3c:9e:2a:c4:76:f9:9e:14:4d:28:10:43:4b: f3:ab:c6:e3:25:75:bb:7e:ab:4f:59:23:87:38:3b:c5: cb:13:88:9a:ca:15:5a:e0:dd:87:2d:21:e0:80:9f:ab: 11:fb:40:c2:60:42:ab:ab:5c:55:c4:33:59:51:5b:6c: 79:8f:92:5e:7c:cd:a2:db:3b:06:bb:e8:7f:6f:6c:49: d5:33:06:10:2d:ea:58:e4:29:15:00:01:8f:5e:f8:2e: d3:b3:eb:8b:69:1a:aa:32:89:49:2f:84:9c:f7:41:91: 1f:20:50:b2:75:14:3d:3c:2a:b0:94:94:62:3d:46:30: 6d:1b:17:99:fe:dc:6f:14:c5:5a:e3:40:9c:ef:13:67: de:f6:95:37:df:ab:57:1f:e9:61:f7:cc:2e:48:31:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c4:a0:f7:6b:93:6f:44:09:3a:0a:29:ec:ac:7d:ee:57: 45:a9:67:cf:a3:c1:3e:52:4f:cc:93:71:90:51:43:37: 42:fc:a2:8c:aa:d4:0c:7d:8f:15:bc:37:60:8a:2f:5f: 34:10:58:78:c2:6f:bf:4a:09:f5:ae:7f:3c:26:ab:87: 67:45:46:0e:23:4a:91:84:95:5f:95:b0:31:26:32:04: b9:0e:81:1e:d6:3b:ec:4f:c9:c5:5a:d5:35:35:a5:5e: b5:3b:e6:8d:6c:b1:d7:ad:23:ef:ed:f2:59:f2:56:e8: cc:64:c8:a2:30:fa:9d:31:91:22:71:3f:bf:5c:8d:6b: 8c:e5:60:83:99:a3:71:a2:aa:80:d8:0f:c0:ed:a5:b3: ad:50:64:d8:0a:51:3d:41:ed:c5:b8:e7:7b:29:1e:3b: 2c:0e:37:37:09:fe:fc:1b:73:e6:63:df:cd:4d:8c:cc: b9:ad:65:13:95:1d:ad:78:dd:af:25:81:41:fe:02:8d: 1f:f6:00:e7:89:e8:66:7d:e9:cd:ba:b3:44:e6:54:6f: 18:5d:83:7c:ce:e9:72:89:24:56:fb:cf:eb:f3:3c:51: 7e:c9:72:d7:ab:ad:0d:4f:92:e8:1b:52:0b:c2:d8:38: e4:a7:62:95:3c:08:0a:24:a2:ba:f5:7c:17:dc:e0:91 Fingerprint (SHA-256): 02:D6:AA:50:25:AD:68:D3:E9:65:36:A0:19:E0:E8:AE:FE:75:2B:61:D1:A0:68:8D:15:58:5B:46:86:BF:97:97 Fingerprint (SHA1): 01:03:E7:74:9F:9E:07:FE:16:7E:7B:25:C0:0F:99:59:E0:0D:1D:45 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3065: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153314 (0x13bcffa2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 15:37:22 2017 Not After : Thu Mar 31 15:37:22 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:37:dc:22:b8:4d:19:87:06:f6:5a:49:e7:3e:a5:ec: a3:1c:79:b4:9e:32:df:1d:d1:6e:26:d9:62:23:be:c3: 07:84:36:7c:66:5c:f2:58:00:a6:63:88:43:be:da:c7: e1:60:3c:f0:c2:cc:a4:20:ea:fe:a6:45:33:92:57:dc: 63:99:2a:b7:39:24:c0:15:89:c9:8d:11:90:4c:f5:5c: cd:7d:ed:d0:35:23:9f:f4:b3:e3:87:50:62:b7:a6:09: 9d:87:7e:3c:db:a5:2d:c0:a9:5f:2f:bd:42:72:cc:eb: 88:6a:82:a5:e8:6f:0c:5b:b8:b9:40:1e:f0:2a:a8:3c: 6b:57:33:bc:78:f2:02:d8:14:cb:2d:dc:76:29:6a:8b: 78:b6:30:53:19:0c:63:59:4c:9f:55:24:00:e8:15:0c: e0:fd:7c:66:4b:3d:ab:d6:1c:22:c1:4c:55:34:d9:51: 27:ac:b4:ac:19:6e:86:e2:3d:60:32:d8:1a:6c:5d:36: fb:1a:e4:18:ed:5d:53:e6:54:14:fd:0f:fe:af:41:53: 6d:ca:53:bd:a0:cd:39:e4:75:49:6e:81:f5:fb:98:a2: 04:de:e8:bc:bb:ef:9f:d6:d4:53:fa:c6:5a:ab:36:dd: 73:06:a3:9b:f6:1d:08:e2:e3:6f:ae:6f:c6:fc:ae:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:93:41:ba:cb:98:3b:ba:3f:45:c4:b2:1b:1c:bc:63: 28:b4:7d:da:59:a4:e6:04:51:b1:a8:23:78:93:1c:e1: fc:35:b7:8b:a7:d2:b1:1d:b5:5b:8e:17:aa:ca:ea:b7: 1a:6f:e9:5b:04:4c:08:3f:10:a0:a3:d9:9d:cc:5d:12: 53:00:ad:d9:25:41:b6:6b:8b:9b:21:e6:75:cb:be:96: 9f:d7:a2:03:c4:8a:89:80:ef:99:3d:f1:6a:bf:ab:a2: 76:c1:4f:38:3c:58:6e:c8:71:e3:61:9c:b5:6b:9e:e7: 13:ea:c6:d6:8b:96:f5:48:3c:ed:0c:b2:0f:66:24:59: 2e:20:12:fc:78:7c:d7:7a:73:97:58:0d:20:9b:83:9e: 11:25:4e:70:f8:bc:2d:2a:82:13:9b:aa:90:c7:9c:01: c9:57:0d:a5:49:3a:27:f9:31:66:79:29:a5:fc:0b:98: 6b:a1:aa:c6:b9:57:ae:ab:00:44:4c:3f:8f:f5:25:f9: f0:f7:3d:48:86:94:84:21:0c:23:9d:44:50:4a:5e:91: e5:90:fc:b2:f5:48:52:19:d9:43:5e:f5:80:7e:21:18: 75:f7:c9:ec:ba:78:12:94:2b:cf:9a:63:91:c3:85:34: 8a:fb:0f:4e:f3:3d:62:91:5b:7c:02:7e:67:47:78:af Fingerprint (SHA-256): 6E:D6:31:CF:E2:14:D1:C4:A3:56:94:AE:70:D6:0E:D5:89:7A:74:BD:5A:E7:1C:F7:16:6E:C1:09:F7:B2:A4:FA Fingerprint (SHA1): 72:6D:B6:64:35:84:7A:56:D7:D2:32:47:4E:77:45:43:C6:EE:99:47 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3066: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #3067: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #3068: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3069: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #3070: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #3071: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153314 (0x13bcffa2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 15:37:22 2017 Not After : Thu Mar 31 15:37:22 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:37:dc:22:b8:4d:19:87:06:f6:5a:49:e7:3e:a5:ec: a3:1c:79:b4:9e:32:df:1d:d1:6e:26:d9:62:23:be:c3: 07:84:36:7c:66:5c:f2:58:00:a6:63:88:43:be:da:c7: e1:60:3c:f0:c2:cc:a4:20:ea:fe:a6:45:33:92:57:dc: 63:99:2a:b7:39:24:c0:15:89:c9:8d:11:90:4c:f5:5c: cd:7d:ed:d0:35:23:9f:f4:b3:e3:87:50:62:b7:a6:09: 9d:87:7e:3c:db:a5:2d:c0:a9:5f:2f:bd:42:72:cc:eb: 88:6a:82:a5:e8:6f:0c:5b:b8:b9:40:1e:f0:2a:a8:3c: 6b:57:33:bc:78:f2:02:d8:14:cb:2d:dc:76:29:6a:8b: 78:b6:30:53:19:0c:63:59:4c:9f:55:24:00:e8:15:0c: e0:fd:7c:66:4b:3d:ab:d6:1c:22:c1:4c:55:34:d9:51: 27:ac:b4:ac:19:6e:86:e2:3d:60:32:d8:1a:6c:5d:36: fb:1a:e4:18:ed:5d:53:e6:54:14:fd:0f:fe:af:41:53: 6d:ca:53:bd:a0:cd:39:e4:75:49:6e:81:f5:fb:98:a2: 04:de:e8:bc:bb:ef:9f:d6:d4:53:fa:c6:5a:ab:36:dd: 73:06:a3:9b:f6:1d:08:e2:e3:6f:ae:6f:c6:fc:ae:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:93:41:ba:cb:98:3b:ba:3f:45:c4:b2:1b:1c:bc:63: 28:b4:7d:da:59:a4:e6:04:51:b1:a8:23:78:93:1c:e1: fc:35:b7:8b:a7:d2:b1:1d:b5:5b:8e:17:aa:ca:ea:b7: 1a:6f:e9:5b:04:4c:08:3f:10:a0:a3:d9:9d:cc:5d:12: 53:00:ad:d9:25:41:b6:6b:8b:9b:21:e6:75:cb:be:96: 9f:d7:a2:03:c4:8a:89:80:ef:99:3d:f1:6a:bf:ab:a2: 76:c1:4f:38:3c:58:6e:c8:71:e3:61:9c:b5:6b:9e:e7: 13:ea:c6:d6:8b:96:f5:48:3c:ed:0c:b2:0f:66:24:59: 2e:20:12:fc:78:7c:d7:7a:73:97:58:0d:20:9b:83:9e: 11:25:4e:70:f8:bc:2d:2a:82:13:9b:aa:90:c7:9c:01: c9:57:0d:a5:49:3a:27:f9:31:66:79:29:a5:fc:0b:98: 6b:a1:aa:c6:b9:57:ae:ab:00:44:4c:3f:8f:f5:25:f9: f0:f7:3d:48:86:94:84:21:0c:23:9d:44:50:4a:5e:91: e5:90:fc:b2:f5:48:52:19:d9:43:5e:f5:80:7e:21:18: 75:f7:c9:ec:ba:78:12:94:2b:cf:9a:63:91:c3:85:34: 8a:fb:0f:4e:f3:3d:62:91:5b:7c:02:7e:67:47:78:af Fingerprint (SHA-256): 6E:D6:31:CF:E2:14:D1:C4:A3:56:94:AE:70:D6:0E:D5:89:7A:74:BD:5A:E7:1C:F7:16:6E:C1:09:F7:B2:A4:FA Fingerprint (SHA1): 72:6D:B6:64:35:84:7A:56:D7:D2:32:47:4E:77:45:43:C6:EE:99:47 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3072: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153314 (0x13bcffa2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 15:37:22 2017 Not After : Thu Mar 31 15:37:22 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:37:dc:22:b8:4d:19:87:06:f6:5a:49:e7:3e:a5:ec: a3:1c:79:b4:9e:32:df:1d:d1:6e:26:d9:62:23:be:c3: 07:84:36:7c:66:5c:f2:58:00:a6:63:88:43:be:da:c7: e1:60:3c:f0:c2:cc:a4:20:ea:fe:a6:45:33:92:57:dc: 63:99:2a:b7:39:24:c0:15:89:c9:8d:11:90:4c:f5:5c: cd:7d:ed:d0:35:23:9f:f4:b3:e3:87:50:62:b7:a6:09: 9d:87:7e:3c:db:a5:2d:c0:a9:5f:2f:bd:42:72:cc:eb: 88:6a:82:a5:e8:6f:0c:5b:b8:b9:40:1e:f0:2a:a8:3c: 6b:57:33:bc:78:f2:02:d8:14:cb:2d:dc:76:29:6a:8b: 78:b6:30:53:19:0c:63:59:4c:9f:55:24:00:e8:15:0c: e0:fd:7c:66:4b:3d:ab:d6:1c:22:c1:4c:55:34:d9:51: 27:ac:b4:ac:19:6e:86:e2:3d:60:32:d8:1a:6c:5d:36: fb:1a:e4:18:ed:5d:53:e6:54:14:fd:0f:fe:af:41:53: 6d:ca:53:bd:a0:cd:39:e4:75:49:6e:81:f5:fb:98:a2: 04:de:e8:bc:bb:ef:9f:d6:d4:53:fa:c6:5a:ab:36:dd: 73:06:a3:9b:f6:1d:08:e2:e3:6f:ae:6f:c6:fc:ae:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:93:41:ba:cb:98:3b:ba:3f:45:c4:b2:1b:1c:bc:63: 28:b4:7d:da:59:a4:e6:04:51:b1:a8:23:78:93:1c:e1: fc:35:b7:8b:a7:d2:b1:1d:b5:5b:8e:17:aa:ca:ea:b7: 1a:6f:e9:5b:04:4c:08:3f:10:a0:a3:d9:9d:cc:5d:12: 53:00:ad:d9:25:41:b6:6b:8b:9b:21:e6:75:cb:be:96: 9f:d7:a2:03:c4:8a:89:80:ef:99:3d:f1:6a:bf:ab:a2: 76:c1:4f:38:3c:58:6e:c8:71:e3:61:9c:b5:6b:9e:e7: 13:ea:c6:d6:8b:96:f5:48:3c:ed:0c:b2:0f:66:24:59: 2e:20:12:fc:78:7c:d7:7a:73:97:58:0d:20:9b:83:9e: 11:25:4e:70:f8:bc:2d:2a:82:13:9b:aa:90:c7:9c:01: c9:57:0d:a5:49:3a:27:f9:31:66:79:29:a5:fc:0b:98: 6b:a1:aa:c6:b9:57:ae:ab:00:44:4c:3f:8f:f5:25:f9: f0:f7:3d:48:86:94:84:21:0c:23:9d:44:50:4a:5e:91: e5:90:fc:b2:f5:48:52:19:d9:43:5e:f5:80:7e:21:18: 75:f7:c9:ec:ba:78:12:94:2b:cf:9a:63:91:c3:85:34: 8a:fb:0f:4e:f3:3d:62:91:5b:7c:02:7e:67:47:78:af Fingerprint (SHA-256): 6E:D6:31:CF:E2:14:D1:C4:A3:56:94:AE:70:D6:0E:D5:89:7A:74:BD:5A:E7:1C:F7:16:6E:C1:09:F7:B2:A4:FA Fingerprint (SHA1): 72:6D:B6:64:35:84:7A:56:D7:D2:32:47:4E:77:45:43:C6:EE:99:47 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3073: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #3074: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #3075: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3076: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #3077: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #3078: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153313 (0x13bcffa1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 15:37:13 2017 Not After : Thu Mar 31 15:37:13 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:95:51:bb:15:ef:55:92:c1:c3:37:85:0b:47:06:d9: 01:00:ab:25:ed:2e:5e:4a:82:e0:33:12:40:05:e2:29: 5c:c7:7c:75:48:12:2d:9b:6c:6e:1b:04:df:29:55:af: 45:37:7b:e7:3a:18:41:4b:f9:45:98:fe:47:f2:ef:24: 4c:d7:b8:a2:17:5a:dd:b7:38:98:0a:69:18:34:43:66: 8a:bb:b6:fc:10:92:52:66:88:f4:52:09:36:42:62:79: d5:1e:27:3c:9e:2a:c4:76:f9:9e:14:4d:28:10:43:4b: f3:ab:c6:e3:25:75:bb:7e:ab:4f:59:23:87:38:3b:c5: cb:13:88:9a:ca:15:5a:e0:dd:87:2d:21:e0:80:9f:ab: 11:fb:40:c2:60:42:ab:ab:5c:55:c4:33:59:51:5b:6c: 79:8f:92:5e:7c:cd:a2:db:3b:06:bb:e8:7f:6f:6c:49: d5:33:06:10:2d:ea:58:e4:29:15:00:01:8f:5e:f8:2e: d3:b3:eb:8b:69:1a:aa:32:89:49:2f:84:9c:f7:41:91: 1f:20:50:b2:75:14:3d:3c:2a:b0:94:94:62:3d:46:30: 6d:1b:17:99:fe:dc:6f:14:c5:5a:e3:40:9c:ef:13:67: de:f6:95:37:df:ab:57:1f:e9:61:f7:cc:2e:48:31:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c4:a0:f7:6b:93:6f:44:09:3a:0a:29:ec:ac:7d:ee:57: 45:a9:67:cf:a3:c1:3e:52:4f:cc:93:71:90:51:43:37: 42:fc:a2:8c:aa:d4:0c:7d:8f:15:bc:37:60:8a:2f:5f: 34:10:58:78:c2:6f:bf:4a:09:f5:ae:7f:3c:26:ab:87: 67:45:46:0e:23:4a:91:84:95:5f:95:b0:31:26:32:04: b9:0e:81:1e:d6:3b:ec:4f:c9:c5:5a:d5:35:35:a5:5e: b5:3b:e6:8d:6c:b1:d7:ad:23:ef:ed:f2:59:f2:56:e8: cc:64:c8:a2:30:fa:9d:31:91:22:71:3f:bf:5c:8d:6b: 8c:e5:60:83:99:a3:71:a2:aa:80:d8:0f:c0:ed:a5:b3: ad:50:64:d8:0a:51:3d:41:ed:c5:b8:e7:7b:29:1e:3b: 2c:0e:37:37:09:fe:fc:1b:73:e6:63:df:cd:4d:8c:cc: b9:ad:65:13:95:1d:ad:78:dd:af:25:81:41:fe:02:8d: 1f:f6:00:e7:89:e8:66:7d:e9:cd:ba:b3:44:e6:54:6f: 18:5d:83:7c:ce:e9:72:89:24:56:fb:cf:eb:f3:3c:51: 7e:c9:72:d7:ab:ad:0d:4f:92:e8:1b:52:0b:c2:d8:38: e4:a7:62:95:3c:08:0a:24:a2:ba:f5:7c:17:dc:e0:91 Fingerprint (SHA-256): 02:D6:AA:50:25:AD:68:D3:E9:65:36:A0:19:E0:E8:AE:FE:75:2B:61:D1:A0:68:8D:15:58:5B:46:86:BF:97:97 Fingerprint (SHA1): 01:03:E7:74:9F:9E:07:FE:16:7E:7B:25:C0:0F:99:59:E0:0D:1D:45 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3079: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153313 (0x13bcffa1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 15:37:13 2017 Not After : Thu Mar 31 15:37:13 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:95:51:bb:15:ef:55:92:c1:c3:37:85:0b:47:06:d9: 01:00:ab:25:ed:2e:5e:4a:82:e0:33:12:40:05:e2:29: 5c:c7:7c:75:48:12:2d:9b:6c:6e:1b:04:df:29:55:af: 45:37:7b:e7:3a:18:41:4b:f9:45:98:fe:47:f2:ef:24: 4c:d7:b8:a2:17:5a:dd:b7:38:98:0a:69:18:34:43:66: 8a:bb:b6:fc:10:92:52:66:88:f4:52:09:36:42:62:79: d5:1e:27:3c:9e:2a:c4:76:f9:9e:14:4d:28:10:43:4b: f3:ab:c6:e3:25:75:bb:7e:ab:4f:59:23:87:38:3b:c5: cb:13:88:9a:ca:15:5a:e0:dd:87:2d:21:e0:80:9f:ab: 11:fb:40:c2:60:42:ab:ab:5c:55:c4:33:59:51:5b:6c: 79:8f:92:5e:7c:cd:a2:db:3b:06:bb:e8:7f:6f:6c:49: d5:33:06:10:2d:ea:58:e4:29:15:00:01:8f:5e:f8:2e: d3:b3:eb:8b:69:1a:aa:32:89:49:2f:84:9c:f7:41:91: 1f:20:50:b2:75:14:3d:3c:2a:b0:94:94:62:3d:46:30: 6d:1b:17:99:fe:dc:6f:14:c5:5a:e3:40:9c:ef:13:67: de:f6:95:37:df:ab:57:1f:e9:61:f7:cc:2e:48:31:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c4:a0:f7:6b:93:6f:44:09:3a:0a:29:ec:ac:7d:ee:57: 45:a9:67:cf:a3:c1:3e:52:4f:cc:93:71:90:51:43:37: 42:fc:a2:8c:aa:d4:0c:7d:8f:15:bc:37:60:8a:2f:5f: 34:10:58:78:c2:6f:bf:4a:09:f5:ae:7f:3c:26:ab:87: 67:45:46:0e:23:4a:91:84:95:5f:95:b0:31:26:32:04: b9:0e:81:1e:d6:3b:ec:4f:c9:c5:5a:d5:35:35:a5:5e: b5:3b:e6:8d:6c:b1:d7:ad:23:ef:ed:f2:59:f2:56:e8: cc:64:c8:a2:30:fa:9d:31:91:22:71:3f:bf:5c:8d:6b: 8c:e5:60:83:99:a3:71:a2:aa:80:d8:0f:c0:ed:a5:b3: ad:50:64:d8:0a:51:3d:41:ed:c5:b8:e7:7b:29:1e:3b: 2c:0e:37:37:09:fe:fc:1b:73:e6:63:df:cd:4d:8c:cc: b9:ad:65:13:95:1d:ad:78:dd:af:25:81:41:fe:02:8d: 1f:f6:00:e7:89:e8:66:7d:e9:cd:ba:b3:44:e6:54:6f: 18:5d:83:7c:ce:e9:72:89:24:56:fb:cf:eb:f3:3c:51: 7e:c9:72:d7:ab:ad:0d:4f:92:e8:1b:52:0b:c2:d8:38: e4:a7:62:95:3c:08:0a:24:a2:ba:f5:7c:17:dc:e0:91 Fingerprint (SHA-256): 02:D6:AA:50:25:AD:68:D3:E9:65:36:A0:19:E0:E8:AE:FE:75:2B:61:D1:A0:68:8D:15:58:5B:46:86:BF:97:97 Fingerprint (SHA1): 01:03:E7:74:9F:9E:07:FE:16:7E:7B:25:C0:0F:99:59:E0:0D:1D:45 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3080: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #3081: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153318 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3082: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #3083: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #3084: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153319 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3085: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #3086: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #3087: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153320 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3088: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #3089: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #3090: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153321 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3091: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #3092: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #3093: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153322 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3094: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #3095: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #3096: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153323 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3097: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #3098: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #3099: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153324 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3100: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #3101: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #3102: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153325 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3103: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #3104: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #3105: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153326 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3106: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #3107: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #3108: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3109: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 331153327 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3110: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3111: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 331153328 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3112: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3113: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 331153329 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3114: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3115: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #3116: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #3117: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3118: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 331153330 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3119: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3120: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 331153331 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3121: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3122: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 331153332 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3123: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3124: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #3125: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #3126: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3127: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 331153333 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3128: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3129: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 331153334 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3130: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3131: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 331153335 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3132: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3133: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #3134: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #3135: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3136: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 331153336 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3137: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3138: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 331153337 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3139: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3140: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 331153338 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3141: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3142: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #3143: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3144: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3145: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 331153339 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3146: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3147: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3148: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3149: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331153340 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3150: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3151: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153318 (0x13bcffa6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Mar 31 15:38:14 2017 Not After : Thu Mar 31 15:38:14 2067 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:5a:a8:5c:f9:fa:70:bd:d2:69:d5:38:e8:f1:24:05: da:87:5b:ba:fc:b7:89:64:75:a0:ff:bb:91:39:79:0f: 28:8c:26:10:ce:a8:d1:f3:f7:05:7b:b2:9c:29:c9:3f: 2f:58:0a:4f:c3:b5:d9:2e:a4:fd:c2:df:9b:af:4a:12: 0a:55:87:2c:e8:42:af:d5:61:d0:43:d0:04:7b:50:f0: ed:08:f1:53:44:ad:2d:49:47:b3:2a:ef:80:c5:a0:e7: 14:37:cd:1f:2d:74:73:65:21:e5:e9:ac:f0:13:f2:43: 17:32:77:eb:24:36:03:2b:6c:0e:04:f8:7d:b8:72:9e: f7:4d:6a:5e:62:fe:83:d7:82:8d:f2:f3:8f:d6:0e:48: e5:27:81:8d:5c:c0:2d:db:9b:a5:0f:f2:f1:d8:17:1a: 3e:36:31:52:a5:88:75:7e:c9:86:a8:10:d6:ce:2b:88: 80:da:48:63:20:07:98:fe:97:f2:46:33:f4:77:61:5e: fc:90:08:34:a0:ad:a3:53:0b:e5:07:6b:f8:25:f6:9c: a1:4d:8e:eb:c9:d0:ae:b9:27:83:2e:4e:9b:61:4f:a0: 95:9a:eb:71:6b:8f:a0:e0:f4:cd:5e:53:f2:5c:28:b4: b2:53:6b:54:06:76:8d:c2:57:ce:07:e3:97:a7:16:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:7b:d2:61:dc:f4:74:99:69:81:a0:96:08:77:1c:22: 60:00:72:fc:06:8c:3c:41:d6:8a:3a:22:cf:6b:bb:bd: f6:2d:ff:22:57:8f:be:ab:9d:b1:b0:ed:c5:b3:cf:ea: 35:c4:9b:11:78:3f:d2:8d:15:7a:e8:73:b6:e9:b3:96: a5:7f:60:2f:91:23:8b:7d:5a:77:09:82:a8:8e:4c:cb: 41:3c:0c:25:79:4a:15:94:7f:da:e8:5e:c8:68:3a:18: df:24:57:16:4a:ee:23:79:51:d3:31:4e:2d:81:51:f0: da:ae:1b:57:c1:8e:72:72:97:63:fa:f7:74:e6:e5:41: 1a:b4:c2:67:76:11:3e:d5:ad:85:5d:71:d2:ee:09:26: ca:82:01:eb:6c:dc:18:dd:d8:7e:6d:ac:a1:fb:48:a9: 93:5f:68:d5:1a:ab:50:56:b6:26:60:ba:cc:70:e8:9c: c5:0f:17:9b:7d:d1:0a:fd:13:c2:e9:f3:7a:75:8f:2f: 48:e2:30:ef:7f:2f:22:fe:18:f0:3b:3c:b2:e0:fe:27: 41:58:9b:b3:f9:bd:d1:79:86:db:bf:6b:66:31:3c:98: d3:54:aa:0c:45:e7:c4:87:8a:c4:52:64:88:0a:00:e9: 44:98:3c:08:c8:e6:a1:cc:d9:9b:d2:21:7d:d8:87:27 Fingerprint (SHA-256): 1D:82:B2:A7:D3:D3:FD:79:30:B4:F4:90:65:DF:DD:A4:A5:CA:59:0E:AC:3C:11:A2:9D:14:3B:E9:6C:5B:58:A6 Fingerprint (SHA1): AC:BC:07:2B:DF:2C:55:3E:42:E9:3B:6A:B8:98:04:D8:7E:5B:D3:47 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3152: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153319 (0x13bcffa7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Mar 31 15:38:18 2017 Not After : Thu Mar 31 15:38:18 2067 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:d9:a9:3f:54:53:92:6f:b8:b8:08:10:8e:65:2b:c7: 9a:2d:73:7c:f9:36:3f:ed:17:fd:71:24:17:53:fc:c6: 31:14:60:5b:b5:38:2e:f9:e8:62:28:e2:42:82:1b:a3: a9:43:24:85:f8:b5:0b:46:48:b8:8e:e7:69:a1:e7:67: 9c:26:a4:a6:93:7b:b7:90:3e:32:85:55:be:a2:a8:b9: 9b:1a:e8:8c:09:77:36:04:43:9f:01:3c:52:d4:24:43: e2:a7:ae:b1:9d:5f:1e:1c:10:80:92:4b:40:66:c0:c7: 8e:dd:e6:8a:cc:50:c0:a0:d3:27:7e:6d:c9:2b:e8:e5: b0:9f:20:c0:25:f7:b6:6d:e5:01:15:78:e9:c0:ca:22: 6e:d6:9c:d5:9d:87:40:1c:c3:d3:93:22:89:32:0b:60: 68:0a:f6:a2:e8:e4:15:e2:75:93:d8:f0:12:4b:71:53: eb:e8:ca:62:3e:52:ea:dd:70:28:83:67:02:da:ea:14: d4:97:14:54:e8:c7:fd:fd:57:c2:f3:1c:13:31:63:eb: 30:e3:29:7a:b0:41:18:c4:3c:ba:47:18:fe:17:09:2e: 2c:07:14:f7:0f:0d:c5:21:83:9f:37:61:0f:52:28:c5: 41:9f:80:b7:16:08:fb:36:93:f6:17:63:b8:a6:18:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:f9:d5:1b:d2:d5:41:b4:4e:61:85:ae:0d:5e:5c:fd: 90:8f:c3:c0:dd:32:6a:8d:fe:6c:3a:5f:30:9b:ea:7e: 21:6b:e7:23:a1:2a:fc:21:3d:c3:6f:42:12:cf:95:97: cc:5c:cc:80:c5:bd:87:4b:33:4c:db:ad:a1:a6:64:f6: 1e:35:1c:15:ed:5b:dd:16:62:d3:08:6a:22:26:bc:a0: 6c:88:5b:e7:34:f4:03:25:a2:b3:ec:d2:e1:e9:3e:c7: 72:2a:a6:ee:99:26:0d:c9:11:71:7b:e0:be:28:b1:33: c8:43:f8:c5:c0:a4:f3:e7:74:01:6b:b7:ba:64:11:c5: c6:0b:a4:d2:7f:10:0e:f3:3c:0e:13:f5:57:94:2d:e1: fb:5d:4f:83:b4:cd:d5:8c:95:43:97:9f:42:1e:3d:70: 7f:dd:3e:be:18:70:18:a2:a7:cf:c8:8f:cb:4b:2a:e5: 87:e3:22:01:93:a0:8e:c6:1a:b6:ac:e4:3c:84:46:76: 39:3e:66:27:60:be:cc:9e:28:7a:e5:6b:7c:3d:b1:87: b9:2d:cc:f0:a7:ec:9c:68:97:9b:67:16:19:bb:65:10: bd:d2:0b:cd:2a:f1:5d:4b:e7:8f:9d:4b:eb:7e:66:66: d6:cc:c0:21:3d:47:1e:c2:8e:b6:04:f4:48:97:7d:f5 Fingerprint (SHA-256): 14:34:C2:E9:F4:B1:A6:BA:59:A6:2C:BD:A3:D3:BE:E5:BC:A3:1A:11:7A:A1:38:C6:41:77:6D:F5:BC:97:C6:F5 Fingerprint (SHA1): 36:19:CC:0A:FA:B5:5C:67:0C:FC:0A:CB:AB:69:B6:15:64:C0:F5:39 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3153: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153320 (0x13bcffa8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Mar 31 15:38:40 2017 Not After : Thu Mar 31 15:38:40 2067 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:90:fc:e5:0b:79:3b:28:4a:3c:3a:8b:05:b1:34:3e: 1b:37:0a:f7:f3:76:0d:27:04:e8:a4:fb:40:e3:f5:aa: dd:3a:a7:6a:d4:9f:48:0c:22:a7:0e:d1:81:85:ca:d4: 4a:3a:5c:b7:63:df:3a:7e:eb:e2:eb:58:2b:bd:58:40: 7c:cd:ae:87:10:8f:a3:a7:93:c5:c0:6e:d5:fa:2b:bd: 57:4e:cb:78:ad:1f:26:67:bc:c5:4b:53:af:ad:2d:21: eb:e6:39:d0:c1:f8:ea:fa:3b:28:ad:6d:15:75:80:8d: 65:d3:69:36:42:ae:20:9f:39:43:a3:3c:70:6a:cd:fd: 17:b2:a2:0d:5b:76:d9:07:86:ae:df:2d:d4:71:d8:93: 31:d6:71:1d:34:eb:9d:96:70:8a:84:ac:29:41:be:8a: 46:87:19:3a:30:6b:65:b6:87:52:cc:ec:81:fa:d0:09: 9d:33:1c:42:8e:db:fd:18:9e:87:ed:d6:d3:82:e6:bb: f4:bf:3a:8e:d6:ba:53:af:af:4d:c4:d4:d5:3a:e6:20: 65:fa:75:66:55:f5:bb:74:eb:df:17:67:2b:97:10:af: 15:00:d5:14:37:a5:77:7f:89:24:0f:79:8f:dd:b4:fc: e8:29:1e:5c:ca:7b:58:20:a4:b5:96:6d:1b:b6:d9:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:70:0e:ed:f7:16:e0:68:21:ea:aa:0e:12:e4:c7:90: d8:52:7c:f5:94:fa:c4:d1:9e:d0:3e:a0:0b:a1:ba:f8: 09:b7:61:22:5d:af:cf:fc:2d:81:92:84:55:03:50:b2: e1:be:b2:10:bd:44:47:da:38:5c:82:26:11:2f:80:0d: 9a:6c:ac:b7:4a:04:01:3a:d1:71:5e:65:bb:2c:de:d3: d7:37:97:1f:8b:ba:ee:cd:a7:19:f7:38:9a:5d:ca:60: dd:4d:8e:40:46:11:31:e0:75:47:fb:9d:87:9a:67:6a: c4:3e:e0:85:03:24:70:81:ea:c1:f6:c3:ac:e9:b7:7c: 55:43:e0:fd:58:ff:2e:69:9c:e7:dc:5a:8a:55:6c:8e: 63:6d:bc:01:30:e6:42:9d:39:4b:9f:c2:c7:90:51:a8: bf:43:78:42:48:ae:1c:8b:46:d8:25:93:b0:be:ef:c3: c2:d3:0a:dd:d9:94:a0:30:0f:b0:02:f1:28:23:1c:2b: 91:79:2d:81:64:58:2f:77:09:16:59:47:b3:43:80:cf: 35:f5:b9:7a:67:4c:88:1a:39:9b:0a:e6:d2:4c:fa:2e: 7e:9e:42:6d:5d:7b:f0:8d:a8:bb:60:43:60:2d:db:39: 9d:18:ca:55:49:93:4c:59:ad:2b:40:ba:75:d6:78:ec Fingerprint (SHA-256): 0F:AD:50:69:AF:C2:61:3C:44:E8:0E:2F:1C:23:C0:E6:ED:4C:95:9A:DA:73:50:B8:81:C0:B3:3C:F3:D1:C0:96 Fingerprint (SHA1): 53:BE:42:36:66:48:B3:CF:4B:23:E9:0C:D2:35:48:52:D7:6B:EA:45 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3154: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153321 (0x13bcffa9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Mar 31 15:38:46 2017 Not After : Thu Mar 31 15:38:46 2067 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:a8:38:92:36:ae:00:de:87:9c:a1:18:2a:f3:f6:32: 00:75:5e:81:2d:a0:a0:be:d5:0d:88:11:d4:97:2c:72: 52:14:b6:06:43:f3:88:f9:2a:ed:7f:e3:09:25:1c:7b: 1e:76:9e:79:e5:46:3a:15:dc:72:55:ac:60:d6:a0:1c: 33:fe:ef:35:98:0c:d9:81:58:9b:f2:02:a3:f1:74:52: e4:21:2c:d0:f7:af:95:be:a3:fb:96:ea:2c:8b:6b:70: a7:67:48:a2:74:fc:3c:af:94:54:88:6e:90:dc:43:a3: 78:6d:4d:1f:c6:f8:ed:d4:3c:e5:64:bd:ad:c0:01:84: 46:f6:c4:37:54:36:67:aa:99:4a:37:5d:bb:92:7f:c0: a9:84:3d:89:56:6c:f4:2a:b7:07:22:86:a4:50:2d:fb: fd:e9:4f:1a:e1:3c:f7:9e:5c:f7:f8:64:e4:21:ea:06: af:22:47:97:0d:1a:0b:38:d8:02:d8:ea:dd:43:f9:8f: 21:0d:60:ac:02:c9:68:e4:1e:73:e0:52:41:00:ce:13: 3c:93:fe:ce:9f:09:0e:49:cb:ce:cc:8a:ae:49:a0:8f: ab:5c:3c:07:78:8d:f6:bc:83:75:1d:0f:89:81:b7:ce: 8e:41:12:a8:2a:08:bc:19:41:46:be:58:3c:73:7f:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:3e:82:04:3a:6f:17:3a:18:ea:77:5b:f9:2e:f5:12: ed:9e:29:0a:e2:7d:ab:33:97:ef:26:7b:66:56:d3:1a: f0:78:e6:bb:22:63:1f:98:fd:d1:08:5f:ce:67:1a:90: 44:4b:94:6e:ea:91:cc:a1:fb:64:f3:3d:3a:e6:d4:b3: b8:d9:01:b4:e0:65:84:e0:6c:28:5a:20:97:e5:be:d6: 43:da:2c:74:93:4b:a6:c9:24:02:8f:84:04:d7:18:03: f6:53:7f:84:ff:03:59:60:53:32:ce:79:19:22:47:21: eb:8b:01:28:67:7d:2e:9e:71:f9:1e:e7:e5:e4:fb:30: a6:bd:1b:36:09:3d:f1:b0:bd:6d:86:3a:b8:11:61:e6: f0:42:47:3a:09:d3:de:9b:21:69:79:ea:45:2c:2c:80: 38:f3:21:e0:fb:ed:ca:ce:2e:c0:f2:1f:31:73:a9:c7: f0:2d:92:ce:f9:2d:50:c9:11:fb:d3:2d:e4:54:20:20: eb:55:e2:ed:c8:c5:57:2e:27:cb:dc:55:57:6b:fd:3c: d6:9e:07:28:eb:dc:b6:4e:f3:6f:0c:f1:3e:1e:24:43: 61:fd:bc:a7:b6:d0:2d:d4:8d:d5:2d:74:7c:37:d6:9b: 55:33:17:df:58:1a:24:76:77:07:c3:5f:6d:29:5c:fa Fingerprint (SHA-256): B0:46:8B:5B:C8:C4:A0:43:6A:B9:FF:A7:5B:B9:CA:8C:64:C1:76:6F:23:43:52:73:93:D1:6B:45:A2:E3:36:3B Fingerprint (SHA1): 0D:8F:20:0D:6E:11:90:77:5D:57:96:3B:70:35:47:EE:98:BE:45:E8 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3155: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153322 (0x13bcffaa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Mar 31 15:38:55 2017 Not After : Thu Mar 31 15:38:55 2067 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:1d:93:0d:5c:11:f2:85:5d:4b:f6:1d:7d:cb:18:66: 6b:3c:96:11:8e:bb:27:23:d6:82:fc:25:61:ec:8d:72: 1e:1a:e2:c7:5a:cb:89:ff:ef:d9:80:05:b3:a5:da:c8: 5b:e7:2b:71:6d:da:0d:12:11:b9:8a:b6:6d:38:a6:77: 14:30:1d:81:68:d8:71:ed:de:f8:4b:f6:c3:d9:dd:1e: 58:36:47:59:0a:8c:86:b2:79:c6:d7:ef:96:86:48:5a: b3:a4:8f:ac:37:27:e2:37:bd:2a:63:f9:44:63:91:16: 8d:d2:9b:03:60:c7:cd:e9:7e:4c:d0:b1:9b:34:2a:f7: 87:c0:42:c5:b5:67:8d:d7:a9:dd:27:19:63:87:0a:78: 76:f3:f3:b3:c7:29:0f:7f:d8:b1:2a:31:10:1a:c2:b7: 56:ed:80:b9:ba:d8:2a:98:28:9f:da:07:7e:20:34:31: 1c:1d:6d:51:13:53:35:54:0a:32:90:12:ba:1c:91:78: 59:54:3b:f6:d6:1e:31:b8:7d:f3:47:e2:92:9f:4e:ea: 8b:cb:83:e6:e4:c8:c3:f2:5e:2e:31:3e:81:cf:22:7b: 6c:5f:b3:0c:90:8f:82:b8:15:0c:a6:21:1c:4c:13:ba: 3a:e3:04:62:d6:8c:a2:72:72:36:4b:7a:ce:ac:4e:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:9b:9b:7b:32:7e:73:b6:74:82:f0:4a:16:c6:3b:6c: b8:3d:74:b8:0e:4f:d4:1f:da:0f:81:d6:0e:b8:2d:5e: dc:e7:ea:57:e9:84:fc:4c:a0:07:04:72:45:77:f9:3e: da:18:7e:ac:91:13:22:43:bc:75:7c:ec:76:21:63:3a: 8a:08:5c:27:49:13:38:fb:ad:4b:d0:6a:15:db:68:12: 64:8e:39:d3:02:6b:9b:2f:1f:27:ca:57:18:6d:76:51: ed:c3:a9:77:a9:44:0d:e8:f6:0b:60:c2:a0:61:2c:75: 73:0a:05:b0:d7:5b:29:09:32:37:8f:dd:f6:cb:7d:0c: 31:ed:d8:94:bb:07:ea:f3:a6:b4:f7:34:d4:bb:96:22: 6c:97:13:38:12:0c:52:ae:82:3f:c9:11:a2:b9:ca:26: a3:86:01:ea:df:24:0a:c0:7d:e5:cb:8a:6e:23:1f:09: 8d:03:52:8c:a9:0f:43:bb:2d:ca:cc:9c:08:16:a9:63: ed:be:2a:0e:82:96:a4:c6:4c:ca:e2:d2:9d:a8:07:09: b2:52:f4:94:08:4d:11:29:bd:bf:ee:3c:c4:7f:aa:03: 3a:08:56:d3:6d:e7:80:f3:ff:f7:a8:ac:c1:0b:f0:ab: 7d:8c:15:ab:0f:af:33:c5:45:2a:87:c8:6a:c5:5e:79 Fingerprint (SHA-256): BF:57:2B:B5:3F:FB:1B:4E:5A:72:50:CA:B8:C4:CC:C6:B0:14:B5:13:F8:C2:B9:82:F9:96:B6:61:7C:29:ED:74 Fingerprint (SHA1): 7B:1B:E1:2E:C6:1E:93:B0:E0:13:1E:B9:CB:D7:CF:24:6D:34:84:1F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3156: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153323 (0x13bcffab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Mar 31 15:39:01 2017 Not After : Thu Mar 31 15:39:01 2067 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:c4:b0:99:e5:6c:f8:24:ff:f9:13:c3:5e:fe:82:1f: e2:f7:07:70:41:40:76:4a:1b:d4:e4:61:b5:37:3b:9d: 8b:0c:bb:0c:ea:6c:fc:ef:7e:dd:0a:6a:7f:73:4a:bf: 21:cf:da:cd:f1:74:0f:bb:34:02:7a:ba:db:6d:61:0a: 50:13:56:0f:18:f5:44:56:79:e7:24:86:6d:9e:45:59: 85:62:c8:7d:5f:f4:a8:88:c1:ea:8e:0f:0e:4b:e0:f9: a1:aa:08:a9:c9:a0:78:6a:c3:59:b7:b1:2b:b8:2c:c7: db:38:34:e5:57:0f:58:5f:bb:e9:df:90:1c:e3:b1:b8: fb:3f:fe:7d:54:36:f3:19:bf:96:46:c1:bc:15:a8:41: 9b:c0:ad:22:b3:96:57:30:b1:f6:ea:dc:32:15:74:89: d5:c7:2e:1b:61:91:f4:e2:4f:c1:14:b0:43:80:81:af: cc:63:b7:30:6f:fe:7e:9b:39:7d:03:05:59:88:4b:59: 97:7e:2d:3c:54:2b:24:f0:a5:6f:0f:32:a7:8f:93:74: 59:42:d1:d1:f8:84:7f:0a:42:c9:65:60:25:22:db:81: 2c:97:8e:5f:f2:d8:37:2b:c9:25:12:7b:e0:ce:ac:ce: 74:93:42:b3:09:66:d8:5d:44:7c:0d:98:a7:55:3a:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:93:fb:2a:13:f4:45:7c:d4:0a:ae:d6:57:f6:53:d1: a0:e2:46:f4:eb:b1:50:c1:8d:d1:f3:ca:dd:8f:48:c7: b1:d7:76:05:6b:5e:97:8a:08:82:20:33:cf:13:c8:7d: 85:9c:be:7d:c0:c1:14:b2:f4:33:09:f2:a9:6a:d4:36: 6c:62:ac:93:98:0a:c3:37:d7:6c:52:e2:23:9f:94:4a: 3f:19:a8:4b:53:65:77:e2:4d:ac:75:26:a3:f1:13:d3: 54:9e:a6:5c:bd:d2:24:ac:ce:41:64:14:8d:4e:bd:47: 03:9c:66:0c:72:76:42:b8:5a:75:31:03:89:52:b8:7d: d6:54:b9:f1:65:5e:63:0b:4d:d4:7e:33:2e:89:0a:0f: f3:b0:36:aa:e9:fb:aa:b7:6d:a5:e4:42:fe:2f:61:b3: e9:2b:e6:6b:13:6f:7a:fa:5a:16:a4:a8:8f:7f:c5:a7: 2f:14:9d:21:1d:5e:24:3f:0d:10:d5:df:5b:1a:82:7b: 27:37:ed:5e:15:1a:ad:99:00:bd:84:6f:05:8d:8e:d4: 84:63:60:cb:61:a8:27:23:0f:49:d2:e3:3d:ff:72:9f: 4e:e3:d5:7a:eb:48:a3:7c:48:8e:86:fe:c2:3b:74:a0: 39:16:3e:8b:31:4b:15:66:c0:f3:e0:52:59:8a:a9:ef Fingerprint (SHA-256): 7B:01:6D:0F:02:3A:1F:F5:AB:88:C1:F7:B7:5B:7B:80:E1:B5:1B:AB:6E:AC:C3:6C:4A:7D:01:B0:3A:00:07:C2 Fingerprint (SHA1): 2D:44:D1:CE:23:B6:2E:71:F0:19:44:2E:66:76:63:8D:E7:F1:57:2B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3157: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153324 (0x13bcffac) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Mar 31 15:39:08 2017 Not After : Thu Mar 31 15:39:08 2067 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:a8:9f:be:6b:21:86:00:9a:37:ad:fc:e2:1d:71:0c: be:d1:ed:b5:a3:c9:41:3d:b2:d1:c8:c6:0d:76:4b:16: ba:82:3b:46:af:d3:1c:16:a2:33:c6:ca:54:c5:0f:ef: 25:af:f8:4d:87:5c:f3:59:b8:79:3e:b4:b8:de:1c:cf: 36:5a:19:f2:45:38:3a:30:d0:2d:13:8a:2a:bf:56:bc: 9e:c3:30:0e:7e:ea:96:0b:20:3c:e6:dd:08:e3:ae:45: 3a:d3:10:05:c8:15:30:64:53:50:0c:b3:d6:55:95:e4: c8:23:70:0b:2f:d4:37:ef:f9:24:a0:7f:15:04:d1:19: 35:07:cb:d7:a0:40:72:7f:46:4a:76:3f:70:54:7f:9e: e9:23:e6:ad:4f:87:16:3c:de:96:4b:4f:ce:46:69:08: e8:10:30:14:00:c3:35:f4:b4:a0:53:e4:89:b2:61:d0: f8:73:03:60:7d:68:bf:d9:21:78:0b:d0:82:55:2b:d1: 74:15:80:51:9f:96:fb:2e:7d:82:da:a9:38:08:5e:ab: 5b:6d:bc:d7:af:a9:bd:dc:7f:cc:ba:57:a7:4d:06:e5: 0c:c0:31:89:88:79:50:e7:0b:ae:a1:ec:9c:73:b9:d4: 7f:1b:fd:9f:2f:f6:f5:e2:c3:5c:75:85:e1:90:c8:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:0c:aa:cb:ce:58:27:b7:f6:90:78:9f:a9:b8:ac:bb: 2e:35:88:72:97:7f:ef:40:ef:1b:37:61:b0:73:6e:13: a6:9d:eb:f5:5d:07:ba:a8:94:76:45:d8:54:66:19:ee: 81:ad:22:74:6a:f8:9e:63:01:f9:21:df:48:eb:9f:80: 3f:ad:d1:58:9d:9b:75:3c:58:cd:30:47:82:5c:8f:a6: 0f:ae:6f:20:77:fd:00:98:47:97:99:a5:0a:4c:68:ed: 77:67:11:0e:99:64:17:e9:c4:cb:8e:b3:b1:b7:46:bc: c8:24:6e:0c:a8:8c:22:f7:ff:8b:36:33:68:ec:09:e0: 96:2d:f8:c5:76:9d:a8:7d:e2:c6:26:b1:95:c0:f0:3b: d4:3d:f9:29:eb:61:a4:7d:82:76:a1:c5:f7:a0:96:db: 14:0d:7a:00:92:ac:8e:fb:ea:42:ce:bf:c2:cf:b9:12: 1e:fe:ab:e1:8d:35:0e:c4:d3:f1:fb:55:77:4b:96:be: 77:ad:ea:ba:6f:dc:08:5f:12:2e:1e:68:cd:42:b4:49: d9:a4:03:95:45:91:96:36:ba:e1:63:26:18:df:67:ee: d6:9b:21:6f:9c:26:89:3d:f6:ec:d5:6f:9c:05:f7:ae: f2:f1:94:b1:d4:3d:35:ab:75:5b:2e:3c:2c:56:6c:28 Fingerprint (SHA-256): 58:23:BC:15:8A:1D:73:3D:C7:44:FD:96:41:7B:61:B6:65:92:CE:4C:4F:E0:E3:4A:55:E4:30:FF:4C:FA:97:37 Fingerprint (SHA1): C4:22:73:02:B3:CF:41:8A:A0:21:70:FF:34:6D:77:DE:68:01:0E:AF Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3158: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153325 (0x13bcffad) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Mar 31 15:39:31 2017 Not After : Thu Mar 31 15:39:31 2067 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:6a:59:07:74:ef:b9:ab:e9:4e:60:ea:25:ca:95:d5: 59:43:a6:37:2e:49:b7:3a:ac:10:b8:a7:89:6e:ce:64: b7:75:73:4d:0f:0f:cc:cd:03:e5:5b:ce:c8:a8:b4:35: f1:65:58:3a:9c:79:f1:09:66:78:7a:b4:29:55:75:1c: 67:86:e7:54:49:51:54:f4:02:5d:68:97:28:71:ea:21: 7c:9f:ba:fa:53:2a:57:c8:7a:cf:b3:bd:ac:7b:1a:4a: c7:32:fc:d6:63:c6:ea:4f:5f:be:63:66:d9:2f:fa:39: 61:0f:74:78:e9:b5:3a:f3:43:72:fb:65:a1:27:b6:29: f8:1d:3a:39:97:b0:2c:23:4c:bd:88:22:33:b8:29:55: 9a:db:3f:d0:b9:e9:05:82:b1:d6:51:c3:4d:ea:5d:a9: d5:4f:63:db:1d:1c:52:c6:dd:24:b1:57:fc:ac:c8:60: bc:df:51:d9:fd:8e:74:69:7c:b7:b0:a3:dd:3c:a6:eb: 69:e8:ad:73:82:61:b6:03:f1:2a:c8:72:ce:93:95:e6: 90:fa:8b:60:c3:e9:ce:62:ba:75:b1:39:fc:98:7f:0e: c1:e7:4f:13:04:13:75:fb:2f:80:50:2c:a7:6e:93:61: 44:2b:d9:3a:0c:65:0a:9c:0a:60:12:a6:f0:0c:e0:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:64:ae:00:61:f1:92:eb:2a:a3:5c:5b:12:f6:a6:1c: f1:c3:ef:0d:67:2f:8a:27:f2:3f:f3:66:f0:6f:50:80: c2:38:3c:ad:37:2f:fd:50:e9:08:b6:12:7c:c2:77:ec: 4f:37:9f:7d:3b:84:fd:e6:e6:17:33:db:66:ae:8b:c8: 31:bc:61:39:95:6a:71:2c:90:ec:88:70:55:82:ef:98: bf:af:30:c5:50:7a:fa:bc:1d:a2:0b:11:2f:1d:06:a7: 1e:22:dd:3a:1c:6b:3e:7a:71:08:10:7e:4e:02:b2:f4: ba:f9:ed:c3:76:c1:aa:28:6e:2f:76:bf:f8:ea:69:89: 4c:77:66:26:9d:d5:e3:ef:87:34:c8:46:fb:53:dd:e2: 60:9e:f0:cb:cb:ce:2b:e7:75:d0:dd:74:47:d7:29:69: c0:99:c5:81:11:05:25:fb:4d:56:3f:9d:4e:c2:84:e8: b0:32:b7:f1:b9:a0:cd:17:f5:11:b1:0b:40:bb:aa:4c: 71:f5:41:dd:4d:99:f7:17:bb:67:e0:21:e4:37:39:29: 38:ae:eb:ff:22:04:43:a1:80:54:93:97:be:94:30:3e: d8:0c:66:78:4a:d0:8e:35:73:05:00:7e:4c:c0:31:9d: 0d:d4:13:a5:c1:99:21:30:00:46:79:7e:d1:d5:7b:3b Fingerprint (SHA-256): 74:2C:FC:EB:ED:22:04:A7:89:05:AD:74:10:37:68:A9:07:67:13:CE:92:29:02:E6:B0:65:0C:D0:CD:F2:7F:3B Fingerprint (SHA1): BF:E3:3D:69:C5:58:8B:92:EB:D5:F0:CC:8B:AC:73:DA:B2:24:73:DB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3159: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153326 (0x13bcffae) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Mar 31 15:39:36 2017 Not After : Thu Mar 31 15:39:36 2067 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:1c:a9:6f:ab:d2:93:55:4e:c4:56:7c:a9:5f:5e:4d: 99:e1:34:c9:74:eb:91:bb:c9:fd:07:7a:a2:0a:66:a2: 3f:4e:c6:ad:8e:82:bb:49:52:75:18:6d:69:1d:dc:22: 02:bb:b2:bc:78:49:42:77:86:a7:5c:c5:d6:80:26:12: a5:46:cd:ab:ee:72:fd:38:c3:29:99:ad:2d:41:cb:16: 04:22:0e:f6:54:60:19:93:57:ee:11:d6:87:85:db:89: 96:8c:0e:a9:ff:3f:92:be:e7:e7:09:88:dc:2d:c8:6f: 1f:9b:fc:4f:63:8e:10:b1:49:9f:99:2c:6c:36:0d:e8: 84:1c:ee:a6:4e:28:7e:43:f2:48:45:d5:f5:a2:53:ba: 02:f0:fa:7c:b2:25:c2:41:c5:63:d7:6c:a2:1e:ee:cb: 53:cc:37:37:a6:57:1a:d8:c7:35:5d:ab:98:4d:8d:4d: ed:ea:5d:6a:60:32:75:a8:13:f8:84:f3:58:f4:50:be: d0:34:14:3c:9d:64:dd:5c:96:76:a7:a1:69:1e:7e:b0: 0a:50:52:b8:e7:77:74:b2:1f:a7:ef:d0:3c:ec:b2:6a: d4:b3:77:af:a1:bd:9a:71:e1:50:5b:24:66:b4:fd:bf: f1:a0:50:f1:43:8d:9d:db:ed:ff:fe:aa:be:05:b4:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:3c:ff:69:80:91:0b:1d:46:0f:15:4b:44:d4:84:dd: 4e:05:6f:2d:1b:f9:bd:6c:37:2b:3f:97:95:bc:be:be: 18:cb:36:9e:80:87:c0:dc:b8:d9:ce:80:1f:ed:4e:7c: b9:2f:ad:df:13:bd:1f:32:64:61:7d:80:cb:07:5b:34: b3:4b:69:78:82:fb:b5:0e:4b:ec:94:10:2a:a8:c9:af: 99:39:b3:27:ef:05:42:6c:27:76:c1:77:16:ea:87:f6: 9a:be:aa:3c:ba:05:d5:61:f0:4f:9b:a6:b5:f2:54:08: a3:79:17:e4:8b:c9:97:26:6e:36:6e:18:2b:71:76:fc: e3:06:bb:f1:62:15:6a:db:82:29:6a:93:e6:88:4e:2f: 0d:a5:89:c1:60:44:da:a2:93:43:8c:1f:28:5a:97:65: 33:92:04:b4:f9:52:f9:a0:fa:77:6c:67:7f:36:72:c0: 17:7d:e2:89:90:4c:e3:6b:d8:e5:f4:6e:9a:9f:83:f5: d7:9e:dc:5d:69:e4:bb:c6:ad:b2:7a:4d:d3:f0:71:d1: e1:2a:d6:79:d3:f9:b6:84:36:79:5b:66:eb:15:5a:77: 48:5e:60:7f:bb:24:98:ad:58:07:a1:c8:f6:16:53:8b: d5:1c:f8:2c:6c:db:0c:20:e1:1d:3b:53:ca:27:1e:db Fingerprint (SHA-256): 48:9E:CC:79:19:05:58:C3:F5:F6:8B:CD:D8:89:CE:8E:FA:92:54:E6:C1:87:FC:D0:4E:FC:03:17:91:76:CB:64 Fingerprint (SHA1): D3:D1:B4:EC:43:94:E8:47:37:76:99:71:2C:B1:94:D5:9E:D1:CB:29 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3160: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3161: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153341 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3162: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3163: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3164: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3165: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331153342 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3166: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3167: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3168: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3169: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331153343 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3170: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3171: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3172: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3173: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 331153344 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3174: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3175: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3176: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153341 (0x13bcffbd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 15:41:07 2017 Not After : Thu Mar 31 15:41:07 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:d5:38:3f:8e:3d:fc:1d:6c:f2:ca:80:84:f7:85:13: d4:a7:4d:5e:58:2a:be:4a:98:e9:00:25:43:f6:97:45: 8d:37:67:f5:a6:5e:53:45:7a:83:a4:d7:52:02:ed:c6: 38:c6:88:ec:56:92:1a:50:cf:e4:a3:ad:d0:05:29:cf: 01:10:2b:81:b6:83:1e:ca:b9:ee:96:78:03:d7:84:94: b9:61:83:ba:38:39:7e:bb:87:42:53:86:b9:83:21:b1: 07:0c:fe:8a:3c:88:bb:3b:90:12:d6:83:cb:93:48:b5: 2b:95:c5:da:e9:61:4e:62:c2:f1:77:a5:8e:3b:b2:e9: 2d:77:03:73:a6:81:0e:25:f9:f8:69:ff:a0:79:9d:6e: a7:18:a7:8b:de:69:10:60:8b:b9:8b:59:95:88:57:7f: 6e:89:c4:35:43:30:d5:7d:8c:28:6b:bd:5c:12:93:71: be:7d:ae:8b:6a:8e:b8:9f:f6:6d:23:be:1d:ff:e8:e3: 7a:5d:cd:9d:fb:17:cc:d9:e4:1a:37:67:ac:6f:c2:89: 22:2f:e5:33:3a:ce:62:d2:ea:e4:4d:7e:aa:da:ec:6a: 25:31:d2:43:26:f9:53:74:56:38:d2:75:75:04:40:f9: 69:3c:de:a1:27:a0:3e:17:e5:2a:ab:24:5e:69:56:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:45:63:00:38:c7:b4:64:55:8c:b9:32:db:22:bd:1d: 0f:7f:da:9c:c2:32:f6:39:e3:7a:b8:38:5c:4c:bb:cc: e4:dc:c6:04:db:59:52:e6:11:8b:cb:98:c3:10:de:89: ca:fa:94:cd:f4:cf:23:d5:79:5b:53:7c:e1:3e:00:d1: 5a:e9:83:74:eb:ff:72:e2:28:ea:0a:18:08:d4:39:0a: 58:db:22:e9:63:64:1f:b1:5b:79:42:b3:89:42:1d:f9: f1:6b:0b:e3:18:e6:1f:a9:36:bd:fc:8e:d9:39:0e:f4: 44:e3:19:49:8f:cb:56:a7:ba:cc:37:62:f5:a2:5a:23: b2:c8:57:f9:12:b2:c9:7b:a4:8f:c5:77:1f:d9:f3:74: cb:18:ab:f1:18:51:5a:86:15:b4:e0:7d:01:92:78:a1: ce:89:e7:7b:88:84:3b:71:6d:c6:47:23:b4:92:33:a7: 85:3a:85:08:c3:ed:e7:44:fb:31:62:66:2c:f0:c9:0f: 8f:3b:e2:24:c7:e2:d1:90:3b:6f:88:52:72:d4:07:e2: f8:dd:0e:30:b2:db:b4:c7:0b:03:b4:32:43:88:08:36: 8e:b7:d0:b0:1f:f4:5b:9d:be:2f:13:14:3c:18:e6:eb: ee:49:e6:0b:59:55:df:74:97:76:c9:83:bf:b5:dc:f1 Fingerprint (SHA-256): F6:29:CB:AA:9E:82:15:1C:BB:D1:5C:08:21:AC:57:CF:D6:C6:FE:61:1A:07:83:99:C0:EF:05:62:24:A0:74:08 Fingerprint (SHA1): 53:1C:48:49:20:52:1A:59:F0:96:8B:C8:E3:D4:5D:DA:2D:C5:20:72 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3177: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3178: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153342 (0x13bcffbe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 15:41:18 2017 Not After : Thu Mar 31 15:41:18 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:2f:70:d5:4e:da:99:b9:8a:b6:31:f7:7d:51:28:8c: cf:bc:cb:50:bd:f9:e8:e2:ec:20:77:6a:59:52:9f:e8: 98:ce:44:39:5e:dd:ad:b4:7e:f0:62:e6:27:3b:80:e2: 0c:61:ed:9b:f0:b7:11:78:81:31:ee:07:87:47:80:f0: 34:60:6e:76:d0:87:16:b9:b3:f8:3b:7d:84:0c:38:7f: 65:19:47:4d:cf:ff:b4:34:af:8c:95:d3:0b:5a:a6:a3: c5:cc:88:06:a4:68:31:ad:c7:8b:bd:56:d4:aa:dc:79: e7:2a:43:bb:9c:33:4c:ac:20:20:f4:f2:df:4b:53:15: f4:34:89:fc:9a:52:4e:b3:bb:6a:3c:4d:b0:dd:8c:07: f3:e5:e4:08:49:c1:95:ed:bd:57:7c:53:14:36:91:a5: 94:94:e4:43:1f:37:34:c8:75:f3:f3:22:66:1a:b2:0b: 32:46:a3:1c:2c:90:6f:41:cf:62:2a:17:52:25:6c:a2: 96:f6:6f:7f:25:94:bd:d8:ac:17:99:66:af:07:ca:bb: db:a3:92:a9:25:80:5a:0f:88:35:eb:9c:ef:f4:e2:4c: 78:c5:0f:73:7a:73:76:b6:4e:c8:de:7f:9f:d0:66:7b: 62:57:84:2a:67:2a:d9:ae:48:a7:f9:ec:65:03:80:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:20:f7:24:6b:0e:0c:82:31:d2:d8:e3:db:a7:f9:6a: b3:d2:f5:75:33:4f:cf:09:45:f7:29:f7:01:04:0c:40: 7e:b1:9a:88:aa:59:69:e2:f5:eb:3e:9e:55:3f:6c:06: c6:44:22:16:59:81:9c:e7:26:f7:bc:34:6f:0d:5f:c8: a5:bb:1c:e5:6b:a0:fc:fa:b6:81:76:80:c4:ea:37:74: 99:5c:4d:4e:9e:3d:30:e1:f1:69:a5:ca:78:fb:e4:f5: 63:7e:d4:a0:f8:ac:e1:5b:af:e9:7f:65:38:77:5b:d7: 7b:2f:13:65:44:6f:a0:36:d0:5e:03:d7:fe:1a:3f:75: 64:38:db:2e:5e:8d:82:45:bf:d4:db:a6:2d:08:40:f0: e2:eb:84:48:3f:33:dc:4d:d9:56:20:e1:5f:cc:75:a8: 76:1e:f0:9e:01:e5:fb:20:0c:92:29:ec:ae:5a:2c:5d: 1e:80:f8:b5:49:25:f6:b1:ee:06:5c:b6:22:69:c0:21: 25:6a:4f:38:7a:07:58:c2:13:41:2b:60:8b:e8:42:07: 08:4d:8f:26:7a:55:ab:95:10:fa:87:a1:7f:ac:8c:6d: 76:04:dc:c5:ba:81:9e:25:fe:ad:40:95:76:50:59:3d: 64:48:42:b6:6d:c3:77:db:5f:c2:4b:a1:9b:d0:0a:95 Fingerprint (SHA-256): C9:C4:50:B4:A7:13:40:05:8F:26:0B:2A:EA:EB:B4:82:62:66:7A:A8:FC:20:7A:CC:61:97:98:56:C1:86:F2:44 Fingerprint (SHA1): 73:B5:E7:B1:92:B6:7C:95:EE:5B:C0:25:D9:C7:F0:E7:D7:66:27:27 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3179: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3180: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153343 (0x13bcffbf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 15:41:32 2017 Not After : Thu Mar 31 15:41:32 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:5a:ee:a5:37:20:80:57:8f:5f:da:0b:2f:66:df:31: 6c:af:0f:1d:9a:31:fa:c2:52:a5:45:c8:68:10:39:dd: 4e:49:99:85:05:ac:9e:c6:6d:98:d0:74:46:64:26:7e: 29:eb:ad:d2:b0:26:27:04:5c:9a:2c:96:06:35:48:6a: 9c:3b:61:23:08:25:7a:56:ad:87:2e:14:23:a2:53:ab: 8a:05:25:76:df:de:5a:bb:aa:af:94:d7:65:19:15:77: c7:8b:f2:f4:ab:e3:82:1e:b2:19:eb:a6:3a:b1:e1:3a: b4:91:95:63:9d:eb:9a:75:6f:5f:4b:49:5b:3f:59:6e: b7:34:c8:65:4d:27:ca:54:37:fc:02:7d:17:ad:cc:a4: 00:ed:6f:68:db:35:2c:fc:a0:09:4b:ed:9d:54:32:1a: 39:db:ec:1d:c5:b9:5a:e2:26:80:45:8c:2b:37:e7:ca: 05:61:fa:df:06:ee:2d:c7:37:74:dc:7c:ab:63:d5:76: fe:60:b4:ff:0f:29:ab:db:9a:7a:24:4e:60:53:b7:fe: 2d:d9:04:43:76:85:3c:a1:44:85:50:02:93:27:a3:18: 0d:07:71:e4:2a:d3:dd:f6:eb:01:aa:07:c8:82:25:b1: 60:77:10:8b:42:39:bb:7a:dc:49:5d:28:41:9e:83:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:aa:21:92:91:8b:f9:26:a6:b3:cb:ba:76:16:5a:9d: 9b:77:a8:17:ff:70:81:a9:cf:b3:1c:2e:6c:c0:f5:1b: d2:ca:b1:6c:0e:a0:ef:2d:5b:eb:71:b5:8d:fb:3b:16: 79:08:a9:a3:fe:ab:7d:e7:bc:c2:3b:35:3f:a9:4c:c2: 11:d3:6d:e2:20:a4:7f:ef:b9:33:ff:eb:e2:3c:99:d5: 72:6b:cf:17:f8:b5:c9:4b:88:c0:6f:25:35:45:3c:09: cb:31:1d:6f:66:57:89:88:ab:99:34:47:cd:0d:37:86: dc:a1:5d:0e:0f:52:1b:b8:02:3b:4d:f5:6c:5d:d2:51: 44:47:87:e7:a5:02:82:2c:71:75:72:65:50:4a:65:ca: 9f:2f:58:f8:45:56:e3:4f:3b:4f:24:1f:f6:c6:32:bc: 3e:1d:5f:66:b1:73:11:bc:c9:7f:ed:6d:98:55:ac:66: a9:5c:26:78:a1:47:6d:01:f0:44:ae:e6:e9:5b:74:24: b6:15:2c:a6:aa:f6:c6:b1:7f:a3:14:f1:0a:c4:0e:22: a7:9c:9e:3a:35:1c:30:b1:6b:e0:04:bf:a8:2a:15:2d: a3:b0:c3:94:ed:39:56:74:f1:14:16:8b:34:ac:fe:20: 8e:01:0b:52:8c:fa:14:43:b4:4b:2b:f7:0a:bd:e0:c6 Fingerprint (SHA-256): 2E:BA:9B:ED:3A:3B:95:36:49:BC:EF:E4:5A:20:3D:01:C5:62:0A:D7:11:B0:7A:2F:5A:66:E9:8B:5C:CD:8F:D3 Fingerprint (SHA1): F0:F2:8F:C4:CE:E0:EF:9B:D1:AB:EF:79:DD:AB:1D:E6:93:CD:5A:CC Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3181: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3182: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3183: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3184: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3185: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153341 (0x13bcffbd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 15:41:07 2017 Not After : Thu Mar 31 15:41:07 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:d5:38:3f:8e:3d:fc:1d:6c:f2:ca:80:84:f7:85:13: d4:a7:4d:5e:58:2a:be:4a:98:e9:00:25:43:f6:97:45: 8d:37:67:f5:a6:5e:53:45:7a:83:a4:d7:52:02:ed:c6: 38:c6:88:ec:56:92:1a:50:cf:e4:a3:ad:d0:05:29:cf: 01:10:2b:81:b6:83:1e:ca:b9:ee:96:78:03:d7:84:94: b9:61:83:ba:38:39:7e:bb:87:42:53:86:b9:83:21:b1: 07:0c:fe:8a:3c:88:bb:3b:90:12:d6:83:cb:93:48:b5: 2b:95:c5:da:e9:61:4e:62:c2:f1:77:a5:8e:3b:b2:e9: 2d:77:03:73:a6:81:0e:25:f9:f8:69:ff:a0:79:9d:6e: a7:18:a7:8b:de:69:10:60:8b:b9:8b:59:95:88:57:7f: 6e:89:c4:35:43:30:d5:7d:8c:28:6b:bd:5c:12:93:71: be:7d:ae:8b:6a:8e:b8:9f:f6:6d:23:be:1d:ff:e8:e3: 7a:5d:cd:9d:fb:17:cc:d9:e4:1a:37:67:ac:6f:c2:89: 22:2f:e5:33:3a:ce:62:d2:ea:e4:4d:7e:aa:da:ec:6a: 25:31:d2:43:26:f9:53:74:56:38:d2:75:75:04:40:f9: 69:3c:de:a1:27:a0:3e:17:e5:2a:ab:24:5e:69:56:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:45:63:00:38:c7:b4:64:55:8c:b9:32:db:22:bd:1d: 0f:7f:da:9c:c2:32:f6:39:e3:7a:b8:38:5c:4c:bb:cc: e4:dc:c6:04:db:59:52:e6:11:8b:cb:98:c3:10:de:89: ca:fa:94:cd:f4:cf:23:d5:79:5b:53:7c:e1:3e:00:d1: 5a:e9:83:74:eb:ff:72:e2:28:ea:0a:18:08:d4:39:0a: 58:db:22:e9:63:64:1f:b1:5b:79:42:b3:89:42:1d:f9: f1:6b:0b:e3:18:e6:1f:a9:36:bd:fc:8e:d9:39:0e:f4: 44:e3:19:49:8f:cb:56:a7:ba:cc:37:62:f5:a2:5a:23: b2:c8:57:f9:12:b2:c9:7b:a4:8f:c5:77:1f:d9:f3:74: cb:18:ab:f1:18:51:5a:86:15:b4:e0:7d:01:92:78:a1: ce:89:e7:7b:88:84:3b:71:6d:c6:47:23:b4:92:33:a7: 85:3a:85:08:c3:ed:e7:44:fb:31:62:66:2c:f0:c9:0f: 8f:3b:e2:24:c7:e2:d1:90:3b:6f:88:52:72:d4:07:e2: f8:dd:0e:30:b2:db:b4:c7:0b:03:b4:32:43:88:08:36: 8e:b7:d0:b0:1f:f4:5b:9d:be:2f:13:14:3c:18:e6:eb: ee:49:e6:0b:59:55:df:74:97:76:c9:83:bf:b5:dc:f1 Fingerprint (SHA-256): F6:29:CB:AA:9E:82:15:1C:BB:D1:5C:08:21:AC:57:CF:D6:C6:FE:61:1A:07:83:99:C0:EF:05:62:24:A0:74:08 Fingerprint (SHA1): 53:1C:48:49:20:52:1A:59:F0:96:8B:C8:E3:D4:5D:DA:2D:C5:20:72 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3186: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3187: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153342 (0x13bcffbe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 15:41:18 2017 Not After : Thu Mar 31 15:41:18 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:2f:70:d5:4e:da:99:b9:8a:b6:31:f7:7d:51:28:8c: cf:bc:cb:50:bd:f9:e8:e2:ec:20:77:6a:59:52:9f:e8: 98:ce:44:39:5e:dd:ad:b4:7e:f0:62:e6:27:3b:80:e2: 0c:61:ed:9b:f0:b7:11:78:81:31:ee:07:87:47:80:f0: 34:60:6e:76:d0:87:16:b9:b3:f8:3b:7d:84:0c:38:7f: 65:19:47:4d:cf:ff:b4:34:af:8c:95:d3:0b:5a:a6:a3: c5:cc:88:06:a4:68:31:ad:c7:8b:bd:56:d4:aa:dc:79: e7:2a:43:bb:9c:33:4c:ac:20:20:f4:f2:df:4b:53:15: f4:34:89:fc:9a:52:4e:b3:bb:6a:3c:4d:b0:dd:8c:07: f3:e5:e4:08:49:c1:95:ed:bd:57:7c:53:14:36:91:a5: 94:94:e4:43:1f:37:34:c8:75:f3:f3:22:66:1a:b2:0b: 32:46:a3:1c:2c:90:6f:41:cf:62:2a:17:52:25:6c:a2: 96:f6:6f:7f:25:94:bd:d8:ac:17:99:66:af:07:ca:bb: db:a3:92:a9:25:80:5a:0f:88:35:eb:9c:ef:f4:e2:4c: 78:c5:0f:73:7a:73:76:b6:4e:c8:de:7f:9f:d0:66:7b: 62:57:84:2a:67:2a:d9:ae:48:a7:f9:ec:65:03:80:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:20:f7:24:6b:0e:0c:82:31:d2:d8:e3:db:a7:f9:6a: b3:d2:f5:75:33:4f:cf:09:45:f7:29:f7:01:04:0c:40: 7e:b1:9a:88:aa:59:69:e2:f5:eb:3e:9e:55:3f:6c:06: c6:44:22:16:59:81:9c:e7:26:f7:bc:34:6f:0d:5f:c8: a5:bb:1c:e5:6b:a0:fc:fa:b6:81:76:80:c4:ea:37:74: 99:5c:4d:4e:9e:3d:30:e1:f1:69:a5:ca:78:fb:e4:f5: 63:7e:d4:a0:f8:ac:e1:5b:af:e9:7f:65:38:77:5b:d7: 7b:2f:13:65:44:6f:a0:36:d0:5e:03:d7:fe:1a:3f:75: 64:38:db:2e:5e:8d:82:45:bf:d4:db:a6:2d:08:40:f0: e2:eb:84:48:3f:33:dc:4d:d9:56:20:e1:5f:cc:75:a8: 76:1e:f0:9e:01:e5:fb:20:0c:92:29:ec:ae:5a:2c:5d: 1e:80:f8:b5:49:25:f6:b1:ee:06:5c:b6:22:69:c0:21: 25:6a:4f:38:7a:07:58:c2:13:41:2b:60:8b:e8:42:07: 08:4d:8f:26:7a:55:ab:95:10:fa:87:a1:7f:ac:8c:6d: 76:04:dc:c5:ba:81:9e:25:fe:ad:40:95:76:50:59:3d: 64:48:42:b6:6d:c3:77:db:5f:c2:4b:a1:9b:d0:0a:95 Fingerprint (SHA-256): C9:C4:50:B4:A7:13:40:05:8F:26:0B:2A:EA:EB:B4:82:62:66:7A:A8:FC:20:7A:CC:61:97:98:56:C1:86:F2:44 Fingerprint (SHA1): 73:B5:E7:B1:92:B6:7C:95:EE:5B:C0:25:D9:C7:F0:E7:D7:66:27:27 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3188: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3189: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153343 (0x13bcffbf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 15:41:32 2017 Not After : Thu Mar 31 15:41:32 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:5a:ee:a5:37:20:80:57:8f:5f:da:0b:2f:66:df:31: 6c:af:0f:1d:9a:31:fa:c2:52:a5:45:c8:68:10:39:dd: 4e:49:99:85:05:ac:9e:c6:6d:98:d0:74:46:64:26:7e: 29:eb:ad:d2:b0:26:27:04:5c:9a:2c:96:06:35:48:6a: 9c:3b:61:23:08:25:7a:56:ad:87:2e:14:23:a2:53:ab: 8a:05:25:76:df:de:5a:bb:aa:af:94:d7:65:19:15:77: c7:8b:f2:f4:ab:e3:82:1e:b2:19:eb:a6:3a:b1:e1:3a: b4:91:95:63:9d:eb:9a:75:6f:5f:4b:49:5b:3f:59:6e: b7:34:c8:65:4d:27:ca:54:37:fc:02:7d:17:ad:cc:a4: 00:ed:6f:68:db:35:2c:fc:a0:09:4b:ed:9d:54:32:1a: 39:db:ec:1d:c5:b9:5a:e2:26:80:45:8c:2b:37:e7:ca: 05:61:fa:df:06:ee:2d:c7:37:74:dc:7c:ab:63:d5:76: fe:60:b4:ff:0f:29:ab:db:9a:7a:24:4e:60:53:b7:fe: 2d:d9:04:43:76:85:3c:a1:44:85:50:02:93:27:a3:18: 0d:07:71:e4:2a:d3:dd:f6:eb:01:aa:07:c8:82:25:b1: 60:77:10:8b:42:39:bb:7a:dc:49:5d:28:41:9e:83:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:aa:21:92:91:8b:f9:26:a6:b3:cb:ba:76:16:5a:9d: 9b:77:a8:17:ff:70:81:a9:cf:b3:1c:2e:6c:c0:f5:1b: d2:ca:b1:6c:0e:a0:ef:2d:5b:eb:71:b5:8d:fb:3b:16: 79:08:a9:a3:fe:ab:7d:e7:bc:c2:3b:35:3f:a9:4c:c2: 11:d3:6d:e2:20:a4:7f:ef:b9:33:ff:eb:e2:3c:99:d5: 72:6b:cf:17:f8:b5:c9:4b:88:c0:6f:25:35:45:3c:09: cb:31:1d:6f:66:57:89:88:ab:99:34:47:cd:0d:37:86: dc:a1:5d:0e:0f:52:1b:b8:02:3b:4d:f5:6c:5d:d2:51: 44:47:87:e7:a5:02:82:2c:71:75:72:65:50:4a:65:ca: 9f:2f:58:f8:45:56:e3:4f:3b:4f:24:1f:f6:c6:32:bc: 3e:1d:5f:66:b1:73:11:bc:c9:7f:ed:6d:98:55:ac:66: a9:5c:26:78:a1:47:6d:01:f0:44:ae:e6:e9:5b:74:24: b6:15:2c:a6:aa:f6:c6:b1:7f:a3:14:f1:0a:c4:0e:22: a7:9c:9e:3a:35:1c:30:b1:6b:e0:04:bf:a8:2a:15:2d: a3:b0:c3:94:ed:39:56:74:f1:14:16:8b:34:ac:fe:20: 8e:01:0b:52:8c:fa:14:43:b4:4b:2b:f7:0a:bd:e0:c6 Fingerprint (SHA-256): 2E:BA:9B:ED:3A:3B:95:36:49:BC:EF:E4:5A:20:3D:01:C5:62:0A:D7:11:B0:7A:2F:5A:66:E9:8B:5C:CD:8F:D3 Fingerprint (SHA1): F0:F2:8F:C4:CE:E0:EF:9B:D1:AB:EF:79:DD:AB:1D:E6:93:CD:5A:CC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3190: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3191: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3192: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153345 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3193: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3194: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3195: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3196: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331153346 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3197: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3198: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3199: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3200: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331153347 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3201: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3202: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #3203: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3204: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 331153348 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3205: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3206: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #3207: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3208: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 331153349 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3209: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3210: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3211: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153345 (0x13bcffc1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 15:42:22 2017 Not After : Thu Mar 31 15:42:22 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:3f:bd:35:8c:b4:b1:44:00:28:f5:15:70:bf:b2:a7: a0:1b:71:ef:51:b3:93:44:e6:1f:38:0b:66:59:a5:ba: 79:d5:72:1f:d6:92:5a:ff:1b:44:21:05:6d:f2:84:bb: 37:de:75:88:a2:b4:eb:86:5a:e9:f1:fe:03:3f:89:19: 6f:ec:b9:38:74:e3:49:fe:ee:33:fd:12:72:65:4c:a1: c2:a8:a0:a2:71:b8:57:85:42:28:f4:b1:30:da:2f:fc: 39:44:cb:2a:49:50:a8:63:62:5d:17:f5:84:f7:0f:74: 18:2d:dc:62:48:b8:0c:71:09:a6:e0:55:b8:ec:88:7f: e2:7a:64:c6:34:fc:e4:fd:68:e4:dd:b0:57:fa:81:48: f1:ea:fa:e4:26:fc:75:c1:32:85:5b:22:e5:56:7b:20: fd:e7:07:e7:1c:77:8d:3a:a4:c0:ed:68:89:3a:28:0c: c9:bb:da:18:76:79:48:35:4d:0e:2c:52:25:4e:5a:f5: 84:64:d3:09:ad:70:49:c6:34:72:4f:b9:ca:96:55:48: cd:6b:ec:a7:cc:fb:b5:7a:7a:ec:95:59:6a:c4:4b:dd: 7f:d6:51:0b:bf:5d:f9:9d:27:97:20:e5:e8:3a:b9:8f: ab:6c:5b:bd:c3:b9:3d:8f:70:aa:cd:16:95:cc:dc:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:12:a9:52:75:06:47:4b:ba:c8:a4:34:40:ff:4e:b3: 73:e0:05:a5:23:3a:3b:85:58:a0:5b:20:17:30:52:64: 7e:78:6c:58:de:c5:91:80:85:4a:b2:9b:04:d9:08:e5: 25:fb:eb:19:41:60:67:79:46:43:9d:be:8d:5a:90:9b: d0:2d:a8:53:b0:51:db:6d:96:fe:61:ca:9a:28:19:4f: b2:7c:54:e1:5b:eb:ed:59:55:93:32:1d:2e:25:42:c2: 67:86:3a:43:48:82:39:3f:e2:f5:c0:54:91:ef:29:5b: fd:cd:ba:17:12:7e:e7:0b:3a:b6:3e:c6:62:4a:a1:68: 26:36:3c:5f:a5:f6:12:00:d1:e8:04:a0:90:81:bf:81: 76:9c:af:b3:31:c3:d0:75:4d:11:5d:33:a9:ef:bf:af: 60:27:11:81:6b:30:5f:b7:4e:ff:c4:0b:01:3c:33:f8: 66:57:9f:e1:68:b4:f1:37:1a:70:79:c9:87:a9:63:da: 22:71:12:da:44:5b:04:51:bc:02:2a:43:1e:ba:37:be: 4c:53:79:3c:25:b3:a6:02:2d:14:bb:1a:dc:29:20:9a: 05:c4:18:eb:40:a3:c8:44:d7:16:99:76:f4:24:25:64: f7:4e:bf:db:9b:52:1e:d7:f3:54:70:7a:d6:8e:e3:36 Fingerprint (SHA-256): BF:B5:15:A6:BE:86:4B:FA:4D:6B:4A:48:6D:F7:60:DE:B3:9A:5B:E3:43:1B:85:CC:04:2A:16:19:48:6B:D6:CC Fingerprint (SHA1): B7:D5:9E:D2:00:3A:50:AF:26:74:FB:6D:07:FE:12:F4:06:9C:1E:5A Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3212: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3213: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153346 (0x13bcffc2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 15:42:31 2017 Not After : Thu Mar 31 15:42:31 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:a5:8d:76:f5:b1:47:0b:92:8c:06:f8:80:f3:8d:dd: 3b:01:00:48:17:a4:27:a0:53:2e:0b:65:7b:e8:19:f5: 16:16:bb:52:3a:56:04:76:c9:4b:15:62:14:d9:9e:1a: b5:fb:5f:0d:82:87:3e:1e:0b:80:c4:f5:00:76:fa:9b: 28:8c:18:f7:0f:96:9b:5e:5d:c5:c6:6b:10:68:b4:31: 8f:ad:80:6a:8f:f5:92:f6:00:61:fe:71:c0:ae:dd:a6: f3:5f:08:83:4b:a1:0c:68:35:77:f4:f2:62:d4:d9:b8: 89:2c:27:07:71:99:57:46:d3:eb:63:7d:1b:d5:34:43: 51:51:56:08:eb:87:aa:6f:bf:c2:d5:10:c2:53:d7:77: 6d:1d:d4:ec:0c:79:2a:cc:13:50:bb:f0:04:f6:ca:c4: 20:48:5d:ad:ce:00:64:b4:9c:de:e1:6f:e0:e4:a6:12: 97:33:9f:83:12:0c:b0:e9:2e:e2:9d:db:85:4a:cb:09: 87:68:eb:28:26:6c:23:dd:54:97:56:5e:d1:91:ee:ef: b6:d3:94:46:d5:03:fa:f5:48:04:5d:79:26:ed:a8:ee: 82:ec:2b:e8:cd:57:8e:77:98:f3:f4:3e:23:66:8d:17: 36:20:be:db:72:92:46:1d:e5:da:22:43:ed:2a:ac:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:e0:2f:19:94:5e:22:5c:f5:c1:8f:61:48:8f:83:ea: 33:28:b8:8e:19:cc:6a:30:46:c1:61:34:8b:6e:85:e6: 5e:70:76:f3:a6:9e:50:ba:92:bc:d6:0c:31:2f:cc:37: 5c:6d:a3:a1:fb:45:36:7e:9d:ea:0a:04:79:5b:2c:da: 17:f2:99:d0:fb:9a:34:e8:13:7c:3c:eb:69:73:29:19: bc:8b:39:77:91:b9:41:7c:a8:fe:29:9e:39:e7:e3:47: cc:e4:b5:f3:ad:99:81:c0:f4:29:85:d8:cb:f0:02:43: af:f7:19:c6:e6:7a:fc:ef:5c:e7:60:9c:0f:c5:3e:96: 12:58:f3:c7:63:ee:d5:d4:92:90:e5:ba:7c:4e:20:d9: ff:6b:97:64:98:33:48:01:35:1e:8b:b0:15:5f:a1:02: f8:0f:f0:4d:f4:54:d2:00:c1:16:fc:d5:20:79:eb:aa: bb:91:25:d0:ff:d9:07:de:81:7a:3b:a7:9e:bc:88:ed: 46:f1:ed:9d:84:a4:c5:8b:3b:cb:36:1f:cb:0b:f6:6c: b5:67:96:98:11:cc:3c:db:95:f8:4f:03:c1:9b:ec:2d: f4:d8:66:f9:ba:77:cb:e7:9a:da:e7:5c:6b:7f:0a:df: ee:6b:94:be:54:f1:a4:60:c3:16:f2:ca:76:5e:e1:ac Fingerprint (SHA-256): 1C:F6:CD:30:9F:55:F6:34:76:59:39:57:B4:D3:84:18:D3:C4:C0:68:53:79:F1:A5:94:34:3E:0A:AA:47:63:0D Fingerprint (SHA1): 8C:0D:A1:E7:F0:2D:BE:70:89:0A:E3:85:C7:A6:1B:7B:DD:40:FD:61 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3214: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3215: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153347 (0x13bcffc3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 15:42:52 2017 Not After : Thu Mar 31 15:42:52 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:9e:fc:ad:6e:3d:12:9d:7c:85:00:22:86:7e:41:f7: 33:9a:e1:1c:7f:81:e2:c4:0e:a8:97:34:30:d2:ad:c4: 0c:01:92:5f:57:48:f8:91:e3:77:a0:d9:b1:e0:99:23: 0d:f3:80:b4:5b:07:18:fc:32:01:a8:ce:d2:35:63:ed: 68:35:98:22:18:21:a2:fd:02:22:a3:a6:5b:58:63:24: 29:13:13:17:4e:f6:d5:75:a0:71:57:89:06:58:ed:55: 49:ed:7b:eb:2a:84:6f:5d:74:57:fd:87:0e:19:10:ef: 1c:b6:2f:20:56:58:87:ae:ee:37:36:43:2f:27:e7:59: 09:aa:ce:35:77:09:f6:91:8d:05:aa:9d:35:97:1c:c8: c3:47:b2:c7:6a:63:4b:6c:5e:a9:31:0f:e8:5d:35:d1: 5b:7c:71:76:00:97:15:4d:ae:bd:b7:ff:d5:63:1c:7f: 88:f0:8d:70:98:a5:51:6b:71:6e:da:3e:99:f8:24:63: 02:be:ca:1d:b3:6d:9a:7e:ad:a3:62:ef:1b:b3:44:a2: 44:4b:a8:af:76:71:89:29:e2:02:e7:2d:0d:b4:e8:c8: c2:cb:61:6a:89:36:5d:c0:b2:33:04:36:66:b1:4b:87: c5:1c:af:b7:df:2f:17:9d:4f:ac:fc:51:64:b2:07:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:04:ae:3d:e3:40:bf:67:39:a2:76:fa:24:99:a4:5f: fe:8a:09:ab:87:6a:22:bc:c2:b0:de:02:91:7a:b0:16: 57:0e:4d:c4:de:e1:f8:2d:9f:46:9b:b0:b0:62:0c:6c: 60:9d:bb:24:25:87:ca:d3:d3:4c:9a:34:c6:f8:a8:ea: 16:98:60:7a:46:0c:a0:75:e5:33:69:e8:5d:b7:05:5d: b5:1c:ff:e4:83:b5:eb:40:f4:7d:20:b5:d2:68:be:e9: a5:96:29:a4:f0:f8:0e:f2:9c:07:27:5b:50:f9:50:d0: d7:ab:d8:8c:21:4a:e2:c0:af:c8:e6:66:07:76:97:6d: 01:40:7d:2e:09:86:ee:7b:0c:19:d7:11:8f:42:9f:e2: fe:f6:b9:da:62:f5:40:e1:30:fa:56:60:03:3b:94:a9: ed:2d:55:81:a6:b5:19:98:08:f9:e8:9c:d8:70:f8:ea: 4c:5f:f0:88:01:96:4f:f9:b0:5b:51:df:73:5e:c4:3e: 26:5b:96:25:e6:6c:33:5f:95:3c:5c:2e:56:7d:cf:56: 99:04:7c:e6:03:cc:7f:58:41:3d:3c:27:9c:a6:ba:48: 63:e1:a1:a8:52:24:50:92:59:23:af:d1:bf:4f:f2:7e: 20:9a:b6:5c:b5:e4:e2:32:3f:94:24:fc:7c:a4:92:bf Fingerprint (SHA-256): 2A:0E:B7:44:4C:80:A7:4B:B6:13:3D:D3:C8:CB:34:EB:F9:BB:D0:06:94:F7:C7:20:BF:0A:FF:45:9F:36:6A:2F Fingerprint (SHA1): C4:95:9C:54:0D:1E:55:40:D9:33:77:04:5A:10:AA:22:A2:4E:DF:12 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #3216: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3217: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3218: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3219: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3220: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153345 (0x13bcffc1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 15:42:22 2017 Not After : Thu Mar 31 15:42:22 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:3f:bd:35:8c:b4:b1:44:00:28:f5:15:70:bf:b2:a7: a0:1b:71:ef:51:b3:93:44:e6:1f:38:0b:66:59:a5:ba: 79:d5:72:1f:d6:92:5a:ff:1b:44:21:05:6d:f2:84:bb: 37:de:75:88:a2:b4:eb:86:5a:e9:f1:fe:03:3f:89:19: 6f:ec:b9:38:74:e3:49:fe:ee:33:fd:12:72:65:4c:a1: c2:a8:a0:a2:71:b8:57:85:42:28:f4:b1:30:da:2f:fc: 39:44:cb:2a:49:50:a8:63:62:5d:17:f5:84:f7:0f:74: 18:2d:dc:62:48:b8:0c:71:09:a6:e0:55:b8:ec:88:7f: e2:7a:64:c6:34:fc:e4:fd:68:e4:dd:b0:57:fa:81:48: f1:ea:fa:e4:26:fc:75:c1:32:85:5b:22:e5:56:7b:20: fd:e7:07:e7:1c:77:8d:3a:a4:c0:ed:68:89:3a:28:0c: c9:bb:da:18:76:79:48:35:4d:0e:2c:52:25:4e:5a:f5: 84:64:d3:09:ad:70:49:c6:34:72:4f:b9:ca:96:55:48: cd:6b:ec:a7:cc:fb:b5:7a:7a:ec:95:59:6a:c4:4b:dd: 7f:d6:51:0b:bf:5d:f9:9d:27:97:20:e5:e8:3a:b9:8f: ab:6c:5b:bd:c3:b9:3d:8f:70:aa:cd:16:95:cc:dc:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:12:a9:52:75:06:47:4b:ba:c8:a4:34:40:ff:4e:b3: 73:e0:05:a5:23:3a:3b:85:58:a0:5b:20:17:30:52:64: 7e:78:6c:58:de:c5:91:80:85:4a:b2:9b:04:d9:08:e5: 25:fb:eb:19:41:60:67:79:46:43:9d:be:8d:5a:90:9b: d0:2d:a8:53:b0:51:db:6d:96:fe:61:ca:9a:28:19:4f: b2:7c:54:e1:5b:eb:ed:59:55:93:32:1d:2e:25:42:c2: 67:86:3a:43:48:82:39:3f:e2:f5:c0:54:91:ef:29:5b: fd:cd:ba:17:12:7e:e7:0b:3a:b6:3e:c6:62:4a:a1:68: 26:36:3c:5f:a5:f6:12:00:d1:e8:04:a0:90:81:bf:81: 76:9c:af:b3:31:c3:d0:75:4d:11:5d:33:a9:ef:bf:af: 60:27:11:81:6b:30:5f:b7:4e:ff:c4:0b:01:3c:33:f8: 66:57:9f:e1:68:b4:f1:37:1a:70:79:c9:87:a9:63:da: 22:71:12:da:44:5b:04:51:bc:02:2a:43:1e:ba:37:be: 4c:53:79:3c:25:b3:a6:02:2d:14:bb:1a:dc:29:20:9a: 05:c4:18:eb:40:a3:c8:44:d7:16:99:76:f4:24:25:64: f7:4e:bf:db:9b:52:1e:d7:f3:54:70:7a:d6:8e:e3:36 Fingerprint (SHA-256): BF:B5:15:A6:BE:86:4B:FA:4D:6B:4A:48:6D:F7:60:DE:B3:9A:5B:E3:43:1B:85:CC:04:2A:16:19:48:6B:D6:CC Fingerprint (SHA1): B7:D5:9E:D2:00:3A:50:AF:26:74:FB:6D:07:FE:12:F4:06:9C:1E:5A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3221: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3222: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153346 (0x13bcffc2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 15:42:31 2017 Not After : Thu Mar 31 15:42:31 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:a5:8d:76:f5:b1:47:0b:92:8c:06:f8:80:f3:8d:dd: 3b:01:00:48:17:a4:27:a0:53:2e:0b:65:7b:e8:19:f5: 16:16:bb:52:3a:56:04:76:c9:4b:15:62:14:d9:9e:1a: b5:fb:5f:0d:82:87:3e:1e:0b:80:c4:f5:00:76:fa:9b: 28:8c:18:f7:0f:96:9b:5e:5d:c5:c6:6b:10:68:b4:31: 8f:ad:80:6a:8f:f5:92:f6:00:61:fe:71:c0:ae:dd:a6: f3:5f:08:83:4b:a1:0c:68:35:77:f4:f2:62:d4:d9:b8: 89:2c:27:07:71:99:57:46:d3:eb:63:7d:1b:d5:34:43: 51:51:56:08:eb:87:aa:6f:bf:c2:d5:10:c2:53:d7:77: 6d:1d:d4:ec:0c:79:2a:cc:13:50:bb:f0:04:f6:ca:c4: 20:48:5d:ad:ce:00:64:b4:9c:de:e1:6f:e0:e4:a6:12: 97:33:9f:83:12:0c:b0:e9:2e:e2:9d:db:85:4a:cb:09: 87:68:eb:28:26:6c:23:dd:54:97:56:5e:d1:91:ee:ef: b6:d3:94:46:d5:03:fa:f5:48:04:5d:79:26:ed:a8:ee: 82:ec:2b:e8:cd:57:8e:77:98:f3:f4:3e:23:66:8d:17: 36:20:be:db:72:92:46:1d:e5:da:22:43:ed:2a:ac:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:e0:2f:19:94:5e:22:5c:f5:c1:8f:61:48:8f:83:ea: 33:28:b8:8e:19:cc:6a:30:46:c1:61:34:8b:6e:85:e6: 5e:70:76:f3:a6:9e:50:ba:92:bc:d6:0c:31:2f:cc:37: 5c:6d:a3:a1:fb:45:36:7e:9d:ea:0a:04:79:5b:2c:da: 17:f2:99:d0:fb:9a:34:e8:13:7c:3c:eb:69:73:29:19: bc:8b:39:77:91:b9:41:7c:a8:fe:29:9e:39:e7:e3:47: cc:e4:b5:f3:ad:99:81:c0:f4:29:85:d8:cb:f0:02:43: af:f7:19:c6:e6:7a:fc:ef:5c:e7:60:9c:0f:c5:3e:96: 12:58:f3:c7:63:ee:d5:d4:92:90:e5:ba:7c:4e:20:d9: ff:6b:97:64:98:33:48:01:35:1e:8b:b0:15:5f:a1:02: f8:0f:f0:4d:f4:54:d2:00:c1:16:fc:d5:20:79:eb:aa: bb:91:25:d0:ff:d9:07:de:81:7a:3b:a7:9e:bc:88:ed: 46:f1:ed:9d:84:a4:c5:8b:3b:cb:36:1f:cb:0b:f6:6c: b5:67:96:98:11:cc:3c:db:95:f8:4f:03:c1:9b:ec:2d: f4:d8:66:f9:ba:77:cb:e7:9a:da:e7:5c:6b:7f:0a:df: ee:6b:94:be:54:f1:a4:60:c3:16:f2:ca:76:5e:e1:ac Fingerprint (SHA-256): 1C:F6:CD:30:9F:55:F6:34:76:59:39:57:B4:D3:84:18:D3:C4:C0:68:53:79:F1:A5:94:34:3E:0A:AA:47:63:0D Fingerprint (SHA1): 8C:0D:A1:E7:F0:2D:BE:70:89:0A:E3:85:C7:A6:1B:7B:DD:40:FD:61 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3223: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3224: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153347 (0x13bcffc3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 15:42:52 2017 Not After : Thu Mar 31 15:42:52 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:9e:fc:ad:6e:3d:12:9d:7c:85:00:22:86:7e:41:f7: 33:9a:e1:1c:7f:81:e2:c4:0e:a8:97:34:30:d2:ad:c4: 0c:01:92:5f:57:48:f8:91:e3:77:a0:d9:b1:e0:99:23: 0d:f3:80:b4:5b:07:18:fc:32:01:a8:ce:d2:35:63:ed: 68:35:98:22:18:21:a2:fd:02:22:a3:a6:5b:58:63:24: 29:13:13:17:4e:f6:d5:75:a0:71:57:89:06:58:ed:55: 49:ed:7b:eb:2a:84:6f:5d:74:57:fd:87:0e:19:10:ef: 1c:b6:2f:20:56:58:87:ae:ee:37:36:43:2f:27:e7:59: 09:aa:ce:35:77:09:f6:91:8d:05:aa:9d:35:97:1c:c8: c3:47:b2:c7:6a:63:4b:6c:5e:a9:31:0f:e8:5d:35:d1: 5b:7c:71:76:00:97:15:4d:ae:bd:b7:ff:d5:63:1c:7f: 88:f0:8d:70:98:a5:51:6b:71:6e:da:3e:99:f8:24:63: 02:be:ca:1d:b3:6d:9a:7e:ad:a3:62:ef:1b:b3:44:a2: 44:4b:a8:af:76:71:89:29:e2:02:e7:2d:0d:b4:e8:c8: c2:cb:61:6a:89:36:5d:c0:b2:33:04:36:66:b1:4b:87: c5:1c:af:b7:df:2f:17:9d:4f:ac:fc:51:64:b2:07:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:04:ae:3d:e3:40:bf:67:39:a2:76:fa:24:99:a4:5f: fe:8a:09:ab:87:6a:22:bc:c2:b0:de:02:91:7a:b0:16: 57:0e:4d:c4:de:e1:f8:2d:9f:46:9b:b0:b0:62:0c:6c: 60:9d:bb:24:25:87:ca:d3:d3:4c:9a:34:c6:f8:a8:ea: 16:98:60:7a:46:0c:a0:75:e5:33:69:e8:5d:b7:05:5d: b5:1c:ff:e4:83:b5:eb:40:f4:7d:20:b5:d2:68:be:e9: a5:96:29:a4:f0:f8:0e:f2:9c:07:27:5b:50:f9:50:d0: d7:ab:d8:8c:21:4a:e2:c0:af:c8:e6:66:07:76:97:6d: 01:40:7d:2e:09:86:ee:7b:0c:19:d7:11:8f:42:9f:e2: fe:f6:b9:da:62:f5:40:e1:30:fa:56:60:03:3b:94:a9: ed:2d:55:81:a6:b5:19:98:08:f9:e8:9c:d8:70:f8:ea: 4c:5f:f0:88:01:96:4f:f9:b0:5b:51:df:73:5e:c4:3e: 26:5b:96:25:e6:6c:33:5f:95:3c:5c:2e:56:7d:cf:56: 99:04:7c:e6:03:cc:7f:58:41:3d:3c:27:9c:a6:ba:48: 63:e1:a1:a8:52:24:50:92:59:23:af:d1:bf:4f:f2:7e: 20:9a:b6:5c:b5:e4:e2:32:3f:94:24:fc:7c:a4:92:bf Fingerprint (SHA-256): 2A:0E:B7:44:4C:80:A7:4B:B6:13:3D:D3:C8:CB:34:EB:F9:BB:D0:06:94:F7:C7:20:BF:0A:FF:45:9F:36:6A:2F Fingerprint (SHA1): C4:95:9C:54:0D:1E:55:40:D9:33:77:04:5A:10:AA:22:A2:4E:DF:12 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #3225: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3226: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153345 (0x13bcffc1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 15:42:22 2017 Not After : Thu Mar 31 15:42:22 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:3f:bd:35:8c:b4:b1:44:00:28:f5:15:70:bf:b2:a7: a0:1b:71:ef:51:b3:93:44:e6:1f:38:0b:66:59:a5:ba: 79:d5:72:1f:d6:92:5a:ff:1b:44:21:05:6d:f2:84:bb: 37:de:75:88:a2:b4:eb:86:5a:e9:f1:fe:03:3f:89:19: 6f:ec:b9:38:74:e3:49:fe:ee:33:fd:12:72:65:4c:a1: c2:a8:a0:a2:71:b8:57:85:42:28:f4:b1:30:da:2f:fc: 39:44:cb:2a:49:50:a8:63:62:5d:17:f5:84:f7:0f:74: 18:2d:dc:62:48:b8:0c:71:09:a6:e0:55:b8:ec:88:7f: e2:7a:64:c6:34:fc:e4:fd:68:e4:dd:b0:57:fa:81:48: f1:ea:fa:e4:26:fc:75:c1:32:85:5b:22:e5:56:7b:20: fd:e7:07:e7:1c:77:8d:3a:a4:c0:ed:68:89:3a:28:0c: c9:bb:da:18:76:79:48:35:4d:0e:2c:52:25:4e:5a:f5: 84:64:d3:09:ad:70:49:c6:34:72:4f:b9:ca:96:55:48: cd:6b:ec:a7:cc:fb:b5:7a:7a:ec:95:59:6a:c4:4b:dd: 7f:d6:51:0b:bf:5d:f9:9d:27:97:20:e5:e8:3a:b9:8f: ab:6c:5b:bd:c3:b9:3d:8f:70:aa:cd:16:95:cc:dc:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:12:a9:52:75:06:47:4b:ba:c8:a4:34:40:ff:4e:b3: 73:e0:05:a5:23:3a:3b:85:58:a0:5b:20:17:30:52:64: 7e:78:6c:58:de:c5:91:80:85:4a:b2:9b:04:d9:08:e5: 25:fb:eb:19:41:60:67:79:46:43:9d:be:8d:5a:90:9b: d0:2d:a8:53:b0:51:db:6d:96:fe:61:ca:9a:28:19:4f: b2:7c:54:e1:5b:eb:ed:59:55:93:32:1d:2e:25:42:c2: 67:86:3a:43:48:82:39:3f:e2:f5:c0:54:91:ef:29:5b: fd:cd:ba:17:12:7e:e7:0b:3a:b6:3e:c6:62:4a:a1:68: 26:36:3c:5f:a5:f6:12:00:d1:e8:04:a0:90:81:bf:81: 76:9c:af:b3:31:c3:d0:75:4d:11:5d:33:a9:ef:bf:af: 60:27:11:81:6b:30:5f:b7:4e:ff:c4:0b:01:3c:33:f8: 66:57:9f:e1:68:b4:f1:37:1a:70:79:c9:87:a9:63:da: 22:71:12:da:44:5b:04:51:bc:02:2a:43:1e:ba:37:be: 4c:53:79:3c:25:b3:a6:02:2d:14:bb:1a:dc:29:20:9a: 05:c4:18:eb:40:a3:c8:44:d7:16:99:76:f4:24:25:64: f7:4e:bf:db:9b:52:1e:d7:f3:54:70:7a:d6:8e:e3:36 Fingerprint (SHA-256): BF:B5:15:A6:BE:86:4B:FA:4D:6B:4A:48:6D:F7:60:DE:B3:9A:5B:E3:43:1B:85:CC:04:2A:16:19:48:6B:D6:CC Fingerprint (SHA1): B7:D5:9E:D2:00:3A:50:AF:26:74:FB:6D:07:FE:12:F4:06:9C:1E:5A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3227: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153345 (0x13bcffc1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 15:42:22 2017 Not After : Thu Mar 31 15:42:22 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:3f:bd:35:8c:b4:b1:44:00:28:f5:15:70:bf:b2:a7: a0:1b:71:ef:51:b3:93:44:e6:1f:38:0b:66:59:a5:ba: 79:d5:72:1f:d6:92:5a:ff:1b:44:21:05:6d:f2:84:bb: 37:de:75:88:a2:b4:eb:86:5a:e9:f1:fe:03:3f:89:19: 6f:ec:b9:38:74:e3:49:fe:ee:33:fd:12:72:65:4c:a1: c2:a8:a0:a2:71:b8:57:85:42:28:f4:b1:30:da:2f:fc: 39:44:cb:2a:49:50:a8:63:62:5d:17:f5:84:f7:0f:74: 18:2d:dc:62:48:b8:0c:71:09:a6:e0:55:b8:ec:88:7f: e2:7a:64:c6:34:fc:e4:fd:68:e4:dd:b0:57:fa:81:48: f1:ea:fa:e4:26:fc:75:c1:32:85:5b:22:e5:56:7b:20: fd:e7:07:e7:1c:77:8d:3a:a4:c0:ed:68:89:3a:28:0c: c9:bb:da:18:76:79:48:35:4d:0e:2c:52:25:4e:5a:f5: 84:64:d3:09:ad:70:49:c6:34:72:4f:b9:ca:96:55:48: cd:6b:ec:a7:cc:fb:b5:7a:7a:ec:95:59:6a:c4:4b:dd: 7f:d6:51:0b:bf:5d:f9:9d:27:97:20:e5:e8:3a:b9:8f: ab:6c:5b:bd:c3:b9:3d:8f:70:aa:cd:16:95:cc:dc:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:12:a9:52:75:06:47:4b:ba:c8:a4:34:40:ff:4e:b3: 73:e0:05:a5:23:3a:3b:85:58:a0:5b:20:17:30:52:64: 7e:78:6c:58:de:c5:91:80:85:4a:b2:9b:04:d9:08:e5: 25:fb:eb:19:41:60:67:79:46:43:9d:be:8d:5a:90:9b: d0:2d:a8:53:b0:51:db:6d:96:fe:61:ca:9a:28:19:4f: b2:7c:54:e1:5b:eb:ed:59:55:93:32:1d:2e:25:42:c2: 67:86:3a:43:48:82:39:3f:e2:f5:c0:54:91:ef:29:5b: fd:cd:ba:17:12:7e:e7:0b:3a:b6:3e:c6:62:4a:a1:68: 26:36:3c:5f:a5:f6:12:00:d1:e8:04:a0:90:81:bf:81: 76:9c:af:b3:31:c3:d0:75:4d:11:5d:33:a9:ef:bf:af: 60:27:11:81:6b:30:5f:b7:4e:ff:c4:0b:01:3c:33:f8: 66:57:9f:e1:68:b4:f1:37:1a:70:79:c9:87:a9:63:da: 22:71:12:da:44:5b:04:51:bc:02:2a:43:1e:ba:37:be: 4c:53:79:3c:25:b3:a6:02:2d:14:bb:1a:dc:29:20:9a: 05:c4:18:eb:40:a3:c8:44:d7:16:99:76:f4:24:25:64: f7:4e:bf:db:9b:52:1e:d7:f3:54:70:7a:d6:8e:e3:36 Fingerprint (SHA-256): BF:B5:15:A6:BE:86:4B:FA:4D:6B:4A:48:6D:F7:60:DE:B3:9A:5B:E3:43:1B:85:CC:04:2A:16:19:48:6B:D6:CC Fingerprint (SHA1): B7:D5:9E:D2:00:3A:50:AF:26:74:FB:6D:07:FE:12:F4:06:9C:1E:5A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3228: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153346 (0x13bcffc2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 15:42:31 2017 Not After : Thu Mar 31 15:42:31 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:a5:8d:76:f5:b1:47:0b:92:8c:06:f8:80:f3:8d:dd: 3b:01:00:48:17:a4:27:a0:53:2e:0b:65:7b:e8:19:f5: 16:16:bb:52:3a:56:04:76:c9:4b:15:62:14:d9:9e:1a: b5:fb:5f:0d:82:87:3e:1e:0b:80:c4:f5:00:76:fa:9b: 28:8c:18:f7:0f:96:9b:5e:5d:c5:c6:6b:10:68:b4:31: 8f:ad:80:6a:8f:f5:92:f6:00:61:fe:71:c0:ae:dd:a6: f3:5f:08:83:4b:a1:0c:68:35:77:f4:f2:62:d4:d9:b8: 89:2c:27:07:71:99:57:46:d3:eb:63:7d:1b:d5:34:43: 51:51:56:08:eb:87:aa:6f:bf:c2:d5:10:c2:53:d7:77: 6d:1d:d4:ec:0c:79:2a:cc:13:50:bb:f0:04:f6:ca:c4: 20:48:5d:ad:ce:00:64:b4:9c:de:e1:6f:e0:e4:a6:12: 97:33:9f:83:12:0c:b0:e9:2e:e2:9d:db:85:4a:cb:09: 87:68:eb:28:26:6c:23:dd:54:97:56:5e:d1:91:ee:ef: b6:d3:94:46:d5:03:fa:f5:48:04:5d:79:26:ed:a8:ee: 82:ec:2b:e8:cd:57:8e:77:98:f3:f4:3e:23:66:8d:17: 36:20:be:db:72:92:46:1d:e5:da:22:43:ed:2a:ac:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:e0:2f:19:94:5e:22:5c:f5:c1:8f:61:48:8f:83:ea: 33:28:b8:8e:19:cc:6a:30:46:c1:61:34:8b:6e:85:e6: 5e:70:76:f3:a6:9e:50:ba:92:bc:d6:0c:31:2f:cc:37: 5c:6d:a3:a1:fb:45:36:7e:9d:ea:0a:04:79:5b:2c:da: 17:f2:99:d0:fb:9a:34:e8:13:7c:3c:eb:69:73:29:19: bc:8b:39:77:91:b9:41:7c:a8:fe:29:9e:39:e7:e3:47: cc:e4:b5:f3:ad:99:81:c0:f4:29:85:d8:cb:f0:02:43: af:f7:19:c6:e6:7a:fc:ef:5c:e7:60:9c:0f:c5:3e:96: 12:58:f3:c7:63:ee:d5:d4:92:90:e5:ba:7c:4e:20:d9: ff:6b:97:64:98:33:48:01:35:1e:8b:b0:15:5f:a1:02: f8:0f:f0:4d:f4:54:d2:00:c1:16:fc:d5:20:79:eb:aa: bb:91:25:d0:ff:d9:07:de:81:7a:3b:a7:9e:bc:88:ed: 46:f1:ed:9d:84:a4:c5:8b:3b:cb:36:1f:cb:0b:f6:6c: b5:67:96:98:11:cc:3c:db:95:f8:4f:03:c1:9b:ec:2d: f4:d8:66:f9:ba:77:cb:e7:9a:da:e7:5c:6b:7f:0a:df: ee:6b:94:be:54:f1:a4:60:c3:16:f2:ca:76:5e:e1:ac Fingerprint (SHA-256): 1C:F6:CD:30:9F:55:F6:34:76:59:39:57:B4:D3:84:18:D3:C4:C0:68:53:79:F1:A5:94:34:3E:0A:AA:47:63:0D Fingerprint (SHA1): 8C:0D:A1:E7:F0:2D:BE:70:89:0A:E3:85:C7:A6:1B:7B:DD:40:FD:61 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3229: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153346 (0x13bcffc2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 15:42:31 2017 Not After : Thu Mar 31 15:42:31 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:a5:8d:76:f5:b1:47:0b:92:8c:06:f8:80:f3:8d:dd: 3b:01:00:48:17:a4:27:a0:53:2e:0b:65:7b:e8:19:f5: 16:16:bb:52:3a:56:04:76:c9:4b:15:62:14:d9:9e:1a: b5:fb:5f:0d:82:87:3e:1e:0b:80:c4:f5:00:76:fa:9b: 28:8c:18:f7:0f:96:9b:5e:5d:c5:c6:6b:10:68:b4:31: 8f:ad:80:6a:8f:f5:92:f6:00:61:fe:71:c0:ae:dd:a6: f3:5f:08:83:4b:a1:0c:68:35:77:f4:f2:62:d4:d9:b8: 89:2c:27:07:71:99:57:46:d3:eb:63:7d:1b:d5:34:43: 51:51:56:08:eb:87:aa:6f:bf:c2:d5:10:c2:53:d7:77: 6d:1d:d4:ec:0c:79:2a:cc:13:50:bb:f0:04:f6:ca:c4: 20:48:5d:ad:ce:00:64:b4:9c:de:e1:6f:e0:e4:a6:12: 97:33:9f:83:12:0c:b0:e9:2e:e2:9d:db:85:4a:cb:09: 87:68:eb:28:26:6c:23:dd:54:97:56:5e:d1:91:ee:ef: b6:d3:94:46:d5:03:fa:f5:48:04:5d:79:26:ed:a8:ee: 82:ec:2b:e8:cd:57:8e:77:98:f3:f4:3e:23:66:8d:17: 36:20:be:db:72:92:46:1d:e5:da:22:43:ed:2a:ac:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:e0:2f:19:94:5e:22:5c:f5:c1:8f:61:48:8f:83:ea: 33:28:b8:8e:19:cc:6a:30:46:c1:61:34:8b:6e:85:e6: 5e:70:76:f3:a6:9e:50:ba:92:bc:d6:0c:31:2f:cc:37: 5c:6d:a3:a1:fb:45:36:7e:9d:ea:0a:04:79:5b:2c:da: 17:f2:99:d0:fb:9a:34:e8:13:7c:3c:eb:69:73:29:19: bc:8b:39:77:91:b9:41:7c:a8:fe:29:9e:39:e7:e3:47: cc:e4:b5:f3:ad:99:81:c0:f4:29:85:d8:cb:f0:02:43: af:f7:19:c6:e6:7a:fc:ef:5c:e7:60:9c:0f:c5:3e:96: 12:58:f3:c7:63:ee:d5:d4:92:90:e5:ba:7c:4e:20:d9: ff:6b:97:64:98:33:48:01:35:1e:8b:b0:15:5f:a1:02: f8:0f:f0:4d:f4:54:d2:00:c1:16:fc:d5:20:79:eb:aa: bb:91:25:d0:ff:d9:07:de:81:7a:3b:a7:9e:bc:88:ed: 46:f1:ed:9d:84:a4:c5:8b:3b:cb:36:1f:cb:0b:f6:6c: b5:67:96:98:11:cc:3c:db:95:f8:4f:03:c1:9b:ec:2d: f4:d8:66:f9:ba:77:cb:e7:9a:da:e7:5c:6b:7f:0a:df: ee:6b:94:be:54:f1:a4:60:c3:16:f2:ca:76:5e:e1:ac Fingerprint (SHA-256): 1C:F6:CD:30:9F:55:F6:34:76:59:39:57:B4:D3:84:18:D3:C4:C0:68:53:79:F1:A5:94:34:3E:0A:AA:47:63:0D Fingerprint (SHA1): 8C:0D:A1:E7:F0:2D:BE:70:89:0A:E3:85:C7:A6:1B:7B:DD:40:FD:61 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3230: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153347 (0x13bcffc3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 15:42:52 2017 Not After : Thu Mar 31 15:42:52 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:9e:fc:ad:6e:3d:12:9d:7c:85:00:22:86:7e:41:f7: 33:9a:e1:1c:7f:81:e2:c4:0e:a8:97:34:30:d2:ad:c4: 0c:01:92:5f:57:48:f8:91:e3:77:a0:d9:b1:e0:99:23: 0d:f3:80:b4:5b:07:18:fc:32:01:a8:ce:d2:35:63:ed: 68:35:98:22:18:21:a2:fd:02:22:a3:a6:5b:58:63:24: 29:13:13:17:4e:f6:d5:75:a0:71:57:89:06:58:ed:55: 49:ed:7b:eb:2a:84:6f:5d:74:57:fd:87:0e:19:10:ef: 1c:b6:2f:20:56:58:87:ae:ee:37:36:43:2f:27:e7:59: 09:aa:ce:35:77:09:f6:91:8d:05:aa:9d:35:97:1c:c8: c3:47:b2:c7:6a:63:4b:6c:5e:a9:31:0f:e8:5d:35:d1: 5b:7c:71:76:00:97:15:4d:ae:bd:b7:ff:d5:63:1c:7f: 88:f0:8d:70:98:a5:51:6b:71:6e:da:3e:99:f8:24:63: 02:be:ca:1d:b3:6d:9a:7e:ad:a3:62:ef:1b:b3:44:a2: 44:4b:a8:af:76:71:89:29:e2:02:e7:2d:0d:b4:e8:c8: c2:cb:61:6a:89:36:5d:c0:b2:33:04:36:66:b1:4b:87: c5:1c:af:b7:df:2f:17:9d:4f:ac:fc:51:64:b2:07:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:04:ae:3d:e3:40:bf:67:39:a2:76:fa:24:99:a4:5f: fe:8a:09:ab:87:6a:22:bc:c2:b0:de:02:91:7a:b0:16: 57:0e:4d:c4:de:e1:f8:2d:9f:46:9b:b0:b0:62:0c:6c: 60:9d:bb:24:25:87:ca:d3:d3:4c:9a:34:c6:f8:a8:ea: 16:98:60:7a:46:0c:a0:75:e5:33:69:e8:5d:b7:05:5d: b5:1c:ff:e4:83:b5:eb:40:f4:7d:20:b5:d2:68:be:e9: a5:96:29:a4:f0:f8:0e:f2:9c:07:27:5b:50:f9:50:d0: d7:ab:d8:8c:21:4a:e2:c0:af:c8:e6:66:07:76:97:6d: 01:40:7d:2e:09:86:ee:7b:0c:19:d7:11:8f:42:9f:e2: fe:f6:b9:da:62:f5:40:e1:30:fa:56:60:03:3b:94:a9: ed:2d:55:81:a6:b5:19:98:08:f9:e8:9c:d8:70:f8:ea: 4c:5f:f0:88:01:96:4f:f9:b0:5b:51:df:73:5e:c4:3e: 26:5b:96:25:e6:6c:33:5f:95:3c:5c:2e:56:7d:cf:56: 99:04:7c:e6:03:cc:7f:58:41:3d:3c:27:9c:a6:ba:48: 63:e1:a1:a8:52:24:50:92:59:23:af:d1:bf:4f:f2:7e: 20:9a:b6:5c:b5:e4:e2:32:3f:94:24:fc:7c:a4:92:bf Fingerprint (SHA-256): 2A:0E:B7:44:4C:80:A7:4B:B6:13:3D:D3:C8:CB:34:EB:F9:BB:D0:06:94:F7:C7:20:BF:0A:FF:45:9F:36:6A:2F Fingerprint (SHA1): C4:95:9C:54:0D:1E:55:40:D9:33:77:04:5A:10:AA:22:A2:4E:DF:12 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #3231: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153347 (0x13bcffc3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 15:42:52 2017 Not After : Thu Mar 31 15:42:52 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:9e:fc:ad:6e:3d:12:9d:7c:85:00:22:86:7e:41:f7: 33:9a:e1:1c:7f:81:e2:c4:0e:a8:97:34:30:d2:ad:c4: 0c:01:92:5f:57:48:f8:91:e3:77:a0:d9:b1:e0:99:23: 0d:f3:80:b4:5b:07:18:fc:32:01:a8:ce:d2:35:63:ed: 68:35:98:22:18:21:a2:fd:02:22:a3:a6:5b:58:63:24: 29:13:13:17:4e:f6:d5:75:a0:71:57:89:06:58:ed:55: 49:ed:7b:eb:2a:84:6f:5d:74:57:fd:87:0e:19:10:ef: 1c:b6:2f:20:56:58:87:ae:ee:37:36:43:2f:27:e7:59: 09:aa:ce:35:77:09:f6:91:8d:05:aa:9d:35:97:1c:c8: c3:47:b2:c7:6a:63:4b:6c:5e:a9:31:0f:e8:5d:35:d1: 5b:7c:71:76:00:97:15:4d:ae:bd:b7:ff:d5:63:1c:7f: 88:f0:8d:70:98:a5:51:6b:71:6e:da:3e:99:f8:24:63: 02:be:ca:1d:b3:6d:9a:7e:ad:a3:62:ef:1b:b3:44:a2: 44:4b:a8:af:76:71:89:29:e2:02:e7:2d:0d:b4:e8:c8: c2:cb:61:6a:89:36:5d:c0:b2:33:04:36:66:b1:4b:87: c5:1c:af:b7:df:2f:17:9d:4f:ac:fc:51:64:b2:07:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:04:ae:3d:e3:40:bf:67:39:a2:76:fa:24:99:a4:5f: fe:8a:09:ab:87:6a:22:bc:c2:b0:de:02:91:7a:b0:16: 57:0e:4d:c4:de:e1:f8:2d:9f:46:9b:b0:b0:62:0c:6c: 60:9d:bb:24:25:87:ca:d3:d3:4c:9a:34:c6:f8:a8:ea: 16:98:60:7a:46:0c:a0:75:e5:33:69:e8:5d:b7:05:5d: b5:1c:ff:e4:83:b5:eb:40:f4:7d:20:b5:d2:68:be:e9: a5:96:29:a4:f0:f8:0e:f2:9c:07:27:5b:50:f9:50:d0: d7:ab:d8:8c:21:4a:e2:c0:af:c8:e6:66:07:76:97:6d: 01:40:7d:2e:09:86:ee:7b:0c:19:d7:11:8f:42:9f:e2: fe:f6:b9:da:62:f5:40:e1:30:fa:56:60:03:3b:94:a9: ed:2d:55:81:a6:b5:19:98:08:f9:e8:9c:d8:70:f8:ea: 4c:5f:f0:88:01:96:4f:f9:b0:5b:51:df:73:5e:c4:3e: 26:5b:96:25:e6:6c:33:5f:95:3c:5c:2e:56:7d:cf:56: 99:04:7c:e6:03:cc:7f:58:41:3d:3c:27:9c:a6:ba:48: 63:e1:a1:a8:52:24:50:92:59:23:af:d1:bf:4f:f2:7e: 20:9a:b6:5c:b5:e4:e2:32:3f:94:24:fc:7c:a4:92:bf Fingerprint (SHA-256): 2A:0E:B7:44:4C:80:A7:4B:B6:13:3D:D3:C8:CB:34:EB:F9:BB:D0:06:94:F7:C7:20:BF:0A:FF:45:9F:36:6A:2F Fingerprint (SHA1): C4:95:9C:54:0D:1E:55:40:D9:33:77:04:5A:10:AA:22:A2:4E:DF:12 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #3232: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #3233: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153350 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3234: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #3235: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3236: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3237: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 331153351 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3238: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3239: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3240: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3241: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331153352 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3242: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3243: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3244: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3245: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 331153353 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3246: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3247: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #3248: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3249: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 331153354 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3250: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3251: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #3252: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3253: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 331153355 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3254: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3255: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #3256: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3257: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 331153356 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3258: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3259: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3260: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #3261: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #3262: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3263: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #3264: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153350 (0x13bcffc6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 15:43:30 2017 Not After : Thu Mar 31 15:43:30 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:18:8a:76:d3:46:10:6c:c7:3a:43:ce:03:21:1e:fe: ab:2e:b3:08:ae:4f:c8:30:11:61:e6:e5:37:d5:d9:61: 9e:ed:dc:67:57:ba:b0:c8:62:67:6f:0b:2a:53:a9:67: 7e:10:52:e7:bd:ea:5f:45:92:8a:85:38:02:4b:60:20: 00:7d:9f:0e:1f:7a:e9:cd:1e:f6:7a:d5:22:3a:1d:ab: 65:06:63:c3:fb:7d:88:98:c8:c1:62:1d:67:63:a1:93: 2a:1e:65:35:e0:0e:38:c3:84:ba:12:af:58:77:3e:a5: 42:68:91:e0:b9:30:9e:29:55:d0:a7:dd:38:fe:0c:e0: 47:e0:a7:a8:b5:12:4a:18:52:fa:0c:04:43:83:af:1e: 00:ff:39:58:80:13:5e:ad:23:b7:31:a4:43:46:d2:2c: 2b:f5:0e:2a:1b:96:6b:7c:ee:82:15:ee:fe:27:a7:07: 72:d7:b0:71:66:29:e4:6b:bc:c4:6a:58:89:0f:aa:f8: ed:60:fd:d9:4f:28:a2:60:af:a3:46:bf:d0:e7:92:97: 17:02:57:da:77:bf:08:9a:88:a1:e8:a2:c9:0f:ec:9e: 54:be:33:46:11:21:66:1d:14:7b:c7:90:ce:98:76:af: 49:fa:83:af:7d:c1:cc:72:6a:6b:c5:ec:b5:ab:17:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:8d:47:0d:fd:89:81:8e:69:a1:19:55:26:8c:d0:a8: 9c:0b:1a:38:5c:d6:af:89:d8:0c:61:fe:1c:f5:88:bf: b7:fe:d8:18:56:52:ad:14:37:8e:36:1c:13:12:0e:39: 41:a0:5d:c2:71:77:1d:36:62:43:76:42:1a:d5:3d:82: e2:3e:dd:08:74:2f:c8:3c:35:e5:33:0f:bd:47:13:e2: 01:65:8c:31:3d:67:3b:32:9d:d7:8f:23:c6:17:ed:04: c1:01:6a:2c:4b:98:b9:14:3e:cb:40:93:8e:7f:5a:6a: 3b:6b:d3:a6:74:7e:ad:20:a6:05:27:f1:cf:e2:bd:b1: 58:df:dc:c5:61:1c:1d:8f:d5:39:15:ed:64:bf:dc:01: 20:69:66:f2:d7:f4:fe:cb:18:65:1d:69:94:27:a3:0f: 26:61:78:6e:0a:f3:e2:59:b3:c1:6b:27:b7:c9:db:4e: f8:46:ca:53:69:61:e5:6a:5d:d9:36:d0:c7:9c:26:69: b5:a4:72:b6:6c:58:dd:79:3b:25:0f:5c:42:5f:d4:4d: 8c:af:66:74:9f:af:c4:48:38:52:ff:31:b3:85:b0:44: d0:60:5b:f7:3d:9c:29:26:4f:07:fb:24:71:5b:9d:ec: da:95:43:90:d9:c3:e5:b1:51:ff:df:94:59:96:c4:4a Fingerprint (SHA-256): ED:3E:1D:25:24:81:B5:32:0D:CA:54:0B:7B:8F:98:89:17:D8:83:87:6D:6C:1D:D4:11:C3:F2:A8:9F:99:5D:93 Fingerprint (SHA1): A3:0C:49:D5:A7:C3:14:0B:29:9E:5C:2D:A5:DA:21:E5:21:1F:56:04 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3265: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3266: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3267: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3268: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153350 (0x13bcffc6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 15:43:30 2017 Not After : Thu Mar 31 15:43:30 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:18:8a:76:d3:46:10:6c:c7:3a:43:ce:03:21:1e:fe: ab:2e:b3:08:ae:4f:c8:30:11:61:e6:e5:37:d5:d9:61: 9e:ed:dc:67:57:ba:b0:c8:62:67:6f:0b:2a:53:a9:67: 7e:10:52:e7:bd:ea:5f:45:92:8a:85:38:02:4b:60:20: 00:7d:9f:0e:1f:7a:e9:cd:1e:f6:7a:d5:22:3a:1d:ab: 65:06:63:c3:fb:7d:88:98:c8:c1:62:1d:67:63:a1:93: 2a:1e:65:35:e0:0e:38:c3:84:ba:12:af:58:77:3e:a5: 42:68:91:e0:b9:30:9e:29:55:d0:a7:dd:38:fe:0c:e0: 47:e0:a7:a8:b5:12:4a:18:52:fa:0c:04:43:83:af:1e: 00:ff:39:58:80:13:5e:ad:23:b7:31:a4:43:46:d2:2c: 2b:f5:0e:2a:1b:96:6b:7c:ee:82:15:ee:fe:27:a7:07: 72:d7:b0:71:66:29:e4:6b:bc:c4:6a:58:89:0f:aa:f8: ed:60:fd:d9:4f:28:a2:60:af:a3:46:bf:d0:e7:92:97: 17:02:57:da:77:bf:08:9a:88:a1:e8:a2:c9:0f:ec:9e: 54:be:33:46:11:21:66:1d:14:7b:c7:90:ce:98:76:af: 49:fa:83:af:7d:c1:cc:72:6a:6b:c5:ec:b5:ab:17:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:8d:47:0d:fd:89:81:8e:69:a1:19:55:26:8c:d0:a8: 9c:0b:1a:38:5c:d6:af:89:d8:0c:61:fe:1c:f5:88:bf: b7:fe:d8:18:56:52:ad:14:37:8e:36:1c:13:12:0e:39: 41:a0:5d:c2:71:77:1d:36:62:43:76:42:1a:d5:3d:82: e2:3e:dd:08:74:2f:c8:3c:35:e5:33:0f:bd:47:13:e2: 01:65:8c:31:3d:67:3b:32:9d:d7:8f:23:c6:17:ed:04: c1:01:6a:2c:4b:98:b9:14:3e:cb:40:93:8e:7f:5a:6a: 3b:6b:d3:a6:74:7e:ad:20:a6:05:27:f1:cf:e2:bd:b1: 58:df:dc:c5:61:1c:1d:8f:d5:39:15:ed:64:bf:dc:01: 20:69:66:f2:d7:f4:fe:cb:18:65:1d:69:94:27:a3:0f: 26:61:78:6e:0a:f3:e2:59:b3:c1:6b:27:b7:c9:db:4e: f8:46:ca:53:69:61:e5:6a:5d:d9:36:d0:c7:9c:26:69: b5:a4:72:b6:6c:58:dd:79:3b:25:0f:5c:42:5f:d4:4d: 8c:af:66:74:9f:af:c4:48:38:52:ff:31:b3:85:b0:44: d0:60:5b:f7:3d:9c:29:26:4f:07:fb:24:71:5b:9d:ec: da:95:43:90:d9:c3:e5:b1:51:ff:df:94:59:96:c4:4a Fingerprint (SHA-256): ED:3E:1D:25:24:81:B5:32:0D:CA:54:0B:7B:8F:98:89:17:D8:83:87:6D:6C:1D:D4:11:C3:F2:A8:9F:99:5D:93 Fingerprint (SHA1): A3:0C:49:D5:A7:C3:14:0B:29:9E:5C:2D:A5:DA:21:E5:21:1F:56:04 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3269: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3270: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #3271: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153357 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3272: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #3273: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3274: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3275: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 331153358 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3276: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3277: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #3278: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3279: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 331153359 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3280: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3281: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #3282: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3283: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 331153360 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3284: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3285: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3286: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3287: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 331153361 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3288: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3289: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #3290: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3291: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 331153362 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3292: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3293: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #3294: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3295: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 331153363 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3296: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3297: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3298: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3299: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 331153364 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3300: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3301: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #3302: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3303: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 331153365 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3304: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3305: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #3306: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3307: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 331153366 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3308: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3309: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #3310: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3311: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 331153367 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3312: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3313: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #3314: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3315: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 331153368 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3316: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3317: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #3318: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3319: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 331153369 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3320: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3321: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #3322: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3323: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 331153370 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3324: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3325: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #3326: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3327: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 331153371 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3328: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3329: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #3330: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3331: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 331153372 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3332: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3333: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #3334: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3335: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 331153373 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3336: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3337: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #3338: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3339: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 331153374 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3340: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3341: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #3342: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3343: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 331153375 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3344: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3345: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #3346: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3347: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 331153376 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3348: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3349: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #3350: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3351: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 331153377 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3352: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3353: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #3354: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3355: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 331153378 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3356: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3357: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #3358: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3359: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 331153379 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3360: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3361: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #3362: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3363: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 331153380 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3364: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3365: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #3366: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3367: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 331153381 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3368: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3369: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #3370: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3371: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 331153382 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3372: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3373: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #3374: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3375: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 331153383 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3376: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3377: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #3378: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3379: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 331153384 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3380: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3381: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #3382: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3383: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 331153385 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3384: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3385: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #3386: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3387: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 331153386 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3388: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3389: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3390: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153357 (0x13bcffcd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 15:44:58 2017 Not After : Thu Mar 31 15:44:58 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:f4:50:22:f4:b4:4b:79:73:d3:01:87:68:32:7a:25: d0:ff:38:44:34:fe:3d:af:03:4f:6a:4e:00:47:d9:ac: 13:7a:b2:94:3e:3f:be:a4:a6:18:bc:d4:fc:a4:49:4c: b5:15:2d:9b:85:3f:3f:b8:da:ee:6e:26:02:3a:73:d1: 93:f7:01:c8:6c:97:f6:2e:8c:cc:bb:16:b6:c2:3d:44: 19:b4:ad:9d:86:4a:5d:5f:31:26:27:4c:e1:74:00:46: 83:73:a1:7e:77:88:ad:e0:88:94:ef:85:05:8c:7b:bd: 5d:0e:68:84:96:3b:b9:1f:54:ad:e4:5e:14:a2:3c:bb: 8d:4e:b2:01:5e:36:bd:8f:04:3b:81:c0:e6:8e:d2:63: 34:13:50:71:b8:c9:24:e1:3c:53:5c:2e:37:b9:72:8d: b9:52:fa:af:02:51:47:ed:37:1b:6f:bd:62:3f:34:48: 17:5c:cb:c2:fa:5d:05:4e:5b:9d:d9:d8:56:33:b4:9a: b6:45:f3:f3:2c:77:df:23:ff:1d:fc:2a:43:78:4e:61: 22:d5:31:0f:d8:71:a1:d1:39:e2:67:cd:74:2c:7e:54: 61:a7:71:8d:f6:13:bb:36:d6:04:41:d3:10:08:1a:f9: 2d:6e:61:b0:69:66:e8:fc:20:b8:42:4a:80:9b:73:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:e0:86:88:5f:0b:59:57:b8:e3:66:cf:d2:60:be:28: 13:ff:81:6d:e4:87:37:4a:6f:e4:27:39:4b:a9:15:86: 5c:68:8a:17:32:c5:f1:c0:21:32:7b:2b:5f:fd:39:fe: 26:64:a8:eb:28:75:56:57:c9:a8:f2:94:67:dc:2b:a3: 46:7e:e9:b9:68:19:93:d9:70:1d:76:4d:14:1a:44:2b: 6a:8b:8c:8b:79:58:f7:0e:0b:18:c2:eb:3a:53:e0:82: 0b:93:cd:57:bf:dc:c1:60:a1:65:1d:3e:0e:c0:b1:14: d6:b2:80:73:c6:7c:0f:6c:0c:14:31:3c:66:2b:89:e9: 09:23:5e:68:43:0e:b7:c2:30:fe:f3:d4:b2:0c:4d:69: 1a:97:a1:12:4b:9d:e9:5c:3f:d7:2e:83:38:4d:5f:1d: 9f:ed:5d:5a:74:2d:a2:cc:0c:a3:63:69:5b:7a:33:b9: f3:f8:14:b1:2a:03:3c:90:be:85:f5:2b:06:7f:48:28: 6e:0a:00:fd:5e:9d:f9:78:35:b8:68:f9:b2:a1:9e:13: 4c:54:44:51:05:83:d8:91:2f:e7:4c:d1:7d:3a:48:bb: ac:ad:8f:7e:c4:a3:ab:0d:bb:ce:34:d0:d8:fc:c7:5a: 4e:e2:5d:6e:aa:33:38:73:b8:77:11:6e:67:ab:a4:82 Fingerprint (SHA-256): A6:C1:4B:E0:2B:A5:A1:CF:47:39:43:4D:2E:33:7C:04:96:73:B5:1F:3C:86:0F:68:ED:DB:F3:96:D2:40:8F:7D Fingerprint (SHA1): 59:B9:B2:1D:7C:6D:A1:81:81:F3:E3:88:63:4D:D1:0D:1D:EC:91:51 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3391: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3392: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153357 (0x13bcffcd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 15:44:58 2017 Not After : Thu Mar 31 15:44:58 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:f4:50:22:f4:b4:4b:79:73:d3:01:87:68:32:7a:25: d0:ff:38:44:34:fe:3d:af:03:4f:6a:4e:00:47:d9:ac: 13:7a:b2:94:3e:3f:be:a4:a6:18:bc:d4:fc:a4:49:4c: b5:15:2d:9b:85:3f:3f:b8:da:ee:6e:26:02:3a:73:d1: 93:f7:01:c8:6c:97:f6:2e:8c:cc:bb:16:b6:c2:3d:44: 19:b4:ad:9d:86:4a:5d:5f:31:26:27:4c:e1:74:00:46: 83:73:a1:7e:77:88:ad:e0:88:94:ef:85:05:8c:7b:bd: 5d:0e:68:84:96:3b:b9:1f:54:ad:e4:5e:14:a2:3c:bb: 8d:4e:b2:01:5e:36:bd:8f:04:3b:81:c0:e6:8e:d2:63: 34:13:50:71:b8:c9:24:e1:3c:53:5c:2e:37:b9:72:8d: b9:52:fa:af:02:51:47:ed:37:1b:6f:bd:62:3f:34:48: 17:5c:cb:c2:fa:5d:05:4e:5b:9d:d9:d8:56:33:b4:9a: b6:45:f3:f3:2c:77:df:23:ff:1d:fc:2a:43:78:4e:61: 22:d5:31:0f:d8:71:a1:d1:39:e2:67:cd:74:2c:7e:54: 61:a7:71:8d:f6:13:bb:36:d6:04:41:d3:10:08:1a:f9: 2d:6e:61:b0:69:66:e8:fc:20:b8:42:4a:80:9b:73:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:e0:86:88:5f:0b:59:57:b8:e3:66:cf:d2:60:be:28: 13:ff:81:6d:e4:87:37:4a:6f:e4:27:39:4b:a9:15:86: 5c:68:8a:17:32:c5:f1:c0:21:32:7b:2b:5f:fd:39:fe: 26:64:a8:eb:28:75:56:57:c9:a8:f2:94:67:dc:2b:a3: 46:7e:e9:b9:68:19:93:d9:70:1d:76:4d:14:1a:44:2b: 6a:8b:8c:8b:79:58:f7:0e:0b:18:c2:eb:3a:53:e0:82: 0b:93:cd:57:bf:dc:c1:60:a1:65:1d:3e:0e:c0:b1:14: d6:b2:80:73:c6:7c:0f:6c:0c:14:31:3c:66:2b:89:e9: 09:23:5e:68:43:0e:b7:c2:30:fe:f3:d4:b2:0c:4d:69: 1a:97:a1:12:4b:9d:e9:5c:3f:d7:2e:83:38:4d:5f:1d: 9f:ed:5d:5a:74:2d:a2:cc:0c:a3:63:69:5b:7a:33:b9: f3:f8:14:b1:2a:03:3c:90:be:85:f5:2b:06:7f:48:28: 6e:0a:00:fd:5e:9d:f9:78:35:b8:68:f9:b2:a1:9e:13: 4c:54:44:51:05:83:d8:91:2f:e7:4c:d1:7d:3a:48:bb: ac:ad:8f:7e:c4:a3:ab:0d:bb:ce:34:d0:d8:fc:c7:5a: 4e:e2:5d:6e:aa:33:38:73:b8:77:11:6e:67:ab:a4:82 Fingerprint (SHA-256): A6:C1:4B:E0:2B:A5:A1:CF:47:39:43:4D:2E:33:7C:04:96:73:B5:1F:3C:86:0F:68:ED:DB:F3:96:D2:40:8F:7D Fingerprint (SHA1): 59:B9:B2:1D:7C:6D:A1:81:81:F3:E3:88:63:4D:D1:0D:1D:EC:91:51 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3393: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3394: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3395: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3396: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153357 (0x13bcffcd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 15:44:58 2017 Not After : Thu Mar 31 15:44:58 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:f4:50:22:f4:b4:4b:79:73:d3:01:87:68:32:7a:25: d0:ff:38:44:34:fe:3d:af:03:4f:6a:4e:00:47:d9:ac: 13:7a:b2:94:3e:3f:be:a4:a6:18:bc:d4:fc:a4:49:4c: b5:15:2d:9b:85:3f:3f:b8:da:ee:6e:26:02:3a:73:d1: 93:f7:01:c8:6c:97:f6:2e:8c:cc:bb:16:b6:c2:3d:44: 19:b4:ad:9d:86:4a:5d:5f:31:26:27:4c:e1:74:00:46: 83:73:a1:7e:77:88:ad:e0:88:94:ef:85:05:8c:7b:bd: 5d:0e:68:84:96:3b:b9:1f:54:ad:e4:5e:14:a2:3c:bb: 8d:4e:b2:01:5e:36:bd:8f:04:3b:81:c0:e6:8e:d2:63: 34:13:50:71:b8:c9:24:e1:3c:53:5c:2e:37:b9:72:8d: b9:52:fa:af:02:51:47:ed:37:1b:6f:bd:62:3f:34:48: 17:5c:cb:c2:fa:5d:05:4e:5b:9d:d9:d8:56:33:b4:9a: b6:45:f3:f3:2c:77:df:23:ff:1d:fc:2a:43:78:4e:61: 22:d5:31:0f:d8:71:a1:d1:39:e2:67:cd:74:2c:7e:54: 61:a7:71:8d:f6:13:bb:36:d6:04:41:d3:10:08:1a:f9: 2d:6e:61:b0:69:66:e8:fc:20:b8:42:4a:80:9b:73:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:e0:86:88:5f:0b:59:57:b8:e3:66:cf:d2:60:be:28: 13:ff:81:6d:e4:87:37:4a:6f:e4:27:39:4b:a9:15:86: 5c:68:8a:17:32:c5:f1:c0:21:32:7b:2b:5f:fd:39:fe: 26:64:a8:eb:28:75:56:57:c9:a8:f2:94:67:dc:2b:a3: 46:7e:e9:b9:68:19:93:d9:70:1d:76:4d:14:1a:44:2b: 6a:8b:8c:8b:79:58:f7:0e:0b:18:c2:eb:3a:53:e0:82: 0b:93:cd:57:bf:dc:c1:60:a1:65:1d:3e:0e:c0:b1:14: d6:b2:80:73:c6:7c:0f:6c:0c:14:31:3c:66:2b:89:e9: 09:23:5e:68:43:0e:b7:c2:30:fe:f3:d4:b2:0c:4d:69: 1a:97:a1:12:4b:9d:e9:5c:3f:d7:2e:83:38:4d:5f:1d: 9f:ed:5d:5a:74:2d:a2:cc:0c:a3:63:69:5b:7a:33:b9: f3:f8:14:b1:2a:03:3c:90:be:85:f5:2b:06:7f:48:28: 6e:0a:00:fd:5e:9d:f9:78:35:b8:68:f9:b2:a1:9e:13: 4c:54:44:51:05:83:d8:91:2f:e7:4c:d1:7d:3a:48:bb: ac:ad:8f:7e:c4:a3:ab:0d:bb:ce:34:d0:d8:fc:c7:5a: 4e:e2:5d:6e:aa:33:38:73:b8:77:11:6e:67:ab:a4:82 Fingerprint (SHA-256): A6:C1:4B:E0:2B:A5:A1:CF:47:39:43:4D:2E:33:7C:04:96:73:B5:1F:3C:86:0F:68:ED:DB:F3:96:D2:40:8F:7D Fingerprint (SHA1): 59:B9:B2:1D:7C:6D:A1:81:81:F3:E3:88:63:4D:D1:0D:1D:EC:91:51 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3397: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3398: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3399: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3400: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153357 (0x13bcffcd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 15:44:58 2017 Not After : Thu Mar 31 15:44:58 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:f4:50:22:f4:b4:4b:79:73:d3:01:87:68:32:7a:25: d0:ff:38:44:34:fe:3d:af:03:4f:6a:4e:00:47:d9:ac: 13:7a:b2:94:3e:3f:be:a4:a6:18:bc:d4:fc:a4:49:4c: b5:15:2d:9b:85:3f:3f:b8:da:ee:6e:26:02:3a:73:d1: 93:f7:01:c8:6c:97:f6:2e:8c:cc:bb:16:b6:c2:3d:44: 19:b4:ad:9d:86:4a:5d:5f:31:26:27:4c:e1:74:00:46: 83:73:a1:7e:77:88:ad:e0:88:94:ef:85:05:8c:7b:bd: 5d:0e:68:84:96:3b:b9:1f:54:ad:e4:5e:14:a2:3c:bb: 8d:4e:b2:01:5e:36:bd:8f:04:3b:81:c0:e6:8e:d2:63: 34:13:50:71:b8:c9:24:e1:3c:53:5c:2e:37:b9:72:8d: b9:52:fa:af:02:51:47:ed:37:1b:6f:bd:62:3f:34:48: 17:5c:cb:c2:fa:5d:05:4e:5b:9d:d9:d8:56:33:b4:9a: b6:45:f3:f3:2c:77:df:23:ff:1d:fc:2a:43:78:4e:61: 22:d5:31:0f:d8:71:a1:d1:39:e2:67:cd:74:2c:7e:54: 61:a7:71:8d:f6:13:bb:36:d6:04:41:d3:10:08:1a:f9: 2d:6e:61:b0:69:66:e8:fc:20:b8:42:4a:80:9b:73:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:e0:86:88:5f:0b:59:57:b8:e3:66:cf:d2:60:be:28: 13:ff:81:6d:e4:87:37:4a:6f:e4:27:39:4b:a9:15:86: 5c:68:8a:17:32:c5:f1:c0:21:32:7b:2b:5f:fd:39:fe: 26:64:a8:eb:28:75:56:57:c9:a8:f2:94:67:dc:2b:a3: 46:7e:e9:b9:68:19:93:d9:70:1d:76:4d:14:1a:44:2b: 6a:8b:8c:8b:79:58:f7:0e:0b:18:c2:eb:3a:53:e0:82: 0b:93:cd:57:bf:dc:c1:60:a1:65:1d:3e:0e:c0:b1:14: d6:b2:80:73:c6:7c:0f:6c:0c:14:31:3c:66:2b:89:e9: 09:23:5e:68:43:0e:b7:c2:30:fe:f3:d4:b2:0c:4d:69: 1a:97:a1:12:4b:9d:e9:5c:3f:d7:2e:83:38:4d:5f:1d: 9f:ed:5d:5a:74:2d:a2:cc:0c:a3:63:69:5b:7a:33:b9: f3:f8:14:b1:2a:03:3c:90:be:85:f5:2b:06:7f:48:28: 6e:0a:00:fd:5e:9d:f9:78:35:b8:68:f9:b2:a1:9e:13: 4c:54:44:51:05:83:d8:91:2f:e7:4c:d1:7d:3a:48:bb: ac:ad:8f:7e:c4:a3:ab:0d:bb:ce:34:d0:d8:fc:c7:5a: 4e:e2:5d:6e:aa:33:38:73:b8:77:11:6e:67:ab:a4:82 Fingerprint (SHA-256): A6:C1:4B:E0:2B:A5:A1:CF:47:39:43:4D:2E:33:7C:04:96:73:B5:1F:3C:86:0F:68:ED:DB:F3:96:D2:40:8F:7D Fingerprint (SHA1): 59:B9:B2:1D:7C:6D:A1:81:81:F3:E3:88:63:4D:D1:0D:1D:EC:91:51 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3401: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153357 (0x13bcffcd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 15:44:58 2017 Not After : Thu Mar 31 15:44:58 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:f4:50:22:f4:b4:4b:79:73:d3:01:87:68:32:7a:25: d0:ff:38:44:34:fe:3d:af:03:4f:6a:4e:00:47:d9:ac: 13:7a:b2:94:3e:3f:be:a4:a6:18:bc:d4:fc:a4:49:4c: b5:15:2d:9b:85:3f:3f:b8:da:ee:6e:26:02:3a:73:d1: 93:f7:01:c8:6c:97:f6:2e:8c:cc:bb:16:b6:c2:3d:44: 19:b4:ad:9d:86:4a:5d:5f:31:26:27:4c:e1:74:00:46: 83:73:a1:7e:77:88:ad:e0:88:94:ef:85:05:8c:7b:bd: 5d:0e:68:84:96:3b:b9:1f:54:ad:e4:5e:14:a2:3c:bb: 8d:4e:b2:01:5e:36:bd:8f:04:3b:81:c0:e6:8e:d2:63: 34:13:50:71:b8:c9:24:e1:3c:53:5c:2e:37:b9:72:8d: b9:52:fa:af:02:51:47:ed:37:1b:6f:bd:62:3f:34:48: 17:5c:cb:c2:fa:5d:05:4e:5b:9d:d9:d8:56:33:b4:9a: b6:45:f3:f3:2c:77:df:23:ff:1d:fc:2a:43:78:4e:61: 22:d5:31:0f:d8:71:a1:d1:39:e2:67:cd:74:2c:7e:54: 61:a7:71:8d:f6:13:bb:36:d6:04:41:d3:10:08:1a:f9: 2d:6e:61:b0:69:66:e8:fc:20:b8:42:4a:80:9b:73:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:e0:86:88:5f:0b:59:57:b8:e3:66:cf:d2:60:be:28: 13:ff:81:6d:e4:87:37:4a:6f:e4:27:39:4b:a9:15:86: 5c:68:8a:17:32:c5:f1:c0:21:32:7b:2b:5f:fd:39:fe: 26:64:a8:eb:28:75:56:57:c9:a8:f2:94:67:dc:2b:a3: 46:7e:e9:b9:68:19:93:d9:70:1d:76:4d:14:1a:44:2b: 6a:8b:8c:8b:79:58:f7:0e:0b:18:c2:eb:3a:53:e0:82: 0b:93:cd:57:bf:dc:c1:60:a1:65:1d:3e:0e:c0:b1:14: d6:b2:80:73:c6:7c:0f:6c:0c:14:31:3c:66:2b:89:e9: 09:23:5e:68:43:0e:b7:c2:30:fe:f3:d4:b2:0c:4d:69: 1a:97:a1:12:4b:9d:e9:5c:3f:d7:2e:83:38:4d:5f:1d: 9f:ed:5d:5a:74:2d:a2:cc:0c:a3:63:69:5b:7a:33:b9: f3:f8:14:b1:2a:03:3c:90:be:85:f5:2b:06:7f:48:28: 6e:0a:00:fd:5e:9d:f9:78:35:b8:68:f9:b2:a1:9e:13: 4c:54:44:51:05:83:d8:91:2f:e7:4c:d1:7d:3a:48:bb: ac:ad:8f:7e:c4:a3:ab:0d:bb:ce:34:d0:d8:fc:c7:5a: 4e:e2:5d:6e:aa:33:38:73:b8:77:11:6e:67:ab:a4:82 Fingerprint (SHA-256): A6:C1:4B:E0:2B:A5:A1:CF:47:39:43:4D:2E:33:7C:04:96:73:B5:1F:3C:86:0F:68:ED:DB:F3:96:D2:40:8F:7D Fingerprint (SHA1): 59:B9:B2:1D:7C:6D:A1:81:81:F3:E3:88:63:4D:D1:0D:1D:EC:91:51 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3402: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3403: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153357 (0x13bcffcd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 15:44:58 2017 Not After : Thu Mar 31 15:44:58 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:f4:50:22:f4:b4:4b:79:73:d3:01:87:68:32:7a:25: d0:ff:38:44:34:fe:3d:af:03:4f:6a:4e:00:47:d9:ac: 13:7a:b2:94:3e:3f:be:a4:a6:18:bc:d4:fc:a4:49:4c: b5:15:2d:9b:85:3f:3f:b8:da:ee:6e:26:02:3a:73:d1: 93:f7:01:c8:6c:97:f6:2e:8c:cc:bb:16:b6:c2:3d:44: 19:b4:ad:9d:86:4a:5d:5f:31:26:27:4c:e1:74:00:46: 83:73:a1:7e:77:88:ad:e0:88:94:ef:85:05:8c:7b:bd: 5d:0e:68:84:96:3b:b9:1f:54:ad:e4:5e:14:a2:3c:bb: 8d:4e:b2:01:5e:36:bd:8f:04:3b:81:c0:e6:8e:d2:63: 34:13:50:71:b8:c9:24:e1:3c:53:5c:2e:37:b9:72:8d: b9:52:fa:af:02:51:47:ed:37:1b:6f:bd:62:3f:34:48: 17:5c:cb:c2:fa:5d:05:4e:5b:9d:d9:d8:56:33:b4:9a: b6:45:f3:f3:2c:77:df:23:ff:1d:fc:2a:43:78:4e:61: 22:d5:31:0f:d8:71:a1:d1:39:e2:67:cd:74:2c:7e:54: 61:a7:71:8d:f6:13:bb:36:d6:04:41:d3:10:08:1a:f9: 2d:6e:61:b0:69:66:e8:fc:20:b8:42:4a:80:9b:73:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:e0:86:88:5f:0b:59:57:b8:e3:66:cf:d2:60:be:28: 13:ff:81:6d:e4:87:37:4a:6f:e4:27:39:4b:a9:15:86: 5c:68:8a:17:32:c5:f1:c0:21:32:7b:2b:5f:fd:39:fe: 26:64:a8:eb:28:75:56:57:c9:a8:f2:94:67:dc:2b:a3: 46:7e:e9:b9:68:19:93:d9:70:1d:76:4d:14:1a:44:2b: 6a:8b:8c:8b:79:58:f7:0e:0b:18:c2:eb:3a:53:e0:82: 0b:93:cd:57:bf:dc:c1:60:a1:65:1d:3e:0e:c0:b1:14: d6:b2:80:73:c6:7c:0f:6c:0c:14:31:3c:66:2b:89:e9: 09:23:5e:68:43:0e:b7:c2:30:fe:f3:d4:b2:0c:4d:69: 1a:97:a1:12:4b:9d:e9:5c:3f:d7:2e:83:38:4d:5f:1d: 9f:ed:5d:5a:74:2d:a2:cc:0c:a3:63:69:5b:7a:33:b9: f3:f8:14:b1:2a:03:3c:90:be:85:f5:2b:06:7f:48:28: 6e:0a:00:fd:5e:9d:f9:78:35:b8:68:f9:b2:a1:9e:13: 4c:54:44:51:05:83:d8:91:2f:e7:4c:d1:7d:3a:48:bb: ac:ad:8f:7e:c4:a3:ab:0d:bb:ce:34:d0:d8:fc:c7:5a: 4e:e2:5d:6e:aa:33:38:73:b8:77:11:6e:67:ab:a4:82 Fingerprint (SHA-256): A6:C1:4B:E0:2B:A5:A1:CF:47:39:43:4D:2E:33:7C:04:96:73:B5:1F:3C:86:0F:68:ED:DB:F3:96:D2:40:8F:7D Fingerprint (SHA1): 59:B9:B2:1D:7C:6D:A1:81:81:F3:E3:88:63:4D:D1:0D:1D:EC:91:51 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3404: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3405: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3406: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3407: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153357 (0x13bcffcd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 15:44:58 2017 Not After : Thu Mar 31 15:44:58 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:f4:50:22:f4:b4:4b:79:73:d3:01:87:68:32:7a:25: d0:ff:38:44:34:fe:3d:af:03:4f:6a:4e:00:47:d9:ac: 13:7a:b2:94:3e:3f:be:a4:a6:18:bc:d4:fc:a4:49:4c: b5:15:2d:9b:85:3f:3f:b8:da:ee:6e:26:02:3a:73:d1: 93:f7:01:c8:6c:97:f6:2e:8c:cc:bb:16:b6:c2:3d:44: 19:b4:ad:9d:86:4a:5d:5f:31:26:27:4c:e1:74:00:46: 83:73:a1:7e:77:88:ad:e0:88:94:ef:85:05:8c:7b:bd: 5d:0e:68:84:96:3b:b9:1f:54:ad:e4:5e:14:a2:3c:bb: 8d:4e:b2:01:5e:36:bd:8f:04:3b:81:c0:e6:8e:d2:63: 34:13:50:71:b8:c9:24:e1:3c:53:5c:2e:37:b9:72:8d: b9:52:fa:af:02:51:47:ed:37:1b:6f:bd:62:3f:34:48: 17:5c:cb:c2:fa:5d:05:4e:5b:9d:d9:d8:56:33:b4:9a: b6:45:f3:f3:2c:77:df:23:ff:1d:fc:2a:43:78:4e:61: 22:d5:31:0f:d8:71:a1:d1:39:e2:67:cd:74:2c:7e:54: 61:a7:71:8d:f6:13:bb:36:d6:04:41:d3:10:08:1a:f9: 2d:6e:61:b0:69:66:e8:fc:20:b8:42:4a:80:9b:73:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:e0:86:88:5f:0b:59:57:b8:e3:66:cf:d2:60:be:28: 13:ff:81:6d:e4:87:37:4a:6f:e4:27:39:4b:a9:15:86: 5c:68:8a:17:32:c5:f1:c0:21:32:7b:2b:5f:fd:39:fe: 26:64:a8:eb:28:75:56:57:c9:a8:f2:94:67:dc:2b:a3: 46:7e:e9:b9:68:19:93:d9:70:1d:76:4d:14:1a:44:2b: 6a:8b:8c:8b:79:58:f7:0e:0b:18:c2:eb:3a:53:e0:82: 0b:93:cd:57:bf:dc:c1:60:a1:65:1d:3e:0e:c0:b1:14: d6:b2:80:73:c6:7c:0f:6c:0c:14:31:3c:66:2b:89:e9: 09:23:5e:68:43:0e:b7:c2:30:fe:f3:d4:b2:0c:4d:69: 1a:97:a1:12:4b:9d:e9:5c:3f:d7:2e:83:38:4d:5f:1d: 9f:ed:5d:5a:74:2d:a2:cc:0c:a3:63:69:5b:7a:33:b9: f3:f8:14:b1:2a:03:3c:90:be:85:f5:2b:06:7f:48:28: 6e:0a:00:fd:5e:9d:f9:78:35:b8:68:f9:b2:a1:9e:13: 4c:54:44:51:05:83:d8:91:2f:e7:4c:d1:7d:3a:48:bb: ac:ad:8f:7e:c4:a3:ab:0d:bb:ce:34:d0:d8:fc:c7:5a: 4e:e2:5d:6e:aa:33:38:73:b8:77:11:6e:67:ab:a4:82 Fingerprint (SHA-256): A6:C1:4B:E0:2B:A5:A1:CF:47:39:43:4D:2E:33:7C:04:96:73:B5:1F:3C:86:0F:68:ED:DB:F3:96:D2:40:8F:7D Fingerprint (SHA1): 59:B9:B2:1D:7C:6D:A1:81:81:F3:E3:88:63:4D:D1:0D:1D:EC:91:51 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3408: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153357 (0x13bcffcd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 15:44:58 2017 Not After : Thu Mar 31 15:44:58 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:f4:50:22:f4:b4:4b:79:73:d3:01:87:68:32:7a:25: d0:ff:38:44:34:fe:3d:af:03:4f:6a:4e:00:47:d9:ac: 13:7a:b2:94:3e:3f:be:a4:a6:18:bc:d4:fc:a4:49:4c: b5:15:2d:9b:85:3f:3f:b8:da:ee:6e:26:02:3a:73:d1: 93:f7:01:c8:6c:97:f6:2e:8c:cc:bb:16:b6:c2:3d:44: 19:b4:ad:9d:86:4a:5d:5f:31:26:27:4c:e1:74:00:46: 83:73:a1:7e:77:88:ad:e0:88:94:ef:85:05:8c:7b:bd: 5d:0e:68:84:96:3b:b9:1f:54:ad:e4:5e:14:a2:3c:bb: 8d:4e:b2:01:5e:36:bd:8f:04:3b:81:c0:e6:8e:d2:63: 34:13:50:71:b8:c9:24:e1:3c:53:5c:2e:37:b9:72:8d: b9:52:fa:af:02:51:47:ed:37:1b:6f:bd:62:3f:34:48: 17:5c:cb:c2:fa:5d:05:4e:5b:9d:d9:d8:56:33:b4:9a: b6:45:f3:f3:2c:77:df:23:ff:1d:fc:2a:43:78:4e:61: 22:d5:31:0f:d8:71:a1:d1:39:e2:67:cd:74:2c:7e:54: 61:a7:71:8d:f6:13:bb:36:d6:04:41:d3:10:08:1a:f9: 2d:6e:61:b0:69:66:e8:fc:20:b8:42:4a:80:9b:73:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:e0:86:88:5f:0b:59:57:b8:e3:66:cf:d2:60:be:28: 13:ff:81:6d:e4:87:37:4a:6f:e4:27:39:4b:a9:15:86: 5c:68:8a:17:32:c5:f1:c0:21:32:7b:2b:5f:fd:39:fe: 26:64:a8:eb:28:75:56:57:c9:a8:f2:94:67:dc:2b:a3: 46:7e:e9:b9:68:19:93:d9:70:1d:76:4d:14:1a:44:2b: 6a:8b:8c:8b:79:58:f7:0e:0b:18:c2:eb:3a:53:e0:82: 0b:93:cd:57:bf:dc:c1:60:a1:65:1d:3e:0e:c0:b1:14: d6:b2:80:73:c6:7c:0f:6c:0c:14:31:3c:66:2b:89:e9: 09:23:5e:68:43:0e:b7:c2:30:fe:f3:d4:b2:0c:4d:69: 1a:97:a1:12:4b:9d:e9:5c:3f:d7:2e:83:38:4d:5f:1d: 9f:ed:5d:5a:74:2d:a2:cc:0c:a3:63:69:5b:7a:33:b9: f3:f8:14:b1:2a:03:3c:90:be:85:f5:2b:06:7f:48:28: 6e:0a:00:fd:5e:9d:f9:78:35:b8:68:f9:b2:a1:9e:13: 4c:54:44:51:05:83:d8:91:2f:e7:4c:d1:7d:3a:48:bb: ac:ad:8f:7e:c4:a3:ab:0d:bb:ce:34:d0:d8:fc:c7:5a: 4e:e2:5d:6e:aa:33:38:73:b8:77:11:6e:67:ab:a4:82 Fingerprint (SHA-256): A6:C1:4B:E0:2B:A5:A1:CF:47:39:43:4D:2E:33:7C:04:96:73:B5:1F:3C:86:0F:68:ED:DB:F3:96:D2:40:8F:7D Fingerprint (SHA1): 59:B9:B2:1D:7C:6D:A1:81:81:F3:E3:88:63:4D:D1:0D:1D:EC:91:51 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3409: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153357 (0x13bcffcd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 15:44:58 2017 Not After : Thu Mar 31 15:44:58 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:f4:50:22:f4:b4:4b:79:73:d3:01:87:68:32:7a:25: d0:ff:38:44:34:fe:3d:af:03:4f:6a:4e:00:47:d9:ac: 13:7a:b2:94:3e:3f:be:a4:a6:18:bc:d4:fc:a4:49:4c: b5:15:2d:9b:85:3f:3f:b8:da:ee:6e:26:02:3a:73:d1: 93:f7:01:c8:6c:97:f6:2e:8c:cc:bb:16:b6:c2:3d:44: 19:b4:ad:9d:86:4a:5d:5f:31:26:27:4c:e1:74:00:46: 83:73:a1:7e:77:88:ad:e0:88:94:ef:85:05:8c:7b:bd: 5d:0e:68:84:96:3b:b9:1f:54:ad:e4:5e:14:a2:3c:bb: 8d:4e:b2:01:5e:36:bd:8f:04:3b:81:c0:e6:8e:d2:63: 34:13:50:71:b8:c9:24:e1:3c:53:5c:2e:37:b9:72:8d: b9:52:fa:af:02:51:47:ed:37:1b:6f:bd:62:3f:34:48: 17:5c:cb:c2:fa:5d:05:4e:5b:9d:d9:d8:56:33:b4:9a: b6:45:f3:f3:2c:77:df:23:ff:1d:fc:2a:43:78:4e:61: 22:d5:31:0f:d8:71:a1:d1:39:e2:67:cd:74:2c:7e:54: 61:a7:71:8d:f6:13:bb:36:d6:04:41:d3:10:08:1a:f9: 2d:6e:61:b0:69:66:e8:fc:20:b8:42:4a:80:9b:73:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:e0:86:88:5f:0b:59:57:b8:e3:66:cf:d2:60:be:28: 13:ff:81:6d:e4:87:37:4a:6f:e4:27:39:4b:a9:15:86: 5c:68:8a:17:32:c5:f1:c0:21:32:7b:2b:5f:fd:39:fe: 26:64:a8:eb:28:75:56:57:c9:a8:f2:94:67:dc:2b:a3: 46:7e:e9:b9:68:19:93:d9:70:1d:76:4d:14:1a:44:2b: 6a:8b:8c:8b:79:58:f7:0e:0b:18:c2:eb:3a:53:e0:82: 0b:93:cd:57:bf:dc:c1:60:a1:65:1d:3e:0e:c0:b1:14: d6:b2:80:73:c6:7c:0f:6c:0c:14:31:3c:66:2b:89:e9: 09:23:5e:68:43:0e:b7:c2:30:fe:f3:d4:b2:0c:4d:69: 1a:97:a1:12:4b:9d:e9:5c:3f:d7:2e:83:38:4d:5f:1d: 9f:ed:5d:5a:74:2d:a2:cc:0c:a3:63:69:5b:7a:33:b9: f3:f8:14:b1:2a:03:3c:90:be:85:f5:2b:06:7f:48:28: 6e:0a:00:fd:5e:9d:f9:78:35:b8:68:f9:b2:a1:9e:13: 4c:54:44:51:05:83:d8:91:2f:e7:4c:d1:7d:3a:48:bb: ac:ad:8f:7e:c4:a3:ab:0d:bb:ce:34:d0:d8:fc:c7:5a: 4e:e2:5d:6e:aa:33:38:73:b8:77:11:6e:67:ab:a4:82 Fingerprint (SHA-256): A6:C1:4B:E0:2B:A5:A1:CF:47:39:43:4D:2E:33:7C:04:96:73:B5:1F:3C:86:0F:68:ED:DB:F3:96:D2:40:8F:7D Fingerprint (SHA1): 59:B9:B2:1D:7C:6D:A1:81:81:F3:E3:88:63:4D:D1:0D:1D:EC:91:51 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3410: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153357 (0x13bcffcd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 15:44:58 2017 Not After : Thu Mar 31 15:44:58 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:f4:50:22:f4:b4:4b:79:73:d3:01:87:68:32:7a:25: d0:ff:38:44:34:fe:3d:af:03:4f:6a:4e:00:47:d9:ac: 13:7a:b2:94:3e:3f:be:a4:a6:18:bc:d4:fc:a4:49:4c: b5:15:2d:9b:85:3f:3f:b8:da:ee:6e:26:02:3a:73:d1: 93:f7:01:c8:6c:97:f6:2e:8c:cc:bb:16:b6:c2:3d:44: 19:b4:ad:9d:86:4a:5d:5f:31:26:27:4c:e1:74:00:46: 83:73:a1:7e:77:88:ad:e0:88:94:ef:85:05:8c:7b:bd: 5d:0e:68:84:96:3b:b9:1f:54:ad:e4:5e:14:a2:3c:bb: 8d:4e:b2:01:5e:36:bd:8f:04:3b:81:c0:e6:8e:d2:63: 34:13:50:71:b8:c9:24:e1:3c:53:5c:2e:37:b9:72:8d: b9:52:fa:af:02:51:47:ed:37:1b:6f:bd:62:3f:34:48: 17:5c:cb:c2:fa:5d:05:4e:5b:9d:d9:d8:56:33:b4:9a: b6:45:f3:f3:2c:77:df:23:ff:1d:fc:2a:43:78:4e:61: 22:d5:31:0f:d8:71:a1:d1:39:e2:67:cd:74:2c:7e:54: 61:a7:71:8d:f6:13:bb:36:d6:04:41:d3:10:08:1a:f9: 2d:6e:61:b0:69:66:e8:fc:20:b8:42:4a:80:9b:73:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:e0:86:88:5f:0b:59:57:b8:e3:66:cf:d2:60:be:28: 13:ff:81:6d:e4:87:37:4a:6f:e4:27:39:4b:a9:15:86: 5c:68:8a:17:32:c5:f1:c0:21:32:7b:2b:5f:fd:39:fe: 26:64:a8:eb:28:75:56:57:c9:a8:f2:94:67:dc:2b:a3: 46:7e:e9:b9:68:19:93:d9:70:1d:76:4d:14:1a:44:2b: 6a:8b:8c:8b:79:58:f7:0e:0b:18:c2:eb:3a:53:e0:82: 0b:93:cd:57:bf:dc:c1:60:a1:65:1d:3e:0e:c0:b1:14: d6:b2:80:73:c6:7c:0f:6c:0c:14:31:3c:66:2b:89:e9: 09:23:5e:68:43:0e:b7:c2:30:fe:f3:d4:b2:0c:4d:69: 1a:97:a1:12:4b:9d:e9:5c:3f:d7:2e:83:38:4d:5f:1d: 9f:ed:5d:5a:74:2d:a2:cc:0c:a3:63:69:5b:7a:33:b9: f3:f8:14:b1:2a:03:3c:90:be:85:f5:2b:06:7f:48:28: 6e:0a:00:fd:5e:9d:f9:78:35:b8:68:f9:b2:a1:9e:13: 4c:54:44:51:05:83:d8:91:2f:e7:4c:d1:7d:3a:48:bb: ac:ad:8f:7e:c4:a3:ab:0d:bb:ce:34:d0:d8:fc:c7:5a: 4e:e2:5d:6e:aa:33:38:73:b8:77:11:6e:67:ab:a4:82 Fingerprint (SHA-256): A6:C1:4B:E0:2B:A5:A1:CF:47:39:43:4D:2E:33:7C:04:96:73:B5:1F:3C:86:0F:68:ED:DB:F3:96:D2:40:8F:7D Fingerprint (SHA1): 59:B9:B2:1D:7C:6D:A1:81:81:F3:E3:88:63:4D:D1:0D:1D:EC:91:51 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3411: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153357 (0x13bcffcd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 15:44:58 2017 Not After : Thu Mar 31 15:44:58 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:f4:50:22:f4:b4:4b:79:73:d3:01:87:68:32:7a:25: d0:ff:38:44:34:fe:3d:af:03:4f:6a:4e:00:47:d9:ac: 13:7a:b2:94:3e:3f:be:a4:a6:18:bc:d4:fc:a4:49:4c: b5:15:2d:9b:85:3f:3f:b8:da:ee:6e:26:02:3a:73:d1: 93:f7:01:c8:6c:97:f6:2e:8c:cc:bb:16:b6:c2:3d:44: 19:b4:ad:9d:86:4a:5d:5f:31:26:27:4c:e1:74:00:46: 83:73:a1:7e:77:88:ad:e0:88:94:ef:85:05:8c:7b:bd: 5d:0e:68:84:96:3b:b9:1f:54:ad:e4:5e:14:a2:3c:bb: 8d:4e:b2:01:5e:36:bd:8f:04:3b:81:c0:e6:8e:d2:63: 34:13:50:71:b8:c9:24:e1:3c:53:5c:2e:37:b9:72:8d: b9:52:fa:af:02:51:47:ed:37:1b:6f:bd:62:3f:34:48: 17:5c:cb:c2:fa:5d:05:4e:5b:9d:d9:d8:56:33:b4:9a: b6:45:f3:f3:2c:77:df:23:ff:1d:fc:2a:43:78:4e:61: 22:d5:31:0f:d8:71:a1:d1:39:e2:67:cd:74:2c:7e:54: 61:a7:71:8d:f6:13:bb:36:d6:04:41:d3:10:08:1a:f9: 2d:6e:61:b0:69:66:e8:fc:20:b8:42:4a:80:9b:73:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:e0:86:88:5f:0b:59:57:b8:e3:66:cf:d2:60:be:28: 13:ff:81:6d:e4:87:37:4a:6f:e4:27:39:4b:a9:15:86: 5c:68:8a:17:32:c5:f1:c0:21:32:7b:2b:5f:fd:39:fe: 26:64:a8:eb:28:75:56:57:c9:a8:f2:94:67:dc:2b:a3: 46:7e:e9:b9:68:19:93:d9:70:1d:76:4d:14:1a:44:2b: 6a:8b:8c:8b:79:58:f7:0e:0b:18:c2:eb:3a:53:e0:82: 0b:93:cd:57:bf:dc:c1:60:a1:65:1d:3e:0e:c0:b1:14: d6:b2:80:73:c6:7c:0f:6c:0c:14:31:3c:66:2b:89:e9: 09:23:5e:68:43:0e:b7:c2:30:fe:f3:d4:b2:0c:4d:69: 1a:97:a1:12:4b:9d:e9:5c:3f:d7:2e:83:38:4d:5f:1d: 9f:ed:5d:5a:74:2d:a2:cc:0c:a3:63:69:5b:7a:33:b9: f3:f8:14:b1:2a:03:3c:90:be:85:f5:2b:06:7f:48:28: 6e:0a:00:fd:5e:9d:f9:78:35:b8:68:f9:b2:a1:9e:13: 4c:54:44:51:05:83:d8:91:2f:e7:4c:d1:7d:3a:48:bb: ac:ad:8f:7e:c4:a3:ab:0d:bb:ce:34:d0:d8:fc:c7:5a: 4e:e2:5d:6e:aa:33:38:73:b8:77:11:6e:67:ab:a4:82 Fingerprint (SHA-256): A6:C1:4B:E0:2B:A5:A1:CF:47:39:43:4D:2E:33:7C:04:96:73:B5:1F:3C:86:0F:68:ED:DB:F3:96:D2:40:8F:7D Fingerprint (SHA1): 59:B9:B2:1D:7C:6D:A1:81:81:F3:E3:88:63:4D:D1:0D:1D:EC:91:51 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3412: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153357 (0x13bcffcd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 15:44:58 2017 Not After : Thu Mar 31 15:44:58 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:f4:50:22:f4:b4:4b:79:73:d3:01:87:68:32:7a:25: d0:ff:38:44:34:fe:3d:af:03:4f:6a:4e:00:47:d9:ac: 13:7a:b2:94:3e:3f:be:a4:a6:18:bc:d4:fc:a4:49:4c: b5:15:2d:9b:85:3f:3f:b8:da:ee:6e:26:02:3a:73:d1: 93:f7:01:c8:6c:97:f6:2e:8c:cc:bb:16:b6:c2:3d:44: 19:b4:ad:9d:86:4a:5d:5f:31:26:27:4c:e1:74:00:46: 83:73:a1:7e:77:88:ad:e0:88:94:ef:85:05:8c:7b:bd: 5d:0e:68:84:96:3b:b9:1f:54:ad:e4:5e:14:a2:3c:bb: 8d:4e:b2:01:5e:36:bd:8f:04:3b:81:c0:e6:8e:d2:63: 34:13:50:71:b8:c9:24:e1:3c:53:5c:2e:37:b9:72:8d: b9:52:fa:af:02:51:47:ed:37:1b:6f:bd:62:3f:34:48: 17:5c:cb:c2:fa:5d:05:4e:5b:9d:d9:d8:56:33:b4:9a: b6:45:f3:f3:2c:77:df:23:ff:1d:fc:2a:43:78:4e:61: 22:d5:31:0f:d8:71:a1:d1:39:e2:67:cd:74:2c:7e:54: 61:a7:71:8d:f6:13:bb:36:d6:04:41:d3:10:08:1a:f9: 2d:6e:61:b0:69:66:e8:fc:20:b8:42:4a:80:9b:73:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:e0:86:88:5f:0b:59:57:b8:e3:66:cf:d2:60:be:28: 13:ff:81:6d:e4:87:37:4a:6f:e4:27:39:4b:a9:15:86: 5c:68:8a:17:32:c5:f1:c0:21:32:7b:2b:5f:fd:39:fe: 26:64:a8:eb:28:75:56:57:c9:a8:f2:94:67:dc:2b:a3: 46:7e:e9:b9:68:19:93:d9:70:1d:76:4d:14:1a:44:2b: 6a:8b:8c:8b:79:58:f7:0e:0b:18:c2:eb:3a:53:e0:82: 0b:93:cd:57:bf:dc:c1:60:a1:65:1d:3e:0e:c0:b1:14: d6:b2:80:73:c6:7c:0f:6c:0c:14:31:3c:66:2b:89:e9: 09:23:5e:68:43:0e:b7:c2:30:fe:f3:d4:b2:0c:4d:69: 1a:97:a1:12:4b:9d:e9:5c:3f:d7:2e:83:38:4d:5f:1d: 9f:ed:5d:5a:74:2d:a2:cc:0c:a3:63:69:5b:7a:33:b9: f3:f8:14:b1:2a:03:3c:90:be:85:f5:2b:06:7f:48:28: 6e:0a:00:fd:5e:9d:f9:78:35:b8:68:f9:b2:a1:9e:13: 4c:54:44:51:05:83:d8:91:2f:e7:4c:d1:7d:3a:48:bb: ac:ad:8f:7e:c4:a3:ab:0d:bb:ce:34:d0:d8:fc:c7:5a: 4e:e2:5d:6e:aa:33:38:73:b8:77:11:6e:67:ab:a4:82 Fingerprint (SHA-256): A6:C1:4B:E0:2B:A5:A1:CF:47:39:43:4D:2E:33:7C:04:96:73:B5:1F:3C:86:0F:68:ED:DB:F3:96:D2:40:8F:7D Fingerprint (SHA1): 59:B9:B2:1D:7C:6D:A1:81:81:F3:E3:88:63:4D:D1:0D:1D:EC:91:51 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3413: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3414: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3415: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153387 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3416: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3417: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #3418: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3419: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 331153388 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3420: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3421: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #3422: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3423: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 331153389 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3424: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3425: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #3426: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3427: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 331153390 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3428: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3429: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #3430: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3431: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 331153391 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3432: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3433: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #3434: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3435: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 331153392 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3436: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3437: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #3438: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3439: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 331153393 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3440: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3441: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3442: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153387 (0x13bcffeb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 15:52:02 2017 Not After : Thu Mar 31 15:52:02 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:4a:47:b7:a6:39:1d:36:7d:4e:98:c3:ad:be:e3:af: 54:ee:22:64:8e:e7:15:53:99:40:e5:f5:30:d7:a3:78: 70:d7:80:1e:ae:48:39:19:e1:2f:a2:66:5a:48:54:97: 2c:0a:12:42:b2:5a:8f:9f:a5:d7:29:4e:26:cb:be:42: ca:8c:e5:c2:cd:af:95:8a:9c:ce:4a:9d:4f:ee:37:02: 87:87:00:80:38:c0:0e:f6:ce:ea:7c:e9:09:62:d3:e6: d3:2b:63:9d:ef:d5:08:54:ed:45:33:18:e5:d1:06:c6: 84:ca:c9:c9:c4:c6:7d:dd:f7:3f:b0:1d:91:32:e7:d8: 8b:f9:d8:1f:71:d5:ab:cf:33:87:46:b8:e9:db:2b:52: ae:7e:74:08:d8:29:01:be:20:0d:62:ef:a9:28:14:f1: 49:7e:cb:0a:37:8f:89:27:ac:a5:fc:b5:7a:70:97:5c: 17:ed:95:9d:bc:07:4a:4d:9d:77:a4:5a:15:5e:02:c7: 27:4b:f5:30:b6:0b:66:b6:ec:72:2a:7e:f2:57:e7:78: ba:06:c8:7f:59:74:d3:2b:e7:a9:ef:b9:33:52:cd:02: 2d:a5:e7:13:2e:79:93:0a:f3:5d:bb:65:89:73:bf:1c: b2:91:b6:74:1e:3e:01:3f:52:b3:f8:93:ad:f7:8e:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:6a:1c:4d:bc:2e:61:48:63:e7:fb:d6:18:f1:17:32: 76:00:ec:66:57:66:91:23:18:45:a1:a8:62:f8:5b:19: 23:20:a4:75:0f:2d:e0:4a:cb:35:ed:95:dc:9a:e8:5f: 8b:57:36:85:91:bf:18:64:b3:77:b5:9d:95:5f:b1:f3: 1a:86:42:de:29:df:16:0f:99:28:12:44:c2:12:5e:16: 0d:86:61:a7:f2:8d:2b:d2:93:c0:a8:94:ce:76:1e:45: da:ea:1e:30:3f:da:a5:fe:62:f1:09:5f:a7:38:a4:25: 02:22:bc:07:38:48:36:aa:f5:5d:55:30:0c:d4:ee:63: 0f:88:38:1e:25:a2:dc:9c:15:b8:6e:d1:5b:38:41:52: 12:9f:03:b3:ab:bf:9c:c5:9b:07:db:0e:77:a2:b9:ae: ea:19:55:df:43:96:0b:4b:1e:36:71:a5:2a:3b:09:c3: 58:03:96:ad:6e:ac:69:c0:2c:e2:39:7f:a0:98:c2:14: e8:d9:aa:4f:a0:7b:db:06:74:65:ba:f1:b4:0f:1e:14: ab:e0:ee:9d:11:96:6c:66:93:f7:3e:12:e1:3d:65:c8: 06:38:40:36:65:1b:4a:4b:eb:12:e2:02:64:50:48:9c: 77:1e:f3:83:52:eb:cd:83:55:23:de:70:74:e9:12:da Fingerprint (SHA-256): 72:EC:F1:DF:84:54:92:45:02:6D:4E:79:8E:C7:4A:BF:34:B5:07:D2:06:16:3C:B6:5C:D4:67:1A:48:71:65:EC Fingerprint (SHA1): 39:57:ED:B6:29:E9:D3:3B:14:98:2B:9B:32:87:66:E6:30:E8:2A:5C Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #3443: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3444: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3445: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3446: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153387 (0x13bcffeb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 15:52:02 2017 Not After : Thu Mar 31 15:52:02 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:4a:47:b7:a6:39:1d:36:7d:4e:98:c3:ad:be:e3:af: 54:ee:22:64:8e:e7:15:53:99:40:e5:f5:30:d7:a3:78: 70:d7:80:1e:ae:48:39:19:e1:2f:a2:66:5a:48:54:97: 2c:0a:12:42:b2:5a:8f:9f:a5:d7:29:4e:26:cb:be:42: ca:8c:e5:c2:cd:af:95:8a:9c:ce:4a:9d:4f:ee:37:02: 87:87:00:80:38:c0:0e:f6:ce:ea:7c:e9:09:62:d3:e6: d3:2b:63:9d:ef:d5:08:54:ed:45:33:18:e5:d1:06:c6: 84:ca:c9:c9:c4:c6:7d:dd:f7:3f:b0:1d:91:32:e7:d8: 8b:f9:d8:1f:71:d5:ab:cf:33:87:46:b8:e9:db:2b:52: ae:7e:74:08:d8:29:01:be:20:0d:62:ef:a9:28:14:f1: 49:7e:cb:0a:37:8f:89:27:ac:a5:fc:b5:7a:70:97:5c: 17:ed:95:9d:bc:07:4a:4d:9d:77:a4:5a:15:5e:02:c7: 27:4b:f5:30:b6:0b:66:b6:ec:72:2a:7e:f2:57:e7:78: ba:06:c8:7f:59:74:d3:2b:e7:a9:ef:b9:33:52:cd:02: 2d:a5:e7:13:2e:79:93:0a:f3:5d:bb:65:89:73:bf:1c: b2:91:b6:74:1e:3e:01:3f:52:b3:f8:93:ad:f7:8e:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:6a:1c:4d:bc:2e:61:48:63:e7:fb:d6:18:f1:17:32: 76:00:ec:66:57:66:91:23:18:45:a1:a8:62:f8:5b:19: 23:20:a4:75:0f:2d:e0:4a:cb:35:ed:95:dc:9a:e8:5f: 8b:57:36:85:91:bf:18:64:b3:77:b5:9d:95:5f:b1:f3: 1a:86:42:de:29:df:16:0f:99:28:12:44:c2:12:5e:16: 0d:86:61:a7:f2:8d:2b:d2:93:c0:a8:94:ce:76:1e:45: da:ea:1e:30:3f:da:a5:fe:62:f1:09:5f:a7:38:a4:25: 02:22:bc:07:38:48:36:aa:f5:5d:55:30:0c:d4:ee:63: 0f:88:38:1e:25:a2:dc:9c:15:b8:6e:d1:5b:38:41:52: 12:9f:03:b3:ab:bf:9c:c5:9b:07:db:0e:77:a2:b9:ae: ea:19:55:df:43:96:0b:4b:1e:36:71:a5:2a:3b:09:c3: 58:03:96:ad:6e:ac:69:c0:2c:e2:39:7f:a0:98:c2:14: e8:d9:aa:4f:a0:7b:db:06:74:65:ba:f1:b4:0f:1e:14: ab:e0:ee:9d:11:96:6c:66:93:f7:3e:12:e1:3d:65:c8: 06:38:40:36:65:1b:4a:4b:eb:12:e2:02:64:50:48:9c: 77:1e:f3:83:52:eb:cd:83:55:23:de:70:74:e9:12:da Fingerprint (SHA-256): 72:EC:F1:DF:84:54:92:45:02:6D:4E:79:8E:C7:4A:BF:34:B5:07:D2:06:16:3C:B6:5C:D4:67:1A:48:71:65:EC Fingerprint (SHA1): 39:57:ED:B6:29:E9:D3:3B:14:98:2B:9B:32:87:66:E6:30:E8:2A:5C Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #3447: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3448: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3449: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3450: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153394 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3451: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3452: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3453: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3454: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331153395 --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3455: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3456: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3457: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3458: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331153396 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3459: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3460: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3461: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3462: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 331153397 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3463: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3464: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3465: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3466: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3467: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3468: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153394 (0x13bcfff2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 15:53:48 2017 Not After : Thu Mar 31 15:53:48 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:7a:6a:89:a8:79:80:1f:48:f2:0b:9e:58:6a:34:40: 72:a0:b9:60:f7:27:99:62:48:26:57:79:2c:db:ae:c6: 9f:a5:d9:e9:7f:86:d2:8c:5c:4b:86:59:80:d0:a9:15: ba:1d:d0:90:c3:71:4f:8b:c2:81:78:6f:6a:44:a2:c3: 33:45:2a:cf:52:fb:85:dd:66:f3:2f:5d:0e:95:25:f0: bc:f3:22:ff:7d:7f:53:10:ae:83:9f:67:92:93:4f:ba: 66:a8:13:a7:ad:97:01:c5:63:6b:00:dd:6e:dd:c2:0a: 12:15:df:5f:32:0c:55:61:1a:db:25:93:bf:54:20:61: 9c:0a:b5:42:b3:e6:bc:08:f5:ef:04:4f:61:7b:55:ac: 3b:15:38:b1:1d:21:eb:dc:ec:3d:fd:87:8c:1f:04:7c: d8:73:7f:6e:03:20:17:c3:53:4a:e0:80:7e:e3:32:6a: 18:dc:63:db:c6:fc:7d:b4:e8:dc:95:49:6e:84:9a:7c: 0c:9c:31:ae:f6:d8:37:cf:20:5d:5d:1b:59:26:57:92: 9f:76:da:51:fa:b1:0c:7c:c2:b7:58:90:ec:76:31:25: 87:19:50:1f:8b:61:6d:c5:e4:d2:2c:f3:2d:27:1f:0a: 58:69:eb:ec:33:c6:4c:49:24:9d:95:41:b3:3b:12:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:5f:ac:94:2b:7f:09:63:24:55:33:93:e6:2d:29:7c: 76:a8:99:f3:d7:cd:fc:db:cc:b7:1c:6f:19:cd:14:cf: d7:09:2d:29:02:55:a8:5d:58:32:c9:9b:e8:ac:d1:07: af:aa:d8:e7:cc:78:0a:0d:30:e0:64:7c:e1:ce:f2:0a: c4:21:3b:20:98:12:cf:9a:86:be:40:45:a8:79:4f:a0: 78:98:b2:36:83:dc:8e:45:49:70:8d:1e:32:c7:b4:20: 05:c6:11:8f:cf:af:44:d8:96:e3:10:5e:9d:6d:ec:c8: 17:b0:d6:58:a6:8c:04:b4:36:f2:bd:46:0f:be:eb:ac: 1a:bd:8f:b0:b8:ca:ef:63:e1:22:e8:0a:ed:1e:18:bc: 55:e0:96:7e:ac:04:30:eb:8b:e8:e1:52:9d:f3:c8:8d: 8e:bf:2a:01:e5:7f:5c:b9:7f:b5:9d:da:e7:58:78:96: 32:50:5a:2d:31:b1:2e:68:4f:0a:6f:dc:31:14:ae:e4: 85:25:17:49:3d:06:36:54:b9:5e:f7:d3:8f:de:b1:af: 80:00:9c:af:57:14:8a:94:d7:2f:c6:00:1e:f8:a0:9f: 02:4f:55:51:b9:75:a0:a4:1a:7a:f7:ed:3a:61:e7:78: 44:e7:eb:72:83:a9:06:58:e9:ed:8d:07:aa:c3:ec:44 Fingerprint (SHA-256): 4E:94:0E:D8:D2:EF:47:16:A4:30:3C:46:B9:43:F7:2E:FD:67:E0:13:CD:B4:66:B3:A9:09:22:9D:FD:DA:26:14 Fingerprint (SHA1): 9F:B2:F9:F0:12:D4:7A:63:91:44:22:0E:30:7B:F4:E9:A3:F9:05:89 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3469: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3470: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3471: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153395 (0x13bcfff3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 15:53:53 2017 Not After : Thu Mar 31 15:53:53 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:d0:a3:99:1f:90:14:dc:99:b6:b1:44:af:2d:59:00: 95:29:e1:09:cc:81:85:f4:e4:66:c9:4d:09:ba:51:7f: ce:d1:68:76:b7:83:c8:0d:e6:0f:bb:34:84:c9:40:8e: 21:02:fe:a2:ec:20:bb:0f:a7:bd:7e:a6:66:e1:1f:36: 90:09:24:e6:a0:0e:cb:a8:a9:9a:31:37:34:68:1b:f4: 52:f1:a4:2d:38:b1:d2:be:6e:b3:83:e0:c2:6f:21:77: c7:f4:f3:92:4d:73:bf:fd:9a:32:db:6b:97:3a:5c:eb: 1e:39:8f:cb:13:9b:01:76:4b:7b:0f:2b:fb:a2:11:b0: 75:be:3d:36:19:dd:a7:71:f9:b4:75:30:07:fa:1d:e0: 4b:1a:97:2f:b3:d8:9d:c4:af:79:6e:3f:9b:82:93:d4: 30:70:d0:b4:a5:8e:33:02:62:c2:9e:47:b4:31:f6:71: 16:ba:c6:57:84:86:89:99:2d:40:e0:ff:6b:d2:ea:48: fb:44:51:2c:64:c5:f2:85:87:49:5d:e8:02:bd:a0:37: 5b:5f:77:2c:14:10:b2:04:de:fc:71:18:d9:85:f9:a0: f2:8f:f7:7a:b1:40:c7:a5:8f:31:cf:8e:c2:00:06:bf: 19:89:07:81:bf:d8:58:e0:08:2a:2d:06:db:48:70:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:ca:7d:75:38:ff:c2:9a:99:fb:98:c1:06:60:ec:32: 5b:7e:4b:14:c1:d4:b3:bd:15:2a:82:30:7b:42:f7:d5: 9b:9a:39:1a:da:09:9e:39:a1:61:fa:0b:df:85:57:9d: 72:c9:29:b9:2e:f6:8b:d0:5e:80:e2:5d:e3:cc:3c:64: 7c:55:25:ec:d5:42:68:d5:3a:c6:21:13:63:80:74:e1: 4c:6b:05:ee:0b:f0:b8:11:f2:f5:74:21:0e:2c:2a:63: 3e:5e:e0:bf:8b:bb:c8:b1:14:8f:88:b3:46:27:eb:af: 68:d4:62:4e:87:8d:ad:e9:27:68:ce:2c:ab:14:7e:0d: 5f:19:4a:02:81:6c:e7:f2:02:9d:ee:60:3b:6d:65:6f: 8a:03:1d:f2:97:6b:04:eb:7a:d5:a6:30:9d:c8:8c:4c: 9e:4f:cb:48:f2:b9:8d:22:97:78:9c:e5:9f:c5:79:41: 77:7e:25:42:d1:f8:3b:28:e3:b9:e5:ae:f0:76:a1:73: dd:61:02:6e:46:77:3c:30:74:bb:c3:62:06:9e:2b:7a: 79:5f:60:b8:8a:2d:34:6a:6a:93:fd:e2:14:7c:71:f9: e6:d3:3e:11:e5:e0:df:04:2c:20:db:db:d7:e4:4d:10: ad:bf:1b:1c:db:22:cc:47:25:35:11:b5:06:49:3b:99 Fingerprint (SHA-256): A0:F8:2E:7A:C7:E9:EA:9D:F0:86:38:E7:F6:7C:D4:69:2E:88:A4:3C:F5:8E:DE:6B:9A:29:37:A1:0D:C9:4F:13 Fingerprint (SHA1): 6B:64:86:11:6F:E9:86:D6:DB:9E:9C:55:41:1E:ED:26:C1:B7:83:BE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3472: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3473: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153396 (0x13bcfff4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 15:54:06 2017 Not After : Thu Mar 31 15:54:06 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:9d:57:f1:0c:0e:f1:9e:0c:c4:1c:46:0c:08:76:8e: d6:93:fb:e4:7d:6a:28:30:8c:cd:2f:0c:c6:26:9c:5f: 6b:ef:d7:54:48:5e:ef:57:72:a1:c2:52:f4:44:d6:a8: 80:4f:b1:5f:2d:a0:d4:bf:3c:f0:18:d2:32:3a:e2:43: d5:e6:2b:fd:be:69:da:3e:38:1c:a4:a2:a1:a6:0c:36: 15:f1:1e:7d:24:e2:d0:90:a4:7d:c3:38:17:d6:b4:71: 8a:bb:d8:18:74:93:13:61:7f:32:e4:1b:2d:47:15:2f: 01:cb:22:01:6d:1f:47:37:ad:07:b6:a6:ff:87:ec:e1: 88:9d:11:b2:cd:bd:48:6c:93:73:e6:26:5d:b6:de:be: 99:8f:55:ad:b9:ca:13:c6:27:25:07:a2:cc:f9:ca:38: 31:29:67:98:a0:5d:32:ca:b1:f0:3e:c1:ae:af:80:8f: d9:6d:97:bc:32:4d:5d:fc:cc:98:80:e2:5f:50:91:57: 26:0e:bd:b8:01:5b:e1:25:d9:5d:32:81:a9:98:09:f6: 0c:19:1a:41:f8:86:65:43:da:09:3a:81:8f:d1:0c:9c: 4b:5f:bc:0b:c2:e1:b7:d4:da:36:3a:77:1b:59:35:fc: 23:ff:20:1a:54:04:60:6f:62:19:69:1d:cb:c8:03:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:1f:68:9c:94:6d:30:e1:06:a6:60:14:d2:26:0f:cc: 37:72:a6:0e:77:b5:84:cd:2f:33:5e:e0:e0:74:97:f3: 76:46:87:88:0b:97:9e:51:b4:a0:a6:50:b0:c3:14:5a: b7:5d:40:c0:db:fa:7a:29:5a:3d:0d:70:0e:65:a1:cc: 87:d0:1b:79:f6:00:28:10:99:b2:b7:8f:dc:5e:d5:c0: 54:fb:bb:a6:28:68:b4:c4:e8:15:9c:7c:58:01:99:bd: c6:ca:9f:ab:9d:71:6e:b0:fb:df:79:b9:27:5d:1a:a3: 8a:0c:e4:82:d4:4f:be:15:3d:a3:01:ca:cc:f2:f0:84: b1:bf:8a:e1:8b:23:31:1d:08:cd:ae:cb:7a:e4:3b:89: cc:49:52:d0:f3:f2:41:cd:06:f5:87:d5:62:e3:9a:d2: 41:51:b3:7a:fc:38:5f:45:a5:4f:f5:57:7a:e4:76:54: 2d:a1:5c:ce:48:8c:e0:21:75:15:c7:67:5a:68:09:38: 96:03:08:7a:45:7c:45:43:49:e7:43:df:cc:b9:94:ec: 0a:8f:04:ce:03:74:df:d4:84:47:00:a4:d2:aa:67:d4: 05:5f:10:7c:e5:e6:ae:f2:46:c7:f6:2d:f7:60:03:d5: 6b:95:71:ea:cb:70:2d:dd:a8:19:35:75:44:04:d9:9d Fingerprint (SHA-256): 5D:7B:47:45:CD:2B:69:92:1E:5A:8E:01:5A:26:3E:40:09:71:6B:D5:6E:F6:A8:39:E3:1F:37:00:4E:92:7F:34 Fingerprint (SHA1): 6D:FA:55:FC:CA:1A:E0:69:C6:63:36:62:3C:5C:20:39:BD:D1:70:7B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3474: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3475: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153398 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3476: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3477: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3478: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3479: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331153399 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3480: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3481: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3482: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3483: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331153400 --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3484: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3485: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3486: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3487: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 331153401 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3488: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3489: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3490: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3491: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 331153402 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3492: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3493: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3494: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3495: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3496: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3497: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #3498: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153398 (0x13bcfff6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 15:54:44 2017 Not After : Thu Mar 31 15:54:44 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:49:eb:3b:38:eb:9d:33:a4:6f:ae:bb:66:a8:82:0e: 88:d6:2c:d2:0c:c8:2f:dd:43:b1:5a:d2:4b:02:6a:58: 73:64:70:73:6b:f3:c5:52:04:00:15:01:13:4e:f3:4e: a8:15:26:c7:37:b4:35:7e:f9:4f:c5:96:99:37:eb:86: 53:0a:e1:cd:87:6c:c0:21:46:ad:56:02:0a:c0:29:a5: f5:7c:52:e8:9d:2b:1a:27:da:8a:d6:c8:c8:b8:8c:66: 25:d4:43:68:be:11:a5:f6:d0:31:96:2e:e4:ee:f3:c8: f1:38:70:51:de:fd:32:78:0d:fd:88:ff:c0:3c:66:5f: 6f:ba:c2:29:f3:00:21:93:ba:5e:de:5d:c5:a1:05:1f: ae:24:76:b6:d6:d4:d6:bb:af:be:5b:3d:c8:db:93:8e: 02:01:42:42:e3:39:8f:ca:23:75:ec:a7:c1:86:ea:22: 8b:38:4b:06:20:4e:54:2a:ef:f6:fc:01:c9:cc:7a:f1: 81:0c:f2:69:5b:5e:50:77:4a:af:2b:90:48:09:72:44: 67:46:15:a0:b7:fe:72:9c:86:be:01:8e:ce:f3:87:7e: ec:f8:f5:80:39:d9:d6:b3:c7:cc:43:67:ac:1a:e3:d7: bd:7a:62:6b:17:4d:0c:2c:61:50:32:20:9c:b3:1e:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:58:e4:41:04:26:9a:e9:33:00:4c:d6:57:d0:bd:a9: f1:2f:43:98:b7:99:bb:ed:cb:a0:da:d1:ef:ec:ec:16: a4:37:e4:da:6a:03:10:1e:dd:2c:3c:28:12:5e:ba:33: df:c7:a6:8f:c8:a8:8a:a1:fd:83:02:4b:30:50:66:08: 6e:3e:ba:b7:96:cf:0b:c2:3a:d2:b9:35:db:01:dc:14: 5c:58:7e:e5:76:db:ef:8b:ca:29:3c:27:db:4a:3e:29: 46:dc:6b:00:90:36:96:94:61:2d:1f:aa:7b:55:58:ff: 1e:09:bf:72:9d:5b:b3:6a:15:21:e5:94:18:ee:9c:e8: 74:26:f9:3e:7f:b0:c7:98:30:ec:40:c2:5d:3c:f2:ef: 8a:e9:49:ee:16:a1:40:d7:75:16:54:51:15:7b:da:6f: 0b:b1:66:6d:b6:a5:92:e3:2f:4d:d7:76:26:06:f1:29: 76:59:d0:7a:cf:05:94:5c:fe:92:24:f3:ea:c1:92:32: c4:bb:43:9b:da:e5:3f:44:f2:8c:35:8e:d0:c0:87:30: 61:57:64:55:41:f5:a1:0c:47:02:87:05:95:22:7c:a2: 19:d9:36:d8:ae:74:35:3e:9f:47:4e:68:14:e9:a8:7b: 40:59:8c:fe:07:40:33:bd:7f:7a:36:ba:d6:cf:44:f5 Fingerprint (SHA-256): DD:11:9A:92:04:03:0A:7A:6A:6F:5F:5B:A4:3A:D2:44:6B:70:76:B4:B9:F9:71:F4:5B:82:CA:3F:6C:E0:C3:AD Fingerprint (SHA1): 86:8B:D1:BB:7A:A1:9C:E3:F1:4C:70:E1:61:1E:46:7E:84:F6:B2:6E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3499: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3500: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153399 (0x13bcfff7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 15:54:54 2017 Not After : Thu Mar 31 15:54:54 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:cd:e2:c2:19:3d:de:c6:82:ba:e4:b8:18:a3:36:e5: 4a:a8:71:69:92:8c:37:27:8a:07:a8:d8:4f:9d:5c:8e: 92:22:29:99:8a:00:b3:54:1a:e2:60:f4:c7:da:6a:c0: b6:94:9a:f5:f6:d0:07:c9:07:11:f6:1a:4c:cc:81:fe: b4:17:b6:29:b0:ba:3c:fd:51:8b:e8:04:1b:d6:db:2f: be:3b:56:5e:9e:02:94:a1:cd:3a:1a:ec:03:17:ac:88: 36:24:26:a2:e9:e4:69:92:bd:03:23:60:3c:21:9a:d2: e7:db:cc:e5:43:ec:46:aa:b5:91:a5:15:33:6e:fa:1d: d3:d1:86:cb:aa:02:e8:08:9f:78:60:d9:e0:1c:f9:fa: 67:6d:3a:38:52:28:6e:97:a1:33:ea:d0:13:a4:a8:10: e4:5b:94:6d:e4:b4:ce:d1:12:23:a5:9a:b3:68:7e:cf: 59:7d:c7:4d:49:fd:03:d4:f7:8d:1c:ca:b8:cd:7d:3e: a4:12:76:aa:c1:91:56:83:44:4d:04:df:c5:66:0b:41: ee:b5:58:74:c2:8e:97:51:f4:61:18:cb:71:72:8b:5f: 96:26:da:10:73:98:1e:97:c3:ec:04:0c:d2:64:90:f6: 09:26:78:1d:9d:fc:b7:29:5c:91:35:2d:40:3d:b6:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:44:bc:53:39:1f:17:da:a9:82:c9:b4:ac:56:b1:cb: 21:32:8f:4f:cf:fa:8a:2c:62:7d:78:b3:3a:f7:b3:ab: e2:9d:eb:c0:b7:9b:49:64:97:81:90:c9:98:1a:02:56: 96:35:f1:ea:4c:e5:68:9c:a1:93:0d:9c:59:42:b6:1b: ea:16:a1:5b:f2:ff:86:ae:e4:1b:2c:d1:1f:9d:c5:08: e3:fb:73:df:c9:80:c8:2b:ae:b1:79:23:0f:e8:d0:ab: 9c:29:35:c9:a1:d4:45:b1:a5:0a:17:be:7f:6d:df:d0: 4e:40:ea:ab:f6:b9:f2:ed:1c:2e:8b:3a:a4:0a:fe:f0: 78:0c:24:f0:b4:30:77:4f:3d:90:96:ea:34:8f:a0:08: 1f:b8:88:a7:97:8d:f7:08:6e:20:ed:a4:a5:f5:69:7d: ce:24:f1:cc:8a:36:5b:ec:7c:56:d2:7a:eb:b2:df:d2: f6:07:70:69:71:0c:ef:81:12:77:fa:fa:ff:8f:22:2a: 97:76:5a:8c:80:98:07:b6:c4:f9:c1:5b:5c:81:db:e6: b7:b7:37:dc:67:d5:cd:0d:62:33:bc:79:ce:91:1e:a4: 41:9f:cf:ed:83:26:95:a1:b7:3c:9b:e4:38:d9:1d:3d: d4:b4:f2:f3:28:85:c4:05:59:f2:2c:c9:89:9a:99:7f Fingerprint (SHA-256): 1D:D2:69:3B:F3:18:82:32:54:B4:D5:82:05:2F:87:F5:1E:6F:64:6A:4B:70:31:7E:B7:4F:54:07:4E:B1:41:FB Fingerprint (SHA1): 53:DD:6F:BA:CF:0B:F9:35:4B:4F:89:7C:58:45:8F:AF:5D:D5:60:67 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3501: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3502: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3503: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153400 (0x13bcfff8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 15:55:10 2017 Not After : Thu Mar 31 15:55:10 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:5f:97:a2:56:28:9e:08:af:0b:da:86:33:e7:b7:28: eb:40:ea:21:9a:58:b8:2a:38:37:c9:ed:f7:8f:da:63: 33:32:95:29:f4:8a:3a:13:b6:9e:8f:85:c8:bd:e8:98: 1a:84:17:54:9f:bd:46:aa:b1:53:20:c7:25:d6:25:07: 46:05:9e:01:d2:bd:62:f2:d7:7b:eb:17:d8:86:e5:73: 6e:f0:37:76:2b:a5:e9:b5:fc:81:27:57:17:06:bb:8b: a4:59:e2:07:81:4d:05:fd:83:0e:b6:09:a2:ee:e0:80: 23:48:4e:5b:d7:65:ab:b1:a0:30:02:e0:44:5b:20:6b: 9f:3d:9d:a5:7f:cd:3d:ef:9d:d7:3a:68:64:1a:8b:a2: 7b:9d:b8:fb:1d:b6:8b:6a:60:f8:c9:8e:2f:2d:9d:a5: 37:72:b1:1b:57:dd:68:0c:c9:c6:10:0a:c2:ca:9b:d8: a6:e0:6e:f4:87:b6:93:0f:49:59:55:82:0a:aa:25:22: dd:4e:ee:6c:fa:4d:be:1b:a0:05:2a:a1:60:a9:bf:ee: f5:2b:5d:3c:0a:c6:2a:56:54:21:fd:10:6d:04:7b:f3: 91:f7:68:ca:ed:38:14:37:c5:0b:f5:08:f7:48:e3:7c: e6:6a:13:2b:c7:9f:3c:0b:e3:a2:f2:04:ee:c0:bb:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:0d:9a:ac:dd:7d:ad:da:52:5c:f2:ae:41:c9:aa:81: 44:c7:aa:ca:61:2a:29:95:76:1a:9f:5f:11:4e:f7:c1: da:1d:f3:aa:c4:96:10:88:55:af:36:5f:a5:67:27:23: 54:41:17:2f:de:c9:64:fa:59:b9:e5:ab:0e:99:2d:9d: 93:bf:4e:e7:9a:3f:31:f0:03:32:4b:e2:bf:5c:a2:7e: 95:e5:11:77:fd:07:ed:92:56:01:d9:a3:7b:87:ca:89: 59:ff:17:cd:45:f6:c1:37:03:2e:40:41:5e:2e:b3:5b: 5c:29:1e:5d:be:4d:fe:dc:3c:bc:c4:04:66:93:79:b3: 03:ad:7e:55:8c:67:8c:39:5a:b4:28:de:93:4f:89:3a: 1b:d1:97:47:61:16:27:2f:c0:f4:bb:1b:c4:00:71:eb: be:a3:04:00:05:4f:7b:cd:0e:29:4a:49:15:f3:ba:dc: 73:3a:02:56:07:4d:39:0a:de:12:8d:13:68:fa:89:d0: 78:1c:f6:42:f2:e7:a4:2b:e5:7c:d8:43:41:c8:da:54: ac:a9:f2:d6:1a:60:f8:c5:57:7a:4a:5f:18:0f:d9:8c: a5:72:13:28:7d:e0:4d:ab:3c:84:0b:db:cc:62:f8:e0: e5:0b:67:5b:9f:f0:70:a0:3e:a4:da:f6:e4:83:fe:21 Fingerprint (SHA-256): 80:E0:B2:56:27:7F:DD:C0:11:9B:95:99:BC:CE:05:2B:0F:2C:BA:52:72:C1:32:B2:D4:C2:39:6B:B2:1D:D4:81 Fingerprint (SHA1): 77:22:A9:F0:BD:D5:DB:A6:E6:5B:B0:4B:30:EC:27:F6:31:30:DD:E2 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #3504: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3505: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153403 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3506: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3507: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3508: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3509: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331153404 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3510: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3511: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3512: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3513: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331153405 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA1Root-331153312.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3514: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3515: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3516: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3517: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 331153406 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3518: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3519: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #3520: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153403 (0x13bcfffb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 15:55:58 2017 Not After : Thu Mar 31 15:55:58 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:67:7c:47:49:7f:5e:a9:09:d1:65:6e:29:40:47:3b: 6d:d7:e1:3a:30:16:c3:b0:be:ea:b9:aa:be:75:b1:ef: 36:42:85:57:43:8a:cb:7f:f9:32:1d:49:2b:a2:f5:24: 78:ea:0e:bd:98:21:4c:cc:7b:ff:74:e1:f9:32:eb:41: 96:8a:78:de:14:d5:5e:b1:6d:10:e9:fa:df:a1:7f:ba: b7:76:28:43:6d:11:20:9b:a4:7e:37:5b:dc:b8:da:7e: 93:e9:42:d1:0f:82:3a:b3:17:29:a0:b9:f1:af:ea:ca: 56:9d:da:96:fa:66:87:0e:94:68:a7:fe:b3:fa:63:32: 53:d7:d0:28:49:3f:30:e4:df:c7:d9:dd:7a:2a:33:1f: 35:72:b0:df:f6:a2:b6:b9:78:93:52:b7:2b:ec:62:07: 7b:d0:d4:91:bc:97:6c:20:2e:39:a8:ad:06:1d:60:67: d2:4b:c5:bd:c8:c0:9a:cf:8c:88:85:5d:ca:14:f6:24: 3a:72:3f:e0:a9:cf:b6:42:4e:ac:23:2d:1a:58:f4:90: 58:41:3d:2e:3d:8b:4f:ee:4a:30:22:ec:b5:5f:3b:eb: bb:0e:0a:1a:5a:23:69:fd:71:fd:c5:3a:46:18:0d:12: 2a:5f:24:13:10:5f:77:bc:a2:bb:5e:0c:ee:69:ef:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:7d:6e:24:e8:fb:f0:e9:6b:5e:9b:dc:fb:1d:68:88: 2b:67:bd:f5:17:d5:0a:c2:42:96:bc:9a:04:9b:dd:53: 95:31:32:2e:66:2b:c0:be:7b:69:48:e8:68:e8:fc:62: 03:07:f5:2b:47:2c:3d:ee:d3:b6:b8:39:51:d8:6b:7b: 16:85:45:08:29:be:c6:d8:16:b9:9b:8b:1b:9e:f3:2e: 70:58:45:3f:64:35:2f:64:88:b8:01:bb:9f:73:6e:92: ba:27:8f:aa:de:77:e6:28:80:84:c6:71:53:b2:0c:87: ec:6c:5b:c3:25:a3:0f:6f:21:c6:f8:32:65:59:63:31: 65:5f:c2:4a:b5:b8:49:e1:aa:49:62:aa:1a:fb:3c:b9: c8:71:b1:7c:79:10:b8:3b:31:82:ea:ee:01:3c:c3:bd: 17:af:c4:de:c1:b5:24:d0:c7:4f:40:ad:6e:50:98:6c: 27:eb:8a:52:c7:ab:2b:cd:16:7f:d6:a3:9d:d9:2e:86: 77:c2:05:35:0d:d2:eb:4c:69:0d:0e:5f:78:0b:ef:89: 59:51:c1:ee:b3:19:eb:36:53:c7:72:c2:36:de:ac:26: 8b:91:52:07:16:d4:d6:22:6b:d9:54:8c:8c:a9:1d:00: d3:3e:13:5a:ae:cc:4e:84:7e:9e:e9:51:55:90:f6:64 Fingerprint (SHA-256): 54:45:BC:79:86:18:A8:3E:2E:A4:9C:30:B5:C5:A9:30:BA:F8:45:54:2A:83:0E:7B:ED:C4:41:1E:AB:11:98:04 Fingerprint (SHA1): 6D:96:D6:E7:1A:E7:C8:3F:15:17:4D:35:56:2A:57:35:21:CC:D8:90 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3521: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3522: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153407 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3523: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3524: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3525: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153408 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3526: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3527: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3528: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3529: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 331153409 -7 Bridge@Army < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3530: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3531: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 331153410 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3532: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3533: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3534: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3535: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3536: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 331153411 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-Bridge-331153313.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3537: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3538: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3539: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3540: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331153412 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3541: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3542: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3543: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #3544: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153408 (0x13bd0000) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 15:56:49 2017 Not After : Thu Mar 31 15:56:49 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:95:ce:6c:fa:c7:7e:74:77:83:88:0f:c0:d8:3c:68: 80:3c:27:1e:79:21:02:75:60:f0:d2:ad:08:7d:3e:60: e5:d7:5e:72:9e:e7:4c:2c:76:22:a9:93:d1:4e:2a:d2: 12:45:76:24:7d:18:61:9e:71:a5:b7:d0:ed:4e:a0:d1: 78:3e:4f:b8:64:a6:72:4c:c3:c1:b0:c3:cf:ce:a5:6a: 96:ab:a3:14:ce:1c:f4:c3:c2:08:d5:93:bd:44:c1:be: 20:93:1c:6e:c7:bc:51:a1:20:c8:39:26:b7:f1:83:2d: 61:af:d3:2b:3c:b1:35:4b:0b:f4:d7:83:ae:81:19:55: 8a:c0:ed:35:f0:b4:67:eb:dd:1f:dc:37:c6:77:66:9e: c9:ad:11:08:4d:ac:f7:64:12:be:1b:7e:2f:88:be:95: 4f:7a:34:6d:2f:f5:2c:87:ba:61:e5:14:31:3a:a0:11: ef:db:05:49:c1:8d:30:f6:10:48:48:07:bd:43:cf:0f: 81:26:8f:15:79:fd:77:d4:0b:f9:73:f0:78:e7:8e:cb: 30:33:58:e3:e8:cf:0f:3a:a2:e2:ca:49:6f:8e:5d:6a: 24:fb:3d:c0:01:3f:82:bf:83:79:6a:e4:e4:a6:52:a3: 23:47:c6:22:a4:27:4b:f4:45:52:57:ff:cd:76:3c:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:d0:c6:e8:ca:3f:47:34:26:e9:10:a2:b9:22:8a:5f: 74:9e:40:95:ff:d9:c2:ed:3e:8a:71:b7:63:14:c8:c2: 69:94:0f:28:3d:22:43:3f:42:86:18:ac:4d:4f:d0:ee: 8d:01:35:c3:5b:40:ab:f4:0c:5d:46:9d:a3:6b:3b:68: cb:e4:6f:65:11:13:4c:13:21:45:87:14:7a:3b:67:46: 74:0e:78:2c:8b:87:e5:94:ab:3b:eb:4f:41:c3:8e:55: 6d:49:02:b8:73:ce:c9:7b:07:2e:b6:ac:e6:45:71:e9: 8b:57:c5:c0:93:0f:d8:18:b6:4b:2f:22:d6:90:dd:10: c1:8c:0e:f9:c8:67:a6:3d:18:bb:77:29:19:1a:f7:86: 2c:7d:c6:1e:55:e1:af:f9:e6:18:74:fe:8c:cc:e0:4f: 5b:2a:af:8e:05:53:e1:ef:c7:d6:5f:24:06:2d:9e:1e: a4:96:7a:e2:49:45:e4:6c:3c:19:c4:fe:eb:3d:a2:0d: fb:97:0d:d2:c8:e2:96:eb:12:6f:2f:8a:75:7d:bd:57: 28:44:fb:8d:9f:c6:59:1b:58:87:29:10:82:0b:2b:6f: 57:55:80:65:f8:81:77:f4:24:25:3a:2d:5c:e2:38:44: d2:fe:8c:f5:f4:e2:7b:a3:7e:91:47:41:16:20:ab:f6 Fingerprint (SHA-256): A0:C3:E5:19:D1:04:9D:EB:5A:BC:43:90:83:18:81:26:24:E9:E8:E6:26:60:8B:BE:54:28:C2:0C:56:AD:0D:98 Fingerprint (SHA1): 2C:BE:8F:DF:33:F8:D1:13:C7:C9:0B:F0:E7:85:80:31:22:49:41:4D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3545: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153408 (0x13bd0000) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 15:56:49 2017 Not After : Thu Mar 31 15:56:49 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:95:ce:6c:fa:c7:7e:74:77:83:88:0f:c0:d8:3c:68: 80:3c:27:1e:79:21:02:75:60:f0:d2:ad:08:7d:3e:60: e5:d7:5e:72:9e:e7:4c:2c:76:22:a9:93:d1:4e:2a:d2: 12:45:76:24:7d:18:61:9e:71:a5:b7:d0:ed:4e:a0:d1: 78:3e:4f:b8:64:a6:72:4c:c3:c1:b0:c3:cf:ce:a5:6a: 96:ab:a3:14:ce:1c:f4:c3:c2:08:d5:93:bd:44:c1:be: 20:93:1c:6e:c7:bc:51:a1:20:c8:39:26:b7:f1:83:2d: 61:af:d3:2b:3c:b1:35:4b:0b:f4:d7:83:ae:81:19:55: 8a:c0:ed:35:f0:b4:67:eb:dd:1f:dc:37:c6:77:66:9e: c9:ad:11:08:4d:ac:f7:64:12:be:1b:7e:2f:88:be:95: 4f:7a:34:6d:2f:f5:2c:87:ba:61:e5:14:31:3a:a0:11: ef:db:05:49:c1:8d:30:f6:10:48:48:07:bd:43:cf:0f: 81:26:8f:15:79:fd:77:d4:0b:f9:73:f0:78:e7:8e:cb: 30:33:58:e3:e8:cf:0f:3a:a2:e2:ca:49:6f:8e:5d:6a: 24:fb:3d:c0:01:3f:82:bf:83:79:6a:e4:e4:a6:52:a3: 23:47:c6:22:a4:27:4b:f4:45:52:57:ff:cd:76:3c:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:d0:c6:e8:ca:3f:47:34:26:e9:10:a2:b9:22:8a:5f: 74:9e:40:95:ff:d9:c2:ed:3e:8a:71:b7:63:14:c8:c2: 69:94:0f:28:3d:22:43:3f:42:86:18:ac:4d:4f:d0:ee: 8d:01:35:c3:5b:40:ab:f4:0c:5d:46:9d:a3:6b:3b:68: cb:e4:6f:65:11:13:4c:13:21:45:87:14:7a:3b:67:46: 74:0e:78:2c:8b:87:e5:94:ab:3b:eb:4f:41:c3:8e:55: 6d:49:02:b8:73:ce:c9:7b:07:2e:b6:ac:e6:45:71:e9: 8b:57:c5:c0:93:0f:d8:18:b6:4b:2f:22:d6:90:dd:10: c1:8c:0e:f9:c8:67:a6:3d:18:bb:77:29:19:1a:f7:86: 2c:7d:c6:1e:55:e1:af:f9:e6:18:74:fe:8c:cc:e0:4f: 5b:2a:af:8e:05:53:e1:ef:c7:d6:5f:24:06:2d:9e:1e: a4:96:7a:e2:49:45:e4:6c:3c:19:c4:fe:eb:3d:a2:0d: fb:97:0d:d2:c8:e2:96:eb:12:6f:2f:8a:75:7d:bd:57: 28:44:fb:8d:9f:c6:59:1b:58:87:29:10:82:0b:2b:6f: 57:55:80:65:f8:81:77:f4:24:25:3a:2d:5c:e2:38:44: d2:fe:8c:f5:f4:e2:7b:a3:7e:91:47:41:16:20:ab:f6 Fingerprint (SHA-256): A0:C3:E5:19:D1:04:9D:EB:5A:BC:43:90:83:18:81:26:24:E9:E8:E6:26:60:8B:BE:54:28:C2:0C:56:AD:0D:98 Fingerprint (SHA1): 2C:BE:8F:DF:33:F8:D1:13:C7:C9:0B:F0:E7:85:80:31:22:49:41:4D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3546: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3547: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153413 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3548: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3549: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3550: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153414 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3551: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3552: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3553: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3554: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 331153415 -7 Bridge@Army < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3555: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3556: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 331153416 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3557: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3558: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3559: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3560: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3561: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 331153417 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-Bridge-331153314.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3562: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3563: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3564: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3565: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331153418 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3566: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3567: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3568: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3569: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 331153419 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-BridgeNavy-331153315.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3570: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3571: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3572: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3573: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 331153420 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3574: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3575: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3576: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #3577: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153414 (0x13bd0006) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 15:58:13 2017 Not After : Thu Mar 31 15:58:13 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:2b:d4:72:07:b9:8a:42:8b:51:1a:3e:15:ff:c0:88: 10:40:df:37:f8:a4:06:a1:df:74:2d:f7:a4:69:be:90: a1:bf:74:23:10:2c:a6:64:d7:32:01:16:b7:f3:a4:77: 4b:f6:fb:48:d7:24:62:85:3a:8b:ae:72:47:0f:a2:97: 2e:88:5c:63:ff:3c:63:f8:72:83:2c:fd:36:4c:e9:9a: 39:fe:22:d3:73:f4:f6:69:63:42:f7:f1:20:f3:d9:0c: 0f:f1:e5:45:85:ca:e4:d2:55:9d:42:a8:65:63:8b:04: 1e:89:f6:77:73:5e:58:00:f0:ad:f9:fb:65:9e:df:63: c3:5b:d7:97:27:87:ce:87:2f:41:e9:45:f4:ff:af:33: 48:a5:6c:ba:47:af:fe:b9:9f:0b:ef:95:5e:e4:15:be: 81:56:72:81:46:0e:a6:9a:a6:ea:99:e8:db:da:41:62: 07:8a:92:8d:f0:47:cd:73:98:65:5d:f5:0f:c6:2d:0e: 55:51:e1:70:3c:27:db:28:a4:b1:6b:f5:3c:36:9c:43: fb:f0:fd:54:d0:1a:c2:f6:f5:c9:f8:09:6f:b6:08:08: 4a:db:29:af:b8:94:6a:85:89:39:8d:1e:1b:b6:8b:7f: 82:6c:ac:7a:be:be:50:8b:dd:d1:5c:90:14:e4:07:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:ae:75:f3:51:07:77:c1:e0:fa:ce:48:5b:3e:a1:ee: 8e:cf:17:eb:97:77:3d:43:72:72:56:9f:02:b1:9a:8e: 20:00:9b:17:d2:40:b9:10:c0:d0:33:f1:85:95:f1:82: 40:43:eb:35:89:9c:4b:88:ca:2d:27:f0:ba:30:fc:98: 67:47:d5:cb:08:b6:06:eb:1c:54:84:99:fa:a6:dd:c9: e8:92:ab:37:ec:37:48:4a:10:b4:54:42:35:ee:3d:dc: 67:53:20:f6:5f:b8:e8:eb:69:c3:10:b2:96:74:05:3c: 88:80:33:68:9c:fd:8d:05:fa:a7:b3:1d:10:23:4c:51: a1:15:9b:81:89:34:ab:ae:d2:52:f8:d7:0e:13:46:c2: 06:15:38:3a:1a:aa:b5:1d:1d:25:2c:26:f8:fd:6e:0f: e7:3e:d1:e5:5b:78:b9:db:ce:03:bc:07:07:82:67:db: a2:30:13:a2:18:5a:34:80:91:02:90:1d:b4:af:ec:70: 78:96:07:f4:ce:c3:91:95:d1:e1:89:bd:98:7e:0b:82: cb:ac:fb:36:0e:98:be:45:73:b2:39:3c:f8:8b:32:18: b7:02:b5:0b:03:3c:90:3d:1d:69:31:51:14:13:bf:2d: 0a:ef:e5:a6:84:b2:3e:b2:d2:33:4b:35:81:34:94:c1 Fingerprint (SHA-256): BB:F1:7B:0E:2D:D6:B3:50:13:58:D8:61:09:82:91:84:AC:E9:39:02:66:05:65:1D:4E:26:27:CD:DE:46:1C:3F Fingerprint (SHA1): C9:92:70:8A:E0:03:AD:73:AB:02:21:6F:FE:9A:EF:7D:25:65:1C:07 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3578: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153414 (0x13bd0006) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 15:58:13 2017 Not After : Thu Mar 31 15:58:13 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:2b:d4:72:07:b9:8a:42:8b:51:1a:3e:15:ff:c0:88: 10:40:df:37:f8:a4:06:a1:df:74:2d:f7:a4:69:be:90: a1:bf:74:23:10:2c:a6:64:d7:32:01:16:b7:f3:a4:77: 4b:f6:fb:48:d7:24:62:85:3a:8b:ae:72:47:0f:a2:97: 2e:88:5c:63:ff:3c:63:f8:72:83:2c:fd:36:4c:e9:9a: 39:fe:22:d3:73:f4:f6:69:63:42:f7:f1:20:f3:d9:0c: 0f:f1:e5:45:85:ca:e4:d2:55:9d:42:a8:65:63:8b:04: 1e:89:f6:77:73:5e:58:00:f0:ad:f9:fb:65:9e:df:63: c3:5b:d7:97:27:87:ce:87:2f:41:e9:45:f4:ff:af:33: 48:a5:6c:ba:47:af:fe:b9:9f:0b:ef:95:5e:e4:15:be: 81:56:72:81:46:0e:a6:9a:a6:ea:99:e8:db:da:41:62: 07:8a:92:8d:f0:47:cd:73:98:65:5d:f5:0f:c6:2d:0e: 55:51:e1:70:3c:27:db:28:a4:b1:6b:f5:3c:36:9c:43: fb:f0:fd:54:d0:1a:c2:f6:f5:c9:f8:09:6f:b6:08:08: 4a:db:29:af:b8:94:6a:85:89:39:8d:1e:1b:b6:8b:7f: 82:6c:ac:7a:be:be:50:8b:dd:d1:5c:90:14:e4:07:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:ae:75:f3:51:07:77:c1:e0:fa:ce:48:5b:3e:a1:ee: 8e:cf:17:eb:97:77:3d:43:72:72:56:9f:02:b1:9a:8e: 20:00:9b:17:d2:40:b9:10:c0:d0:33:f1:85:95:f1:82: 40:43:eb:35:89:9c:4b:88:ca:2d:27:f0:ba:30:fc:98: 67:47:d5:cb:08:b6:06:eb:1c:54:84:99:fa:a6:dd:c9: e8:92:ab:37:ec:37:48:4a:10:b4:54:42:35:ee:3d:dc: 67:53:20:f6:5f:b8:e8:eb:69:c3:10:b2:96:74:05:3c: 88:80:33:68:9c:fd:8d:05:fa:a7:b3:1d:10:23:4c:51: a1:15:9b:81:89:34:ab:ae:d2:52:f8:d7:0e:13:46:c2: 06:15:38:3a:1a:aa:b5:1d:1d:25:2c:26:f8:fd:6e:0f: e7:3e:d1:e5:5b:78:b9:db:ce:03:bc:07:07:82:67:db: a2:30:13:a2:18:5a:34:80:91:02:90:1d:b4:af:ec:70: 78:96:07:f4:ce:c3:91:95:d1:e1:89:bd:98:7e:0b:82: cb:ac:fb:36:0e:98:be:45:73:b2:39:3c:f8:8b:32:18: b7:02:b5:0b:03:3c:90:3d:1d:69:31:51:14:13:bf:2d: 0a:ef:e5:a6:84:b2:3e:b2:d2:33:4b:35:81:34:94:c1 Fingerprint (SHA-256): BB:F1:7B:0E:2D:D6:B3:50:13:58:D8:61:09:82:91:84:AC:E9:39:02:66:05:65:1D:4E:26:27:CD:DE:46:1C:3F Fingerprint (SHA1): C9:92:70:8A:E0:03:AD:73:AB:02:21:6F:FE:9A:EF:7D:25:65:1C:07 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3579: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #3580: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153413 (0x13bd0005) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 15:57:48 2017 Not After : Thu Mar 31 15:57:48 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:fd:a0:cc:73:de:79:08:4e:a6:96:25:bd:c0:80:ef: 7e:f6:de:bb:e8:59:d1:4b:2e:95:2e:38:aa:17:a1:a5: 0f:52:33:44:99:d3:28:17:77:e0:5a:26:36:17:ec:08: 15:2e:92:fe:f3:a6:50:c5:6c:68:1b:12:f1:ae:e5:28: 7b:91:e2:da:26:42:65:3f:bf:99:22:e3:a7:52:a9:05: 60:23:65:b8:48:3d:3b:d6:8e:fb:93:f6:31:ad:a3:9b: 95:bb:4f:78:9d:0f:30:94:7e:8b:27:05:9a:1e:f7:ce: 99:25:14:2c:5e:ed:cd:5b:8e:7c:8d:a5:13:11:f3:74: 48:fa:e7:d2:42:31:bc:90:c9:16:16:2e:d3:b1:d4:34: 5c:48:0f:0c:72:5b:42:0b:71:cb:94:c2:50:88:3f:e6: bb:33:4d:31:80:c7:f7:db:27:e5:de:5d:d3:ac:79:a4: fa:ab:4f:32:ca:7d:3d:ad:df:7e:37:48:8f:a6:cc:db: fc:b6:89:db:f0:7f:7a:2b:dd:c3:6f:10:9c:66:d6:9f: 57:24:2a:97:75:d7:00:8e:5c:92:a1:eb:f8:8c:cd:68: 91:b1:79:e1:36:f4:0d:93:b1:4b:6d:b6:5a:a2:97:52: ba:d6:8b:81:8e:96:87:5b:41:0f:3e:6b:e6:f0:31:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:56:fc:be:26:0f:41:34:8e:df:1e:2e:04:b1:19:f7: fd:f6:8a:f1:d6:0f:3f:27:db:0b:1e:16:02:bd:bd:12: 08:1e:02:73:00:0d:53:07:92:56:4f:ae:c5:23:c1:6f: 01:96:bf:4c:70:cd:6a:99:98:72:fb:dc:64:11:73:05: 15:c0:2f:73:81:08:6e:8e:cf:3c:c9:e5:16:58:c9:fc: 0e:43:52:1c:f8:b3:43:3f:17:54:71:80:b3:fa:57:2f: 66:8c:8d:5e:5a:aa:e3:3c:67:0a:53:98:8d:bc:d2:5c: 72:f0:60:26:80:89:b0:47:f8:99:db:7a:4d:63:28:31: 55:19:f4:f4:41:00:74:3c:70:e8:49:7f:6f:d9:54:c8: 56:4e:19:68:88:fb:d3:a6:06:a2:c8:6b:21:15:16:4c: 61:c2:ae:0e:29:6e:6c:35:d7:2c:a7:4a:66:9d:83:f2: af:ab:81:30:33:ff:09:bd:67:b9:0f:97:2f:09:0c:23: 6d:4e:cd:c6:b7:e7:c0:7e:a6:af:46:72:9b:9e:23:2d: 92:05:9c:ce:63:1f:89:5e:b5:28:1e:aa:79:2d:46:7c: 9b:f5:37:3f:c4:37:b1:6a:04:f1:b7:4c:d2:47:07:e8: 1d:42:9a:a2:95:e2:16:16:f4:69:99:b9:92:dd:ca:97 Fingerprint (SHA-256): 2C:30:CF:D6:D7:28:E5:4C:81:ED:2A:AD:14:6E:77:55:49:FE:45:FC:AB:CE:C2:8F:71:8C:AA:4A:9D:A4:C5:4A Fingerprint (SHA1): 8A:B6:B6:62:DE:FC:60:EA:2E:7A:B0:3D:6A:5D:A6:0C:18:FA:F2:FB Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3581: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153414 (0x13bd0006) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 15:58:13 2017 Not After : Thu Mar 31 15:58:13 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:2b:d4:72:07:b9:8a:42:8b:51:1a:3e:15:ff:c0:88: 10:40:df:37:f8:a4:06:a1:df:74:2d:f7:a4:69:be:90: a1:bf:74:23:10:2c:a6:64:d7:32:01:16:b7:f3:a4:77: 4b:f6:fb:48:d7:24:62:85:3a:8b:ae:72:47:0f:a2:97: 2e:88:5c:63:ff:3c:63:f8:72:83:2c:fd:36:4c:e9:9a: 39:fe:22:d3:73:f4:f6:69:63:42:f7:f1:20:f3:d9:0c: 0f:f1:e5:45:85:ca:e4:d2:55:9d:42:a8:65:63:8b:04: 1e:89:f6:77:73:5e:58:00:f0:ad:f9:fb:65:9e:df:63: c3:5b:d7:97:27:87:ce:87:2f:41:e9:45:f4:ff:af:33: 48:a5:6c:ba:47:af:fe:b9:9f:0b:ef:95:5e:e4:15:be: 81:56:72:81:46:0e:a6:9a:a6:ea:99:e8:db:da:41:62: 07:8a:92:8d:f0:47:cd:73:98:65:5d:f5:0f:c6:2d:0e: 55:51:e1:70:3c:27:db:28:a4:b1:6b:f5:3c:36:9c:43: fb:f0:fd:54:d0:1a:c2:f6:f5:c9:f8:09:6f:b6:08:08: 4a:db:29:af:b8:94:6a:85:89:39:8d:1e:1b:b6:8b:7f: 82:6c:ac:7a:be:be:50:8b:dd:d1:5c:90:14:e4:07:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:ae:75:f3:51:07:77:c1:e0:fa:ce:48:5b:3e:a1:ee: 8e:cf:17:eb:97:77:3d:43:72:72:56:9f:02:b1:9a:8e: 20:00:9b:17:d2:40:b9:10:c0:d0:33:f1:85:95:f1:82: 40:43:eb:35:89:9c:4b:88:ca:2d:27:f0:ba:30:fc:98: 67:47:d5:cb:08:b6:06:eb:1c:54:84:99:fa:a6:dd:c9: e8:92:ab:37:ec:37:48:4a:10:b4:54:42:35:ee:3d:dc: 67:53:20:f6:5f:b8:e8:eb:69:c3:10:b2:96:74:05:3c: 88:80:33:68:9c:fd:8d:05:fa:a7:b3:1d:10:23:4c:51: a1:15:9b:81:89:34:ab:ae:d2:52:f8:d7:0e:13:46:c2: 06:15:38:3a:1a:aa:b5:1d:1d:25:2c:26:f8:fd:6e:0f: e7:3e:d1:e5:5b:78:b9:db:ce:03:bc:07:07:82:67:db: a2:30:13:a2:18:5a:34:80:91:02:90:1d:b4:af:ec:70: 78:96:07:f4:ce:c3:91:95:d1:e1:89:bd:98:7e:0b:82: cb:ac:fb:36:0e:98:be:45:73:b2:39:3c:f8:8b:32:18: b7:02:b5:0b:03:3c:90:3d:1d:69:31:51:14:13:bf:2d: 0a:ef:e5:a6:84:b2:3e:b2:d2:33:4b:35:81:34:94:c1 Fingerprint (SHA-256): BB:F1:7B:0E:2D:D6:B3:50:13:58:D8:61:09:82:91:84:AC:E9:39:02:66:05:65:1D:4E:26:27:CD:DE:46:1C:3F Fingerprint (SHA1): C9:92:70:8A:E0:03:AD:73:AB:02:21:6F:FE:9A:EF:7D:25:65:1C:07 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3582: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153414 (0x13bd0006) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 15:58:13 2017 Not After : Thu Mar 31 15:58:13 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:2b:d4:72:07:b9:8a:42:8b:51:1a:3e:15:ff:c0:88: 10:40:df:37:f8:a4:06:a1:df:74:2d:f7:a4:69:be:90: a1:bf:74:23:10:2c:a6:64:d7:32:01:16:b7:f3:a4:77: 4b:f6:fb:48:d7:24:62:85:3a:8b:ae:72:47:0f:a2:97: 2e:88:5c:63:ff:3c:63:f8:72:83:2c:fd:36:4c:e9:9a: 39:fe:22:d3:73:f4:f6:69:63:42:f7:f1:20:f3:d9:0c: 0f:f1:e5:45:85:ca:e4:d2:55:9d:42:a8:65:63:8b:04: 1e:89:f6:77:73:5e:58:00:f0:ad:f9:fb:65:9e:df:63: c3:5b:d7:97:27:87:ce:87:2f:41:e9:45:f4:ff:af:33: 48:a5:6c:ba:47:af:fe:b9:9f:0b:ef:95:5e:e4:15:be: 81:56:72:81:46:0e:a6:9a:a6:ea:99:e8:db:da:41:62: 07:8a:92:8d:f0:47:cd:73:98:65:5d:f5:0f:c6:2d:0e: 55:51:e1:70:3c:27:db:28:a4:b1:6b:f5:3c:36:9c:43: fb:f0:fd:54:d0:1a:c2:f6:f5:c9:f8:09:6f:b6:08:08: 4a:db:29:af:b8:94:6a:85:89:39:8d:1e:1b:b6:8b:7f: 82:6c:ac:7a:be:be:50:8b:dd:d1:5c:90:14:e4:07:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:ae:75:f3:51:07:77:c1:e0:fa:ce:48:5b:3e:a1:ee: 8e:cf:17:eb:97:77:3d:43:72:72:56:9f:02:b1:9a:8e: 20:00:9b:17:d2:40:b9:10:c0:d0:33:f1:85:95:f1:82: 40:43:eb:35:89:9c:4b:88:ca:2d:27:f0:ba:30:fc:98: 67:47:d5:cb:08:b6:06:eb:1c:54:84:99:fa:a6:dd:c9: e8:92:ab:37:ec:37:48:4a:10:b4:54:42:35:ee:3d:dc: 67:53:20:f6:5f:b8:e8:eb:69:c3:10:b2:96:74:05:3c: 88:80:33:68:9c:fd:8d:05:fa:a7:b3:1d:10:23:4c:51: a1:15:9b:81:89:34:ab:ae:d2:52:f8:d7:0e:13:46:c2: 06:15:38:3a:1a:aa:b5:1d:1d:25:2c:26:f8:fd:6e:0f: e7:3e:d1:e5:5b:78:b9:db:ce:03:bc:07:07:82:67:db: a2:30:13:a2:18:5a:34:80:91:02:90:1d:b4:af:ec:70: 78:96:07:f4:ce:c3:91:95:d1:e1:89:bd:98:7e:0b:82: cb:ac:fb:36:0e:98:be:45:73:b2:39:3c:f8:8b:32:18: b7:02:b5:0b:03:3c:90:3d:1d:69:31:51:14:13:bf:2d: 0a:ef:e5:a6:84:b2:3e:b2:d2:33:4b:35:81:34:94:c1 Fingerprint (SHA-256): BB:F1:7B:0E:2D:D6:B3:50:13:58:D8:61:09:82:91:84:AC:E9:39:02:66:05:65:1D:4E:26:27:CD:DE:46:1C:3F Fingerprint (SHA1): C9:92:70:8A:E0:03:AD:73:AB:02:21:6F:FE:9A:EF:7D:25:65:1C:07 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3583: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3584: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153421 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3585: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3586: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3587: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153422 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3588: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3589: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #3590: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3591: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 331153423 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3592: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3593: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #3594: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3595: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 331153424 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3596: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3597: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3598: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3599: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 331153425 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3600: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3601: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 331153426 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3602: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3603: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #3604: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3605: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3606: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 331153427 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3607: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3608: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3609: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3610: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 331153428 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3611: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3612: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3613: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3614: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331153429 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3615: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3616: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3617: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3618: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 331153430 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3619: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3620: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3621: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153421 (0x13bd000d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 15:59:30 2017 Not After : Thu Mar 31 15:59:30 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:48:1d:88:42:f9:34:cf:51:9c:31:76:93:d7:e8:9b: 83:7a:f9:89:0d:d8:c7:1d:e1:2b:03:0e:23:95:1c:c5: 91:a0:87:1d:61:8c:62:ff:dd:c0:fd:99:39:34:2d:56: 79:47:f2:c6:fd:9f:97:e2:68:56:1f:e1:3f:51:c7:17: 8c:3c:c7:72:4e:4c:2a:e0:7a:c6:f2:81:79:ab:a1:10: 72:e1:12:16:ad:11:dc:b0:1e:ce:7d:2e:9f:0d:d4:0f: dc:b5:8b:fc:34:83:17:1e:45:52:0a:be:07:92:3f:ba: db:ba:67:62:6a:a4:2b:3c:79:d4:6b:a1:28:a4:4f:9e: e0:77:de:74:f6:0a:24:b2:a1:fa:64:75:eb:07:ef:3d: d9:c7:f4:c4:1e:d2:6d:3f:28:cb:b2:05:43:20:15:56: a8:33:50:7c:7d:d7:6c:e1:b5:da:fd:a1:f5:de:c6:c2: d8:a3:ae:58:39:79:2b:b8:43:59:5c:b0:10:be:a4:e6: 11:92:45:63:ae:93:a9:31:63:5d:45:f7:0b:de:0f:dc: bd:22:59:18:4d:66:0c:d5:51:ef:8d:dc:30:10:8e:0e: 62:23:9b:0f:8d:12:e6:7c:fa:cf:6d:e4:ee:63:91:9e: dd:7d:c3:b8:d6:fd:1a:57:42:e2:15:d0:64:cd:b4:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:56:6a:b7:f0:b9:4d:79:3c:ee:cc:27:5e:a3:db:fc: 19:07:b9:d6:75:91:29:97:8a:a7:0f:8f:a2:ba:5c:7b: bc:ed:97:b0:7b:41:d6:8a:f4:db:c8:a7:79:1d:54:5b: cb:7d:ce:4c:fe:a4:f3:eb:ff:fd:9c:4d:24:b3:79:8e: f1:e3:82:e9:34:13:97:b2:52:95:35:0b:66:56:d2:49: 54:18:78:70:12:76:f0:8b:67:cf:68:9d:1c:b7:43:19: f8:d6:d4:69:03:e8:4a:21:eb:b2:f1:55:5e:c5:74:98: c7:05:4e:88:b4:6a:63:8e:38:fd:87:59:99:7a:e3:b2: e3:5f:02:34:08:a2:b2:c7:bb:95:11:08:ff:84:40:f8: 80:4f:f2:01:12:40:0c:44:4d:a1:c5:be:ac:30:d8:08: 89:91:9b:15:97:fb:15:7f:39:29:4d:fe:34:a9:f6:20: 03:b3:14:84:56:c7:b8:6b:5f:39:62:f7:48:57:82:09: 7e:b0:0b:bd:82:6d:e9:24:d3:fa:78:a9:e5:4a:9e:89: fe:c3:84:19:96:93:e2:00:0a:81:d6:fe:49:37:9a:97: eb:c6:cc:1d:48:1f:e3:9a:ee:19:7b:63:6f:c9:dd:dc: d1:45:8a:e9:30:8d:50:01:54:da:63:21:99:93:1e:bc Fingerprint (SHA-256): 44:63:92:8B:C9:69:91:8E:2B:C1:CE:3E:32:51:13:71:1F:8C:E5:C0:6D:9C:1C:90:D1:72:E1:1C:6B:81:BD:0D Fingerprint (SHA1): E0:27:32:94:31:72:E3:C7:27:62:85:6E:3A:C0:1A:CA:15:43:F3:A2 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #3622: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3623: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3624: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3625: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3626: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3627: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3628: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3629: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3630: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153422 (0x13bd000e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 15:59:37 2017 Not After : Thu Mar 31 15:59:37 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:b4:1f:58:1f:19:46:9a:1f:ce:c4:cb:08:11:8c:22: 97:c6:e9:66:ee:66:f2:ad:a3:e3:d2:b9:00:1f:e9:75: 42:de:ed:b2:2e:4e:f4:29:49:ca:a6:41:14:7f:db:5d: 11:76:d3:69:87:52:b7:93:f8:3b:bf:35:1d:b0:51:47: 12:ae:93:be:12:a9:cc:20:98:7d:c9:c5:a8:24:88:ff: c7:6c:f3:bc:39:3e:3c:f7:ad:61:99:7b:80:95:a0:f9: df:7d:41:3d:a7:83:4b:8d:0a:ac:1f:5f:c3:1a:6c:69: 12:30:1c:a8:ea:80:e7:ac:99:f4:61:32:54:e4:26:dd: d0:fa:c2:39:6f:e8:b4:72:d5:4e:33:8a:1e:51:f4:c5: 57:94:30:9d:6e:7e:88:57:3b:60:64:13:33:a9:7c:aa: 97:2b:de:03:c9:c8:a4:03:ab:fd:58:60:94:0c:42:14: f6:1c:cd:35:44:21:10:87:5e:1f:c7:32:0d:c8:ae:23: 8d:aa:25:03:c0:f4:39:cb:29:86:d0:1f:a8:fd:0f:22: 06:92:5f:0d:8c:a1:3a:33:bf:53:70:f6:60:5d:6c:d3: 6d:18:50:fe:20:10:94:b3:4c:c1:ac:70:eb:da:3b:cb: 34:1c:87:bb:6c:e5:59:da:46:88:83:2c:2f:94:07:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:78:9d:aa:10:b6:1d:ad:4c:49:d3:e7:ad:69:51:75: 83:43:00:c1:d7:b2:e2:37:7f:52:62:c4:25:aa:01:d6: 3c:21:f4:c4:00:e5:08:85:f0:57:a0:ae:87:66:d8:51: 7a:b2:a8:66:f3:ea:27:80:6a:28:99:da:ae:bf:88:dd: 2b:ac:52:e5:61:40:d3:da:22:1b:04:e4:bc:d1:53:4c: 8c:f3:44:5d:8b:5c:ee:ad:98:c0:29:9e:9c:ac:ac:25: 78:56:fd:3a:3f:45:a4:2a:85:39:d9:2a:42:40:38:53: e7:52:83:78:79:ee:cc:30:3b:3f:c2:43:33:81:8a:a0: 45:1c:94:c1:79:7b:ab:4a:e6:1a:0e:d5:41:c6:03:97: c1:5c:bb:58:ff:83:19:1e:cc:c5:64:7f:50:ac:06:4a: c3:8e:a6:9f:90:4a:7e:4f:78:94:ae:d1:f7:d2:16:cd: fd:d0:a7:f4:43:52:ad:71:3d:7d:5a:a4:99:15:c7:f5: 5d:91:c0:c9:6b:f0:57:20:7b:7f:ae:46:e5:a5:15:4b: 51:b2:8a:c3:4a:5f:74:da:99:59:02:35:84:82:68:b4: 3d:f1:12:44:8a:77:5c:bf:fd:49:13:74:97:da:4d:55: 77:c6:12:18:06:02:78:b3:e2:2a:0c:ee:57:f0:ef:b9 Fingerprint (SHA-256): 55:F3:01:BA:20:48:18:CA:9F:BE:A6:4C:72:74:B3:E4:13:98:BC:48:BE:7F:0C:42:05:2B:9F:B8:5E:A2:D3:F4 Fingerprint (SHA1): AE:9E:36:4F:28:C1:62:82:BE:BD:AB:36:0D:8C:6F:ED:6B:D7:B2:AD Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #3631: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3632: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3633: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3634: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3635: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3636: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3637: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #3638: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #3639: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #3640: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #3641: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #3642: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #3643: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #3644: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #3645: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #3646: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #3647: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #3648: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3649: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153431 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3650: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3651: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3652: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3653: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331153432 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3654: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3655: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3656: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3657: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331153433 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3658: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3659: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3660: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3661: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 331153434 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3662: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3663: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3664: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3665: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 331153435 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3666: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3667: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3668: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3669: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 331153436 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3670: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3671: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #3672: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3673: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 331153437 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3674: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3675: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #3676: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3677: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 331153438 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3678: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3679: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #3680: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3681: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 331153439 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3682: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3683: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3684: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153431 (0x13bd0017) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:01:38 2017 Not After : Thu Mar 31 16:01:38 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 13:f3:26:39:7e:03:c2:81:ec:8a:4a:26:85:eb:70:29: 92:36:71:82:a8:30:0f:fb:d2:d2:82:62:d9:89:d6:28: 7d:ce:8f:c1:6f:6d:b2:29:ac:b6:e6:85:62:af:0a:9f: 36:d4:4f:6b:c3:3b:b1:47:d8:a2:f4:ac:3f:a1:61:eb: c1:ad:a3:d5:d0:2e:48:18:78:c6:24:38:0f:26:29:8d: fe:3e:50:64:11:69:90:26:b4:d5:8e:33:ce:da:e8:bd: 63:ed:cf:e8:16:2b:1b:26:6c:d4:95:c9:9b:87:e7:dd: 2b:47:bb:75:e3:5d:b8:d4:cd:fc:2a:2a:81:b0:32:5b: e3:d8:82:59:3f:a8:7d:11:f1:5c:b9:2e:7c:6c:85:02: fe:8a:0b:eb:eb:9b:d4:f1:37:7a:f3:be:21:a9:21:d0: c2:db:a6:03:1a:b9:b2:1d:25:9e:6e:09:d6:97:a1:cf: 25:0b:fd:2b:85:d3:72:cb:8f:1e:b2:32:4c:d3:06:1f: d5:7b:92:f4:7a:fa:09:1f:5d:e8:93:bf:11:68:eb:c0: 4a:66:d0:f8:24:9b:69:2a:f2:2b:38:b1:bf:8e:5e:52: fa:bc:27:27:fa:99:32:53:19:fa:3c:34:36:51:ff:cf: 92:27:79:ba:1a:f6:e1:48:59:1f:b3:84:c0:47:fa:dd Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:7d:23:63:57:7a:63:2b:3e:02:86:c3:d4: f2:19:7e:b5:86:5f:31:30:23:ce:4c:ca:4b:08:53:01: 02:1c:23:2f:eb:09:0b:bf:04:7b:61:73:0f:43:8e:14: 49:a8:80:dc:11:b4:df:cf:b3:45:b2:29:0c:42 Fingerprint (SHA-256): 3A:BA:80:B8:78:F7:8F:40:24:5D:92:F8:21:6F:7B:E2:C2:27:D2:87:E6:92:FD:D5:BC:22:A2:A7:99:D3:84:7F Fingerprint (SHA1): 70:90:81:1F:39:35:FA:D7:F6:F9:24:15:CA:8E:BC:3A:E5:32:D7:C7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3685: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153431 (0x13bd0017) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:01:38 2017 Not After : Thu Mar 31 16:01:38 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 13:f3:26:39:7e:03:c2:81:ec:8a:4a:26:85:eb:70:29: 92:36:71:82:a8:30:0f:fb:d2:d2:82:62:d9:89:d6:28: 7d:ce:8f:c1:6f:6d:b2:29:ac:b6:e6:85:62:af:0a:9f: 36:d4:4f:6b:c3:3b:b1:47:d8:a2:f4:ac:3f:a1:61:eb: c1:ad:a3:d5:d0:2e:48:18:78:c6:24:38:0f:26:29:8d: fe:3e:50:64:11:69:90:26:b4:d5:8e:33:ce:da:e8:bd: 63:ed:cf:e8:16:2b:1b:26:6c:d4:95:c9:9b:87:e7:dd: 2b:47:bb:75:e3:5d:b8:d4:cd:fc:2a:2a:81:b0:32:5b: e3:d8:82:59:3f:a8:7d:11:f1:5c:b9:2e:7c:6c:85:02: fe:8a:0b:eb:eb:9b:d4:f1:37:7a:f3:be:21:a9:21:d0: c2:db:a6:03:1a:b9:b2:1d:25:9e:6e:09:d6:97:a1:cf: 25:0b:fd:2b:85:d3:72:cb:8f:1e:b2:32:4c:d3:06:1f: d5:7b:92:f4:7a:fa:09:1f:5d:e8:93:bf:11:68:eb:c0: 4a:66:d0:f8:24:9b:69:2a:f2:2b:38:b1:bf:8e:5e:52: fa:bc:27:27:fa:99:32:53:19:fa:3c:34:36:51:ff:cf: 92:27:79:ba:1a:f6:e1:48:59:1f:b3:84:c0:47:fa:dd Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:7d:23:63:57:7a:63:2b:3e:02:86:c3:d4: f2:19:7e:b5:86:5f:31:30:23:ce:4c:ca:4b:08:53:01: 02:1c:23:2f:eb:09:0b:bf:04:7b:61:73:0f:43:8e:14: 49:a8:80:dc:11:b4:df:cf:b3:45:b2:29:0c:42 Fingerprint (SHA-256): 3A:BA:80:B8:78:F7:8F:40:24:5D:92:F8:21:6F:7B:E2:C2:27:D2:87:E6:92:FD:D5:BC:22:A2:A7:99:D3:84:7F Fingerprint (SHA1): 70:90:81:1F:39:35:FA:D7:F6:F9:24:15:CA:8E:BC:3A:E5:32:D7:C7 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3686: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153431 (0x13bd0017) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:01:38 2017 Not After : Thu Mar 31 16:01:38 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 13:f3:26:39:7e:03:c2:81:ec:8a:4a:26:85:eb:70:29: 92:36:71:82:a8:30:0f:fb:d2:d2:82:62:d9:89:d6:28: 7d:ce:8f:c1:6f:6d:b2:29:ac:b6:e6:85:62:af:0a:9f: 36:d4:4f:6b:c3:3b:b1:47:d8:a2:f4:ac:3f:a1:61:eb: c1:ad:a3:d5:d0:2e:48:18:78:c6:24:38:0f:26:29:8d: fe:3e:50:64:11:69:90:26:b4:d5:8e:33:ce:da:e8:bd: 63:ed:cf:e8:16:2b:1b:26:6c:d4:95:c9:9b:87:e7:dd: 2b:47:bb:75:e3:5d:b8:d4:cd:fc:2a:2a:81:b0:32:5b: e3:d8:82:59:3f:a8:7d:11:f1:5c:b9:2e:7c:6c:85:02: fe:8a:0b:eb:eb:9b:d4:f1:37:7a:f3:be:21:a9:21:d0: c2:db:a6:03:1a:b9:b2:1d:25:9e:6e:09:d6:97:a1:cf: 25:0b:fd:2b:85:d3:72:cb:8f:1e:b2:32:4c:d3:06:1f: d5:7b:92:f4:7a:fa:09:1f:5d:e8:93:bf:11:68:eb:c0: 4a:66:d0:f8:24:9b:69:2a:f2:2b:38:b1:bf:8e:5e:52: fa:bc:27:27:fa:99:32:53:19:fa:3c:34:36:51:ff:cf: 92:27:79:ba:1a:f6:e1:48:59:1f:b3:84:c0:47:fa:dd Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:7d:23:63:57:7a:63:2b:3e:02:86:c3:d4: f2:19:7e:b5:86:5f:31:30:23:ce:4c:ca:4b:08:53:01: 02:1c:23:2f:eb:09:0b:bf:04:7b:61:73:0f:43:8e:14: 49:a8:80:dc:11:b4:df:cf:b3:45:b2:29:0c:42 Fingerprint (SHA-256): 3A:BA:80:B8:78:F7:8F:40:24:5D:92:F8:21:6F:7B:E2:C2:27:D2:87:E6:92:FD:D5:BC:22:A2:A7:99:D3:84:7F Fingerprint (SHA1): 70:90:81:1F:39:35:FA:D7:F6:F9:24:15:CA:8E:BC:3A:E5:32:D7:C7 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #3687: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153431 (0x13bd0017) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:01:38 2017 Not After : Thu Mar 31 16:01:38 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 13:f3:26:39:7e:03:c2:81:ec:8a:4a:26:85:eb:70:29: 92:36:71:82:a8:30:0f:fb:d2:d2:82:62:d9:89:d6:28: 7d:ce:8f:c1:6f:6d:b2:29:ac:b6:e6:85:62:af:0a:9f: 36:d4:4f:6b:c3:3b:b1:47:d8:a2:f4:ac:3f:a1:61:eb: c1:ad:a3:d5:d0:2e:48:18:78:c6:24:38:0f:26:29:8d: fe:3e:50:64:11:69:90:26:b4:d5:8e:33:ce:da:e8:bd: 63:ed:cf:e8:16:2b:1b:26:6c:d4:95:c9:9b:87:e7:dd: 2b:47:bb:75:e3:5d:b8:d4:cd:fc:2a:2a:81:b0:32:5b: e3:d8:82:59:3f:a8:7d:11:f1:5c:b9:2e:7c:6c:85:02: fe:8a:0b:eb:eb:9b:d4:f1:37:7a:f3:be:21:a9:21:d0: c2:db:a6:03:1a:b9:b2:1d:25:9e:6e:09:d6:97:a1:cf: 25:0b:fd:2b:85:d3:72:cb:8f:1e:b2:32:4c:d3:06:1f: d5:7b:92:f4:7a:fa:09:1f:5d:e8:93:bf:11:68:eb:c0: 4a:66:d0:f8:24:9b:69:2a:f2:2b:38:b1:bf:8e:5e:52: fa:bc:27:27:fa:99:32:53:19:fa:3c:34:36:51:ff:cf: 92:27:79:ba:1a:f6:e1:48:59:1f:b3:84:c0:47:fa:dd Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:7d:23:63:57:7a:63:2b:3e:02:86:c3:d4: f2:19:7e:b5:86:5f:31:30:23:ce:4c:ca:4b:08:53:01: 02:1c:23:2f:eb:09:0b:bf:04:7b:61:73:0f:43:8e:14: 49:a8:80:dc:11:b4:df:cf:b3:45:b2:29:0c:42 Fingerprint (SHA-256): 3A:BA:80:B8:78:F7:8F:40:24:5D:92:F8:21:6F:7B:E2:C2:27:D2:87:E6:92:FD:D5:BC:22:A2:A7:99:D3:84:7F Fingerprint (SHA1): 70:90:81:1F:39:35:FA:D7:F6:F9:24:15:CA:8E:BC:3A:E5:32:D7:C7 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #3688: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3689: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3690: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3691: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #3692: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3693: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3694: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3695: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3696: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3697: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3698: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3699: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #3700: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3701: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3702: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3703: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #3704: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3705: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3706: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3707: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3708: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3709: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3710: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3711: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #3712: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3713: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3714: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3715: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170331160426Z nextupdate=20180331160426Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Mar 31 16:04:26 2017 Next Update: Sat Mar 31 16:04:26 2018 CRL Extensions: chains.sh: #3716: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331160426Z nextupdate=20180331160426Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 16:04:26 2017 Next Update: Sat Mar 31 16:04:26 2018 CRL Extensions: chains.sh: #3717: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170331160427Z nextupdate=20180331160427Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Mar 31 16:04:27 2017 Next Update: Sat Mar 31 16:04:27 2018 CRL Extensions: chains.sh: #3718: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170331160428Z nextupdate=20180331160428Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Mar 31 16:04:28 2017 Next Update: Sat Mar 31 16:04:28 2018 CRL Extensions: chains.sh: #3719: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170331160429Z addcert 14 20170331160429Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Mar 31 16:04:29 2017 Next Update: Sat Mar 31 16:04:27 2018 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Mar 31 16:04:29 2017 CRL Extensions: chains.sh: #3720: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331160430Z addcert 15 20170331160430Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 16:04:30 2017 Next Update: Sat Mar 31 16:04:26 2018 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Mar 31 16:04:30 2017 CRL Extensions: chains.sh: #3721: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3722: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3723: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #3724: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #3725: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #3726: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #3727: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #3728: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #3729: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #3730: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:02:57 2017 Not After : Thu Mar 31 16:02:57 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:87:bc:4b:58:86:90:09:21:44:39:37:8a:de:08:08: 3a:d5:41:0b:8e:87:0d:48:51:52:5e:0e:99:e2:22:7c: 31:0f:6a:fd:fc:24:df:62:7f:0e:9c:fd:28:fe:2a:e5: 13:a1:86:73:e6:05:ff:5d:74:bc:a6:5c:01:b4:ce:9a: 6f:29:d8:d8:50:9b:09:c4:fe:a9:e7:95:38:cc:1c:86: d3:a2:9f:9e:c3:6c:97:05:7e:24:c9:0e:b0:b0:22:23: fa:85:e0:7e:d8:17:2a:76:bf:9e:ce:68:51:e1:52:2d: bc:97:87:1e:fb:c9:5f:15:f0:14:95:6f:89:f8:cd:f1: 14:0a:e9:86:2b:70:59:fb:04:42:7a:ad:84:61:08:dd: c6:2a:78:c5:60:11:52:c6:a0:24:bc:a5:fe:38:f2:11: a4:28:2a:cd:d9:5b:fd:2a:18:13:9b:7d:c5:8f:75:81: ce:4b:3e:6b:28:97:d4:53:75:26:fe:67:cd:d8:df:92: 15:e1:26:5a:a1:de:8d:50:35:7d:d8:ee:ff:55:a9:65: bd:52:45:7d:e1:b0:08:c4:47:00:74:48:77:86:82:59: 34:71:36:36:13:05:fd:55:e8:37:2c:9e:74:35:9b:5d: e8:9d:7b:a9:00:15:57:7e:6e:42:ec:63:1f:e4:98:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 64:8d:11:ac:83:6c:45:2f:72:18:b9:e3:36:2d:d7:8f: c6:2d:7a:2f:df:35:02:f2:58:b8:04:17:6b:69:f9:2c: 81:47:6f:a6:fb:e8:a6:cc:9c:28:35:2d:a2:e8:66:45: 92:4d:14:e3:6b:93:16:8e:82:01:ef:f3:11:e2:7c:14: ed:26:2f:f2:f7:e0:ee:24:ed:e9:2c:11:b6:3c:ac:bc: 03:4d:0e:fb:8b:b4:f7:b8:c9:13:fc:9a:5e:17:56:94: 6d:8a:ae:5f:ba:5b:59:cf:ac:37:5c:b4:61:3d:a2:e8: 0f:7f:9d:2c:42:f6:fe:61:26:8e:b8:30:1c:39:ee:cb: 3c:c8:26:1f:6a:13:2c:aa:c9:73:fa:9b:f6:e3:c3:5d: 1c:c7:2a:a4:f9:54:0a:27:c3:ac:33:16:fb:dd:46:1b: f6:e7:63:16:cf:2d:8e:0a:fd:41:48:64:ea:fc:23:74: ac:9f:84:21:60:ac:ca:61:79:eb:77:40:36:83:8b:85: 65:a7:54:19:38:43:51:90:9b:43:a5:e3:df:66:8d:a9: e0:b6:75:b6:5d:5d:70:73:78:01:29:31:f3:bd:29:1c: 04:41:15:40:6e:1f:ec:1c:b1:81:2a:ce:1c:af:cd:26: 97:7f:a6:50:af:64:c6:a9:6b:e6:17:2e:b0:7f:89:5a Fingerprint (SHA-256): 22:FC:8B:19:14:6A:88:D9:9B:D3:C2:C0:9C:E9:09:62:D4:70:E3:CD:24:3E:EE:F8:C4:FE:FC:79:4D:28:44:D8 Fingerprint (SHA1): D9:33:7E:57:48:7A:B7:B9:A5:2F:F8:87:9B:25:EF:71:B2:84:9E:20 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3731: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3732: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:02:57 2017 Not After : Thu Mar 31 16:02:57 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:87:bc:4b:58:86:90:09:21:44:39:37:8a:de:08:08: 3a:d5:41:0b:8e:87:0d:48:51:52:5e:0e:99:e2:22:7c: 31:0f:6a:fd:fc:24:df:62:7f:0e:9c:fd:28:fe:2a:e5: 13:a1:86:73:e6:05:ff:5d:74:bc:a6:5c:01:b4:ce:9a: 6f:29:d8:d8:50:9b:09:c4:fe:a9:e7:95:38:cc:1c:86: d3:a2:9f:9e:c3:6c:97:05:7e:24:c9:0e:b0:b0:22:23: fa:85:e0:7e:d8:17:2a:76:bf:9e:ce:68:51:e1:52:2d: bc:97:87:1e:fb:c9:5f:15:f0:14:95:6f:89:f8:cd:f1: 14:0a:e9:86:2b:70:59:fb:04:42:7a:ad:84:61:08:dd: c6:2a:78:c5:60:11:52:c6:a0:24:bc:a5:fe:38:f2:11: a4:28:2a:cd:d9:5b:fd:2a:18:13:9b:7d:c5:8f:75:81: ce:4b:3e:6b:28:97:d4:53:75:26:fe:67:cd:d8:df:92: 15:e1:26:5a:a1:de:8d:50:35:7d:d8:ee:ff:55:a9:65: bd:52:45:7d:e1:b0:08:c4:47:00:74:48:77:86:82:59: 34:71:36:36:13:05:fd:55:e8:37:2c:9e:74:35:9b:5d: e8:9d:7b:a9:00:15:57:7e:6e:42:ec:63:1f:e4:98:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 64:8d:11:ac:83:6c:45:2f:72:18:b9:e3:36:2d:d7:8f: c6:2d:7a:2f:df:35:02:f2:58:b8:04:17:6b:69:f9:2c: 81:47:6f:a6:fb:e8:a6:cc:9c:28:35:2d:a2:e8:66:45: 92:4d:14:e3:6b:93:16:8e:82:01:ef:f3:11:e2:7c:14: ed:26:2f:f2:f7:e0:ee:24:ed:e9:2c:11:b6:3c:ac:bc: 03:4d:0e:fb:8b:b4:f7:b8:c9:13:fc:9a:5e:17:56:94: 6d:8a:ae:5f:ba:5b:59:cf:ac:37:5c:b4:61:3d:a2:e8: 0f:7f:9d:2c:42:f6:fe:61:26:8e:b8:30:1c:39:ee:cb: 3c:c8:26:1f:6a:13:2c:aa:c9:73:fa:9b:f6:e3:c3:5d: 1c:c7:2a:a4:f9:54:0a:27:c3:ac:33:16:fb:dd:46:1b: f6:e7:63:16:cf:2d:8e:0a:fd:41:48:64:ea:fc:23:74: ac:9f:84:21:60:ac:ca:61:79:eb:77:40:36:83:8b:85: 65:a7:54:19:38:43:51:90:9b:43:a5:e3:df:66:8d:a9: e0:b6:75:b6:5d:5d:70:73:78:01:29:31:f3:bd:29:1c: 04:41:15:40:6e:1f:ec:1c:b1:81:2a:ce:1c:af:cd:26: 97:7f:a6:50:af:64:c6:a9:6b:e6:17:2e:b0:7f:89:5a Fingerprint (SHA-256): 22:FC:8B:19:14:6A:88:D9:9B:D3:C2:C0:9C:E9:09:62:D4:70:E3:CD:24:3E:EE:F8:C4:FE:FC:79:4D:28:44:D8 Fingerprint (SHA1): D9:33:7E:57:48:7A:B7:B9:A5:2F:F8:87:9B:25:EF:71:B2:84:9E:20 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3733: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3734: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3735: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153440 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3736: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3737: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #3738: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3739: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 331153441 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3740: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3741: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3742: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331153331.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3743: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331153316.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3744: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3745: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #3746: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331153331.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3747: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 331153442 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3748: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3749: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3750: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331153331.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3751: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331153317.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3752: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3753: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #3754: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3755: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 331153443 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3756: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3757: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3758: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331153331.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3759: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331153318.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3760: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3761: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3762: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331153331.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3763: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331153319.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3764: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3765: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170331160605Z nextupdate=20180331160605Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Mar 31 16:06:05 2017 Next Update: Sat Mar 31 16:06:05 2018 CRL Extensions: chains.sh: #3766: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331160606Z nextupdate=20180331160606Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 16:06:06 2017 Next Update: Sat Mar 31 16:06:06 2018 CRL Extensions: chains.sh: #3767: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170331160607Z nextupdate=20180331160607Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Mar 31 16:06:07 2017 Next Update: Sat Mar 31 16:06:07 2018 CRL Extensions: chains.sh: #3768: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170331160607Z nextupdate=20180331160607Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Mar 31 16:06:07 2017 Next Update: Sat Mar 31 16:06:07 2018 CRL Extensions: chains.sh: #3769: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331160608Z addcert 20 20170331160608Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 16:06:08 2017 Next Update: Sat Mar 31 16:06:06 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Mar 31 16:06:08 2017 CRL Extensions: chains.sh: #3770: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331160609Z addcert 40 20170331160609Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 16:06:09 2017 Next Update: Sat Mar 31 16:06:06 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Mar 31 16:06:08 2017 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Mar 31 16:06:09 2017 CRL Extensions: chains.sh: #3771: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3772: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3773: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #3774: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153440 (0x13bd0020) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:04:50 2017 Not After : Thu Mar 31 16:04:50 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:a8:87:45:67:43:80:66:2c:25:3e:52:eb:d9:1c:3a: a9:aa:85:19:26:ae:a3:6f:a1:57:9d:38:8f:f0:b4:de: 9e:02:0f:59:8e:40:8d:6a:e0:d2:ef:9a:ff:61:3a:a5: a1:aa:43:6b:91:93:09:57:6b:68:1a:6b:57:f8:cf:d8: 67:c0:44:ba:98:b6:31:6d:57:11:77:76:2d:b1:68:28: 4e:8a:ad:22:c9:81:64:15:47:0a:37:9f:80:78:86:1f: e0:fd:45:d9:7e:9b:dc:10:01:ed:2a:0e:aa:e6:83:f6: 36:76:81:9d:9f:28:29:a4:fc:59:d8:bb:d2:1d:5b:e8: 4f:84:e1:1a:fc:8f:b7:74:f5:3d:66:1f:52:ee:9e:1d: 39:24:de:04:9f:53:47:34:12:f7:13:7b:fb:43:2b:49: fb:07:88:5a:7a:37:fc:29:59:84:e5:52:ac:1c:51:fc: 5b:c4:1d:39:93:50:4c:2c:48:bf:53:58:f8:62:34:ce: 3f:7a:78:39:66:d2:46:04:1f:20:7f:f2:29:e3:a4:7d: b1:9a:92:9b:83:9c:1d:7e:c9:d7:04:32:39:83:99:ca: 46:04:45:af:cd:d7:07:0b:74:8b:47:2b:04:82:6c:c9: a6:2e:ae:26:8f:ef:12:1b:ff:85:b4:33:d1:5a:9e:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bd:e9:f7:b3:5d:8f:1e:92:3a:9d:d0:90:5e:15:a3:f0: c5:01:6f:b9:07:a9:8a:82:7a:d9:d0:7c:12:88:9b:47: f5:55:d1:b8:2f:9c:9e:1a:e2:1e:0c:e5:dd:d2:73:87: 71:b9:84:ff:1c:5a:58:95:77:12:6d:e0:01:45:dc:5e: 53:dd:83:bb:7a:fc:8e:1b:1a:d1:0e:3e:1f:d6:b2:19: 7b:72:2e:e7:57:45:8b:55:38:c4:fb:fb:95:53:34:14: 27:84:62:0f:16:10:29:8e:38:51:12:23:94:e0:8e:c0: 1e:bd:ab:07:26:ee:ef:56:42:9e:a0:d6:c1:55:27:ca: a0:aa:34:01:76:46:0c:a8:ef:30:db:2b:ba:df:0f:5f: 85:81:38:f8:15:44:62:69:22:dd:dc:6a:ae:ad:76:8c: 3f:a5:3a:68:c9:b1:2b:6c:b5:6f:e1:61:a5:df:45:31: eb:e4:2e:3a:5d:7f:ff:96:a3:74:5a:23:f9:90:90:e3: b7:cd:eb:91:95:7b:d5:67:f2:86:f1:83:c9:48:57:0c: c8:1d:7e:94:84:61:2d:b0:40:ce:72:61:63:b8:05:35: 47:75:77:69:11:43:ed:e4:49:d0:53:1f:09:21:6a:71: 86:21:64:62:b8:b3:16:86:7e:90:b5:2f:30:5d:e6:ab Fingerprint (SHA-256): 2C:39:D4:73:33:B8:B1:39:20:67:0B:A3:C8:CA:FF:D0:97:D2:7F:99:9E:89:CD:18:70:A8:C4:F4:1D:81:12:57 Fingerprint (SHA1): 72:4A:A3:21:3D:26:38:DC:37:69:FB:75:2A:B0:8D:36:D4:4C:21:76 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3775: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3776: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153440 (0x13bd0020) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:04:50 2017 Not After : Thu Mar 31 16:04:50 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:a8:87:45:67:43:80:66:2c:25:3e:52:eb:d9:1c:3a: a9:aa:85:19:26:ae:a3:6f:a1:57:9d:38:8f:f0:b4:de: 9e:02:0f:59:8e:40:8d:6a:e0:d2:ef:9a:ff:61:3a:a5: a1:aa:43:6b:91:93:09:57:6b:68:1a:6b:57:f8:cf:d8: 67:c0:44:ba:98:b6:31:6d:57:11:77:76:2d:b1:68:28: 4e:8a:ad:22:c9:81:64:15:47:0a:37:9f:80:78:86:1f: e0:fd:45:d9:7e:9b:dc:10:01:ed:2a:0e:aa:e6:83:f6: 36:76:81:9d:9f:28:29:a4:fc:59:d8:bb:d2:1d:5b:e8: 4f:84:e1:1a:fc:8f:b7:74:f5:3d:66:1f:52:ee:9e:1d: 39:24:de:04:9f:53:47:34:12:f7:13:7b:fb:43:2b:49: fb:07:88:5a:7a:37:fc:29:59:84:e5:52:ac:1c:51:fc: 5b:c4:1d:39:93:50:4c:2c:48:bf:53:58:f8:62:34:ce: 3f:7a:78:39:66:d2:46:04:1f:20:7f:f2:29:e3:a4:7d: b1:9a:92:9b:83:9c:1d:7e:c9:d7:04:32:39:83:99:ca: 46:04:45:af:cd:d7:07:0b:74:8b:47:2b:04:82:6c:c9: a6:2e:ae:26:8f:ef:12:1b:ff:85:b4:33:d1:5a:9e:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bd:e9:f7:b3:5d:8f:1e:92:3a:9d:d0:90:5e:15:a3:f0: c5:01:6f:b9:07:a9:8a:82:7a:d9:d0:7c:12:88:9b:47: f5:55:d1:b8:2f:9c:9e:1a:e2:1e:0c:e5:dd:d2:73:87: 71:b9:84:ff:1c:5a:58:95:77:12:6d:e0:01:45:dc:5e: 53:dd:83:bb:7a:fc:8e:1b:1a:d1:0e:3e:1f:d6:b2:19: 7b:72:2e:e7:57:45:8b:55:38:c4:fb:fb:95:53:34:14: 27:84:62:0f:16:10:29:8e:38:51:12:23:94:e0:8e:c0: 1e:bd:ab:07:26:ee:ef:56:42:9e:a0:d6:c1:55:27:ca: a0:aa:34:01:76:46:0c:a8:ef:30:db:2b:ba:df:0f:5f: 85:81:38:f8:15:44:62:69:22:dd:dc:6a:ae:ad:76:8c: 3f:a5:3a:68:c9:b1:2b:6c:b5:6f:e1:61:a5:df:45:31: eb:e4:2e:3a:5d:7f:ff:96:a3:74:5a:23:f9:90:90:e3: b7:cd:eb:91:95:7b:d5:67:f2:86:f1:83:c9:48:57:0c: c8:1d:7e:94:84:61:2d:b0:40:ce:72:61:63:b8:05:35: 47:75:77:69:11:43:ed:e4:49:d0:53:1f:09:21:6a:71: 86:21:64:62:b8:b3:16:86:7e:90:b5:2f:30:5d:e6:ab Fingerprint (SHA-256): 2C:39:D4:73:33:B8:B1:39:20:67:0B:A3:C8:CA:FF:D0:97:D2:7F:99:9E:89:CD:18:70:A8:C4:F4:1D:81:12:57 Fingerprint (SHA1): 72:4A:A3:21:3D:26:38:DC:37:69:FB:75:2A:B0:8D:36:D4:4C:21:76 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3777: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3778: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #3779: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153444 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3780: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #3781: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3782: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3783: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 331153445 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3784: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3785: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3786: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3787: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331153446 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3788: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3789: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3790: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3791: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 331153447 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3792: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3793: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #3794: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153448 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3795: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #3796: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #3797: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3798: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 331153449 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3799: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3800: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3801: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3802: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 331153450 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3803: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3804: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #3805: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #3806: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #3807: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153444 (0x13bd0024) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:06:26 2017 Not After : Thu Mar 31 16:06:26 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:54:4b:84:c1:30:bf:cf:39:a5:70:41:25:78:b2:53: 89:72:c7:5a:3c:6e:2d:5d:31:bd:69:05:1a:5c:69:32: c5:ca:05:c2:71:c4:7d:2b:7f:34:f6:10:4e:92:d6:7a: d0:1d:2c:f2:c3:b9:76:aa:ed:6f:1f:34:01:c7:f9:a0: 48:c2:5c:e8:5e:26:37:39:d0:58:1c:0f:80:42:6e:ba: 94:fc:b2:6e:2c:09:33:bb:3d:be:58:e9:66:bf:29:fa: 45:27:80:78:2a:85:d0:89:e9:ae:d5:c7:fa:bb:9e:58: 20:f9:d6:39:83:b7:a4:24:45:b8:ab:cb:a7:16:c4:6e: 88:69:43:cc:7b:73:5d:f6:a6:6c:07:29:8a:37:b5:06: 3f:92:b8:f8:0b:01:9a:f2:eb:52:03:b8:24:9b:60:3a: 76:f2:4b:a3:48:5b:91:30:63:bb:91:a5:47:c4:a2:c1: d1:5d:c8:4c:a9:f2:3f:49:cc:e0:73:75:f6:1e:a1:67: 3f:fa:81:71:2c:69:6f:37:a6:cb:da:e3:77:2b:29:0c: 32:dd:02:53:ba:e2:3b:ef:e4:71:a7:d9:41:be:36:3b: 8c:f8:8d:5d:7c:39:5a:ba:d7:5b:ba:12:9a:1d:06:8d: d3:32:f2:8b:ec:a8:3d:04:ce:e5:94:4c:06:3f:59:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:37:df:43:1f:c4:b4:4e:75:56:10:0d:c1:75:20:c3: d2:25:a6:41:b2:5b:60:58:e4:7b:ce:d9:ed:b3:21:11: e8:95:48:ce:0a:8e:98:9e:fe:18:db:70:6c:9e:41:04: 7b:6a:9f:be:6f:66:64:8c:f9:9b:1b:b3:0a:5f:6a:19: 7b:c8:4e:5e:50:ad:71:b8:47:e7:fd:24:af:ed:63:29: 9e:91:e1:e9:33:54:3b:af:eb:9e:4b:e3:5a:fa:c4:b5: 37:61:5d:7b:a7:dc:22:0c:46:2d:22:01:f4:6e:f0:19: 84:c2:15:2e:1e:9b:46:f5:8e:35:f7:2b:ad:a5:84:d9: 2b:72:f8:b4:af:e1:93:d6:bf:ef:4b:75:26:9b:83:0f: c3:2a:fa:a3:40:78:77:e6:d8:3c:25:65:01:38:74:b0: 93:b4:ff:da:de:04:f1:65:58:41:34:d0:f1:b6:58:de: f1:ec:2b:3a:8c:ae:86:67:85:3b:4e:fe:92:40:6c:f9: 68:48:0f:94:c6:6f:78:d1:24:8e:ec:a2:5b:87:a5:d4: 6a:48:f2:4d:9d:41:6d:97:99:b1:0e:26:ae:f9:af:66: 19:ee:9c:93:94:cb:4c:8c:e2:44:5f:a6:05:8e:6c:89: 6d:e6:8c:ce:dd:39:89:e9:b7:32:04:5c:1a:f9:74:3a Fingerprint (SHA-256): 86:F5:03:90:7A:54:DA:EF:05:F9:A9:D7:79:BB:65:96:87:10:40:BB:51:0A:21:71:99:EA:7A:DB:06:24:8D:13 Fingerprint (SHA1): D5:FD:37:C0:9F:13:55:CA:8E:4D:F1:BD:13:78:6B:2D:C0:B1:63:A9 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3808: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153446 (0x13bd0026) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 16:06:53 2017 Not After : Thu Mar 31 16:06:53 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:35:97:59:51:d9:a1:ce:38:29:83:aa:24:43:3e:b0: 70:59:f1:a3:34:a3:8b:3c:08:17:9e:6a:b2:7c:4a:18: 60:48:66:c0:c4:db:8a:5c:bd:21:32:ba:40:84:85:10: 71:95:a4:b1:a5:1c:9d:25:50:6c:a5:eb:f3:07:d6:91: b1:94:23:08:bb:a5:21:9f:af:42:bc:df:87:55:28:39: f5:5d:a8:94:f5:14:37:66:67:6e:f9:99:1f:50:83:41: 5e:f6:ba:2b:c4:ff:d6:a5:03:1f:ac:98:89:50:5a:ba: f4:52:cb:2c:80:fe:64:7e:94:0d:9b:2e:13:81:77:bc: e1:e1:71:82:81:13:32:b8:80:eb:e7:76:5e:8f:03:1f: 68:02:25:0a:76:5a:3b:c8:8b:93:c7:b0:fe:5c:42:74: ac:be:56:8c:74:99:8c:00:67:f6:63:0c:1b:ac:80:b1: 8d:50:0c:90:2f:6f:f9:6d:69:de:01:2a:c5:27:d6:1a: 8c:26:55:11:89:fe:cb:e0:45:22:06:a2:a6:a2:7a:c5: 4d:d4:83:48:d6:18:0a:14:39:2d:f6:e3:fd:76:0a:63: 0a:92:70:f6:c3:74:68:5f:0c:a0:00:f7:09:1d:3c:eb: e4:7d:e1:f2:14:55:64:c9:7b:af:c8:74:56:b1:94:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:00:28:fc:03:b1:a9:03:f1:d5:fe:f1:e0:fd:0e:25: ce:6c:e1:41:e2:c2:be:13:1c:4b:4c:ff:17:58:5a:0c: d1:94:12:f6:ad:32:93:14:b2:77:a0:94:23:02:89:0f: c6:99:b0:21:f6:5e:51:e5:95:97:c7:9e:e3:89:f2:c5: 45:03:1b:9c:76:ab:90:9d:03:ed:67:a1:6b:9e:c4:c9: fd:33:79:1c:6c:e3:7b:11:3c:1b:f7:7b:d6:93:04:cd: eb:c6:0e:7d:1f:27:a2:1d:90:27:60:2d:f5:ce:96:07: 28:b9:d5:94:a9:f0:2d:5c:70:3e:86:c6:3d:5a:73:68: f5:a3:a8:ca:a0:31:2c:65:f3:52:ed:0c:14:3f:66:36: a0:8b:af:89:d9:46:bb:b9:46:85:c5:cf:9c:16:ce:11: de:0e:3d:61:43:10:0f:15:f9:e2:d0:81:44:2c:04:08: 37:e9:09:1c:13:d5:7d:d6:c7:dc:58:69:2c:a6:70:15: 81:92:06:30:dc:a5:d0:6b:0a:0c:1b:51:bf:ba:03:94: 1b:9a:8a:0a:a7:2e:1c:c5:f1:9e:c8:e7:a6:d2:97:0a: a0:6f:4e:ff:ac:a9:75:a0:c2:c5:c3:4e:a6:2f:78:0f: ca:65:c3:07:48:93:37:d9:b5:17:38:ae:9e:3a:02:83 Fingerprint (SHA-256): DF:F6:66:EC:C3:4C:42:D4:80:41:3A:BE:D5:68:C2:55:43:AE:44:C2:8B:16:A8:45:A5:E2:17:9A:6B:1C:EC:E0 Fingerprint (SHA1): DF:08:20:5C:54:06:71:4A:B9:33:F3:39:4D:CB:34:73:F7:94:37:EC Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #3809: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153444 (0x13bd0024) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:06:26 2017 Not After : Thu Mar 31 16:06:26 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:54:4b:84:c1:30:bf:cf:39:a5:70:41:25:78:b2:53: 89:72:c7:5a:3c:6e:2d:5d:31:bd:69:05:1a:5c:69:32: c5:ca:05:c2:71:c4:7d:2b:7f:34:f6:10:4e:92:d6:7a: d0:1d:2c:f2:c3:b9:76:aa:ed:6f:1f:34:01:c7:f9:a0: 48:c2:5c:e8:5e:26:37:39:d0:58:1c:0f:80:42:6e:ba: 94:fc:b2:6e:2c:09:33:bb:3d:be:58:e9:66:bf:29:fa: 45:27:80:78:2a:85:d0:89:e9:ae:d5:c7:fa:bb:9e:58: 20:f9:d6:39:83:b7:a4:24:45:b8:ab:cb:a7:16:c4:6e: 88:69:43:cc:7b:73:5d:f6:a6:6c:07:29:8a:37:b5:06: 3f:92:b8:f8:0b:01:9a:f2:eb:52:03:b8:24:9b:60:3a: 76:f2:4b:a3:48:5b:91:30:63:bb:91:a5:47:c4:a2:c1: d1:5d:c8:4c:a9:f2:3f:49:cc:e0:73:75:f6:1e:a1:67: 3f:fa:81:71:2c:69:6f:37:a6:cb:da:e3:77:2b:29:0c: 32:dd:02:53:ba:e2:3b:ef:e4:71:a7:d9:41:be:36:3b: 8c:f8:8d:5d:7c:39:5a:ba:d7:5b:ba:12:9a:1d:06:8d: d3:32:f2:8b:ec:a8:3d:04:ce:e5:94:4c:06:3f:59:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:37:df:43:1f:c4:b4:4e:75:56:10:0d:c1:75:20:c3: d2:25:a6:41:b2:5b:60:58:e4:7b:ce:d9:ed:b3:21:11: e8:95:48:ce:0a:8e:98:9e:fe:18:db:70:6c:9e:41:04: 7b:6a:9f:be:6f:66:64:8c:f9:9b:1b:b3:0a:5f:6a:19: 7b:c8:4e:5e:50:ad:71:b8:47:e7:fd:24:af:ed:63:29: 9e:91:e1:e9:33:54:3b:af:eb:9e:4b:e3:5a:fa:c4:b5: 37:61:5d:7b:a7:dc:22:0c:46:2d:22:01:f4:6e:f0:19: 84:c2:15:2e:1e:9b:46:f5:8e:35:f7:2b:ad:a5:84:d9: 2b:72:f8:b4:af:e1:93:d6:bf:ef:4b:75:26:9b:83:0f: c3:2a:fa:a3:40:78:77:e6:d8:3c:25:65:01:38:74:b0: 93:b4:ff:da:de:04:f1:65:58:41:34:d0:f1:b6:58:de: f1:ec:2b:3a:8c:ae:86:67:85:3b:4e:fe:92:40:6c:f9: 68:48:0f:94:c6:6f:78:d1:24:8e:ec:a2:5b:87:a5:d4: 6a:48:f2:4d:9d:41:6d:97:99:b1:0e:26:ae:f9:af:66: 19:ee:9c:93:94:cb:4c:8c:e2:44:5f:a6:05:8e:6c:89: 6d:e6:8c:ce:dd:39:89:e9:b7:32:04:5c:1a:f9:74:3a Fingerprint (SHA-256): 86:F5:03:90:7A:54:DA:EF:05:F9:A9:D7:79:BB:65:96:87:10:40:BB:51:0A:21:71:99:EA:7A:DB:06:24:8D:13 Fingerprint (SHA1): D5:FD:37:C0:9F:13:55:CA:8E:4D:F1:BD:13:78:6B:2D:C0:B1:63:A9 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3810: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #3811: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153444 (0x13bd0024) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:06:26 2017 Not After : Thu Mar 31 16:06:26 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:54:4b:84:c1:30:bf:cf:39:a5:70:41:25:78:b2:53: 89:72:c7:5a:3c:6e:2d:5d:31:bd:69:05:1a:5c:69:32: c5:ca:05:c2:71:c4:7d:2b:7f:34:f6:10:4e:92:d6:7a: d0:1d:2c:f2:c3:b9:76:aa:ed:6f:1f:34:01:c7:f9:a0: 48:c2:5c:e8:5e:26:37:39:d0:58:1c:0f:80:42:6e:ba: 94:fc:b2:6e:2c:09:33:bb:3d:be:58:e9:66:bf:29:fa: 45:27:80:78:2a:85:d0:89:e9:ae:d5:c7:fa:bb:9e:58: 20:f9:d6:39:83:b7:a4:24:45:b8:ab:cb:a7:16:c4:6e: 88:69:43:cc:7b:73:5d:f6:a6:6c:07:29:8a:37:b5:06: 3f:92:b8:f8:0b:01:9a:f2:eb:52:03:b8:24:9b:60:3a: 76:f2:4b:a3:48:5b:91:30:63:bb:91:a5:47:c4:a2:c1: d1:5d:c8:4c:a9:f2:3f:49:cc:e0:73:75:f6:1e:a1:67: 3f:fa:81:71:2c:69:6f:37:a6:cb:da:e3:77:2b:29:0c: 32:dd:02:53:ba:e2:3b:ef:e4:71:a7:d9:41:be:36:3b: 8c:f8:8d:5d:7c:39:5a:ba:d7:5b:ba:12:9a:1d:06:8d: d3:32:f2:8b:ec:a8:3d:04:ce:e5:94:4c:06:3f:59:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:37:df:43:1f:c4:b4:4e:75:56:10:0d:c1:75:20:c3: d2:25:a6:41:b2:5b:60:58:e4:7b:ce:d9:ed:b3:21:11: e8:95:48:ce:0a:8e:98:9e:fe:18:db:70:6c:9e:41:04: 7b:6a:9f:be:6f:66:64:8c:f9:9b:1b:b3:0a:5f:6a:19: 7b:c8:4e:5e:50:ad:71:b8:47:e7:fd:24:af:ed:63:29: 9e:91:e1:e9:33:54:3b:af:eb:9e:4b:e3:5a:fa:c4:b5: 37:61:5d:7b:a7:dc:22:0c:46:2d:22:01:f4:6e:f0:19: 84:c2:15:2e:1e:9b:46:f5:8e:35:f7:2b:ad:a5:84:d9: 2b:72:f8:b4:af:e1:93:d6:bf:ef:4b:75:26:9b:83:0f: c3:2a:fa:a3:40:78:77:e6:d8:3c:25:65:01:38:74:b0: 93:b4:ff:da:de:04:f1:65:58:41:34:d0:f1:b6:58:de: f1:ec:2b:3a:8c:ae:86:67:85:3b:4e:fe:92:40:6c:f9: 68:48:0f:94:c6:6f:78:d1:24:8e:ec:a2:5b:87:a5:d4: 6a:48:f2:4d:9d:41:6d:97:99:b1:0e:26:ae:f9:af:66: 19:ee:9c:93:94:cb:4c:8c:e2:44:5f:a6:05:8e:6c:89: 6d:e6:8c:ce:dd:39:89:e9:b7:32:04:5c:1a:f9:74:3a Fingerprint (SHA-256): 86:F5:03:90:7A:54:DA:EF:05:F9:A9:D7:79:BB:65:96:87:10:40:BB:51:0A:21:71:99:EA:7A:DB:06:24:8D:13 Fingerprint (SHA1): D5:FD:37:C0:9F:13:55:CA:8E:4D:F1:BD:13:78:6B:2D:C0:B1:63:A9 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3812: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153446 (0x13bd0026) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 16:06:53 2017 Not After : Thu Mar 31 16:06:53 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:35:97:59:51:d9:a1:ce:38:29:83:aa:24:43:3e:b0: 70:59:f1:a3:34:a3:8b:3c:08:17:9e:6a:b2:7c:4a:18: 60:48:66:c0:c4:db:8a:5c:bd:21:32:ba:40:84:85:10: 71:95:a4:b1:a5:1c:9d:25:50:6c:a5:eb:f3:07:d6:91: b1:94:23:08:bb:a5:21:9f:af:42:bc:df:87:55:28:39: f5:5d:a8:94:f5:14:37:66:67:6e:f9:99:1f:50:83:41: 5e:f6:ba:2b:c4:ff:d6:a5:03:1f:ac:98:89:50:5a:ba: f4:52:cb:2c:80:fe:64:7e:94:0d:9b:2e:13:81:77:bc: e1:e1:71:82:81:13:32:b8:80:eb:e7:76:5e:8f:03:1f: 68:02:25:0a:76:5a:3b:c8:8b:93:c7:b0:fe:5c:42:74: ac:be:56:8c:74:99:8c:00:67:f6:63:0c:1b:ac:80:b1: 8d:50:0c:90:2f:6f:f9:6d:69:de:01:2a:c5:27:d6:1a: 8c:26:55:11:89:fe:cb:e0:45:22:06:a2:a6:a2:7a:c5: 4d:d4:83:48:d6:18:0a:14:39:2d:f6:e3:fd:76:0a:63: 0a:92:70:f6:c3:74:68:5f:0c:a0:00:f7:09:1d:3c:eb: e4:7d:e1:f2:14:55:64:c9:7b:af:c8:74:56:b1:94:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:00:28:fc:03:b1:a9:03:f1:d5:fe:f1:e0:fd:0e:25: ce:6c:e1:41:e2:c2:be:13:1c:4b:4c:ff:17:58:5a:0c: d1:94:12:f6:ad:32:93:14:b2:77:a0:94:23:02:89:0f: c6:99:b0:21:f6:5e:51:e5:95:97:c7:9e:e3:89:f2:c5: 45:03:1b:9c:76:ab:90:9d:03:ed:67:a1:6b:9e:c4:c9: fd:33:79:1c:6c:e3:7b:11:3c:1b:f7:7b:d6:93:04:cd: eb:c6:0e:7d:1f:27:a2:1d:90:27:60:2d:f5:ce:96:07: 28:b9:d5:94:a9:f0:2d:5c:70:3e:86:c6:3d:5a:73:68: f5:a3:a8:ca:a0:31:2c:65:f3:52:ed:0c:14:3f:66:36: a0:8b:af:89:d9:46:bb:b9:46:85:c5:cf:9c:16:ce:11: de:0e:3d:61:43:10:0f:15:f9:e2:d0:81:44:2c:04:08: 37:e9:09:1c:13:d5:7d:d6:c7:dc:58:69:2c:a6:70:15: 81:92:06:30:dc:a5:d0:6b:0a:0c:1b:51:bf:ba:03:94: 1b:9a:8a:0a:a7:2e:1c:c5:f1:9e:c8:e7:a6:d2:97:0a: a0:6f:4e:ff:ac:a9:75:a0:c2:c5:c3:4e:a6:2f:78:0f: ca:65:c3:07:48:93:37:d9:b5:17:38:ae:9e:3a:02:83 Fingerprint (SHA-256): DF:F6:66:EC:C3:4C:42:D4:80:41:3A:BE:D5:68:C2:55:43:AE:44:C2:8B:16:A8:45:A5:E2:17:9A:6B:1C:EC:E0 Fingerprint (SHA1): DF:08:20:5C:54:06:71:4A:B9:33:F3:39:4D:CB:34:73:F7:94:37:EC Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #3813: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #3814: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #3815: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #3816: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153444 (0x13bd0024) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:06:26 2017 Not After : Thu Mar 31 16:06:26 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:54:4b:84:c1:30:bf:cf:39:a5:70:41:25:78:b2:53: 89:72:c7:5a:3c:6e:2d:5d:31:bd:69:05:1a:5c:69:32: c5:ca:05:c2:71:c4:7d:2b:7f:34:f6:10:4e:92:d6:7a: d0:1d:2c:f2:c3:b9:76:aa:ed:6f:1f:34:01:c7:f9:a0: 48:c2:5c:e8:5e:26:37:39:d0:58:1c:0f:80:42:6e:ba: 94:fc:b2:6e:2c:09:33:bb:3d:be:58:e9:66:bf:29:fa: 45:27:80:78:2a:85:d0:89:e9:ae:d5:c7:fa:bb:9e:58: 20:f9:d6:39:83:b7:a4:24:45:b8:ab:cb:a7:16:c4:6e: 88:69:43:cc:7b:73:5d:f6:a6:6c:07:29:8a:37:b5:06: 3f:92:b8:f8:0b:01:9a:f2:eb:52:03:b8:24:9b:60:3a: 76:f2:4b:a3:48:5b:91:30:63:bb:91:a5:47:c4:a2:c1: d1:5d:c8:4c:a9:f2:3f:49:cc:e0:73:75:f6:1e:a1:67: 3f:fa:81:71:2c:69:6f:37:a6:cb:da:e3:77:2b:29:0c: 32:dd:02:53:ba:e2:3b:ef:e4:71:a7:d9:41:be:36:3b: 8c:f8:8d:5d:7c:39:5a:ba:d7:5b:ba:12:9a:1d:06:8d: d3:32:f2:8b:ec:a8:3d:04:ce:e5:94:4c:06:3f:59:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:37:df:43:1f:c4:b4:4e:75:56:10:0d:c1:75:20:c3: d2:25:a6:41:b2:5b:60:58:e4:7b:ce:d9:ed:b3:21:11: e8:95:48:ce:0a:8e:98:9e:fe:18:db:70:6c:9e:41:04: 7b:6a:9f:be:6f:66:64:8c:f9:9b:1b:b3:0a:5f:6a:19: 7b:c8:4e:5e:50:ad:71:b8:47:e7:fd:24:af:ed:63:29: 9e:91:e1:e9:33:54:3b:af:eb:9e:4b:e3:5a:fa:c4:b5: 37:61:5d:7b:a7:dc:22:0c:46:2d:22:01:f4:6e:f0:19: 84:c2:15:2e:1e:9b:46:f5:8e:35:f7:2b:ad:a5:84:d9: 2b:72:f8:b4:af:e1:93:d6:bf:ef:4b:75:26:9b:83:0f: c3:2a:fa:a3:40:78:77:e6:d8:3c:25:65:01:38:74:b0: 93:b4:ff:da:de:04:f1:65:58:41:34:d0:f1:b6:58:de: f1:ec:2b:3a:8c:ae:86:67:85:3b:4e:fe:92:40:6c:f9: 68:48:0f:94:c6:6f:78:d1:24:8e:ec:a2:5b:87:a5:d4: 6a:48:f2:4d:9d:41:6d:97:99:b1:0e:26:ae:f9:af:66: 19:ee:9c:93:94:cb:4c:8c:e2:44:5f:a6:05:8e:6c:89: 6d:e6:8c:ce:dd:39:89:e9:b7:32:04:5c:1a:f9:74:3a Fingerprint (SHA-256): 86:F5:03:90:7A:54:DA:EF:05:F9:A9:D7:79:BB:65:96:87:10:40:BB:51:0A:21:71:99:EA:7A:DB:06:24:8D:13 Fingerprint (SHA1): D5:FD:37:C0:9F:13:55:CA:8E:4D:F1:BD:13:78:6B:2D:C0:B1:63:A9 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3817: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153448 (0x13bd0028) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Mar 31 16:07:08 2017 Not After : Thu Mar 31 16:07:08 2067 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:7f:16:32:39:54:db:28:5b:f7:7d:da:a5:e1:31:b2: bb:f7:73:a8:bb:73:d6:9d:cb:05:85:5f:b2:60:f4:11: 16:c3:1c:ac:f9:f7:32:44:a1:13:67:62:f3:fc:bf:81: e7:a9:9b:20:4e:88:9e:31:58:a4:3c:8f:5d:a9:95:49: d4:76:db:db:06:1c:d7:85:c0:70:d9:54:9e:1d:1e:7e: f1:18:f7:fd:59:dd:d8:25:66:7e:44:82:ea:6b:60:38: 41:b2:5e:9e:34:0f:d6:7a:5a:5f:d5:07:d0:4b:90:6b: 3c:34:17:31:1d:4b:75:af:68:9c:bb:87:ca:3a:16:df: 7b:fc:c3:2a:5f:81:5b:59:be:3e:48:38:ab:13:07:57: b4:38:f4:2b:b3:26:c7:af:b3:77:a8:cd:9c:86:86:b6: 0c:f8:75:76:d4:94:46:1b:4a:58:17:7f:96:56:88:62: ed:f5:bf:43:79:20:64:cf:29:9e:91:1e:e8:30:68:ba: 61:87:30:6d:76:d6:a8:ec:5b:0a:8b:4d:8d:75:3f:a2: fb:ae:ee:36:3a:80:37:e1:a7:93:26:7f:df:63:c4:a0: 1b:a5:bf:e3:33:73:cc:d3:8a:99:85:eb:ab:5c:5f:17: 60:70:14:ad:48:50:72:bf:ac:2a:bd:31:c7:d8:e4:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:af:52:1f:b1:03:69:33:55:6a:ea:2d:f1:a8:e5:90: df:c7:43:d7:a8:6a:fb:c5:b0:a3:02:e3:fa:26:ed:bd: 7e:fc:a4:0f:d0:2c:be:7c:c3:01:ac:71:60:b1:a3:f9: 54:9f:da:4e:58:32:e5:4c:33:19:66:59:86:65:50:9d: 99:26:4f:25:95:78:e0:a1:30:a8:93:73:12:9a:2d:3e: 20:88:54:0b:89:e1:6f:ec:83:3e:7b:d5:c6:f6:f1:b5: 2e:d5:5f:fd:8d:99:af:70:8c:16:a2:e0:d8:ba:69:51: 49:42:c9:18:1c:53:e7:c5:65:36:2d:31:ff:d8:30:41: b9:44:ed:f8:74:82:69:50:cd:2a:73:ca:bd:b8:64:7a: d8:a2:9c:20:5e:8e:8c:26:dc:4e:d2:d8:d7:ec:e0:53: 1a:13:67:91:61:8c:8c:1c:b9:76:eb:1a:16:4d:4d:ae: 6c:d2:54:bd:ef:70:a7:2e:9d:de:38:6a:fa:7f:7f:05: 04:c4:44:19:19:25:94:44:5a:ae:6f:f6:c2:34:0a:9a: 78:a7:a6:5b:3e:cc:5d:a9:94:c1:67:c6:0f:9f:cf:8f: 4d:ea:cc:9d:c9:6c:78:9f:96:16:17:c5:87:e7:46:20: cc:d7:3f:65:df:68:e8:35:50:18:da:4c:f0:dd:9a:b1 Fingerprint (SHA-256): 9F:B9:64:3A:F7:08:51:AE:35:B0:BF:EB:54:30:A2:CF:72:E7:C6:0C:1F:68:61:2D:B1:9A:7C:8A:3D:85:4A:AD Fingerprint (SHA1): BA:07:1B:72:B1:98:D6:F0:38:4A:CB:96:65:10:7B:0A:C9:5F:42:D4 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #3818: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153444 (0x13bd0024) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:06:26 2017 Not After : Thu Mar 31 16:06:26 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:54:4b:84:c1:30:bf:cf:39:a5:70:41:25:78:b2:53: 89:72:c7:5a:3c:6e:2d:5d:31:bd:69:05:1a:5c:69:32: c5:ca:05:c2:71:c4:7d:2b:7f:34:f6:10:4e:92:d6:7a: d0:1d:2c:f2:c3:b9:76:aa:ed:6f:1f:34:01:c7:f9:a0: 48:c2:5c:e8:5e:26:37:39:d0:58:1c:0f:80:42:6e:ba: 94:fc:b2:6e:2c:09:33:bb:3d:be:58:e9:66:bf:29:fa: 45:27:80:78:2a:85:d0:89:e9:ae:d5:c7:fa:bb:9e:58: 20:f9:d6:39:83:b7:a4:24:45:b8:ab:cb:a7:16:c4:6e: 88:69:43:cc:7b:73:5d:f6:a6:6c:07:29:8a:37:b5:06: 3f:92:b8:f8:0b:01:9a:f2:eb:52:03:b8:24:9b:60:3a: 76:f2:4b:a3:48:5b:91:30:63:bb:91:a5:47:c4:a2:c1: d1:5d:c8:4c:a9:f2:3f:49:cc:e0:73:75:f6:1e:a1:67: 3f:fa:81:71:2c:69:6f:37:a6:cb:da:e3:77:2b:29:0c: 32:dd:02:53:ba:e2:3b:ef:e4:71:a7:d9:41:be:36:3b: 8c:f8:8d:5d:7c:39:5a:ba:d7:5b:ba:12:9a:1d:06:8d: d3:32:f2:8b:ec:a8:3d:04:ce:e5:94:4c:06:3f:59:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:37:df:43:1f:c4:b4:4e:75:56:10:0d:c1:75:20:c3: d2:25:a6:41:b2:5b:60:58:e4:7b:ce:d9:ed:b3:21:11: e8:95:48:ce:0a:8e:98:9e:fe:18:db:70:6c:9e:41:04: 7b:6a:9f:be:6f:66:64:8c:f9:9b:1b:b3:0a:5f:6a:19: 7b:c8:4e:5e:50:ad:71:b8:47:e7:fd:24:af:ed:63:29: 9e:91:e1:e9:33:54:3b:af:eb:9e:4b:e3:5a:fa:c4:b5: 37:61:5d:7b:a7:dc:22:0c:46:2d:22:01:f4:6e:f0:19: 84:c2:15:2e:1e:9b:46:f5:8e:35:f7:2b:ad:a5:84:d9: 2b:72:f8:b4:af:e1:93:d6:bf:ef:4b:75:26:9b:83:0f: c3:2a:fa:a3:40:78:77:e6:d8:3c:25:65:01:38:74:b0: 93:b4:ff:da:de:04:f1:65:58:41:34:d0:f1:b6:58:de: f1:ec:2b:3a:8c:ae:86:67:85:3b:4e:fe:92:40:6c:f9: 68:48:0f:94:c6:6f:78:d1:24:8e:ec:a2:5b:87:a5:d4: 6a:48:f2:4d:9d:41:6d:97:99:b1:0e:26:ae:f9:af:66: 19:ee:9c:93:94:cb:4c:8c:e2:44:5f:a6:05:8e:6c:89: 6d:e6:8c:ce:dd:39:89:e9:b7:32:04:5c:1a:f9:74:3a Fingerprint (SHA-256): 86:F5:03:90:7A:54:DA:EF:05:F9:A9:D7:79:BB:65:96:87:10:40:BB:51:0A:21:71:99:EA:7A:DB:06:24:8D:13 Fingerprint (SHA1): D5:FD:37:C0:9F:13:55:CA:8E:4D:F1:BD:13:78:6B:2D:C0:B1:63:A9 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3819: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #3820: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #3821: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #3822: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #3823: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #3824: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153449 (0x13bd0029) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Mar 31 16:07:15 2017 Not After : Thu Mar 31 16:07:15 2022 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:ba:8b:0a:9b:70:8e:3c:bd:db:c0:de:af:02:55:9f: 62:a8:f5:f6:f7:70:5f:af:0b:0d:35:de:05:03:9f:cf: e9:2a:4c:99:eb:2a:fd:6f:50:d3:f6:c6:47:39:57:7d: 1a:5e:7b:7b:a0:97:6a:bb:cd:eb:fd:2d:f3:ea:ab:de: db:ee:2f:16:3c:d1:de:5c:ab:33:f6:96:a4:87:9c:4e: 6a:2f:4c:d0:94:fd:2e:cd:32:fd:b2:16:23:48:13:fe: 60:94:9e:10:4d:e9:f4:9b:68:24:25:0d:4e:c6:ce:63: 2e:ea:f9:50:21:05:bd:41:e6:ed:e3:f2:2a:7a:8d:64: ad:81:c2:f9:35:7f:79:d9:19:80:02:7c:0a:fe:09:d7: 01:f6:d8:e7:77:20:92:de:ec:59:54:8a:3f:e3:89:73: 13:df:3b:0a:6f:66:d5:0c:44:47:80:e7:5d:29:fa:b2: 28:fc:14:27:33:e9:72:14:84:08:84:20:78:8b:ea:15: 07:b4:70:8b:6a:1d:b9:c1:5c:e6:45:4e:a1:10:c2:91: 80:d0:df:06:f7:5f:1e:b8:d7:96:84:41:13:f9:b1:2f: 8c:69:7d:01:88:41:6f:00:d8:83:0c:39:12:29:50:b6: 71:18:b6:b0:4d:f3:73:0b:c6:75:07:96:95:fd:a7:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:ab:90:46:5a:5d:34:db:f7:68:74:97:db:7c:60:9a: 3c:68:25:d6:36:af:22:3d:ab:6e:d0:73:16:8b:d2:dd: 9c:07:4c:f0:d8:d9:80:8a:ad:55:da:f1:7c:94:6c:bd: 69:2e:62:55:f9:cf:60:8b:f3:e5:42:97:23:33:a4:cb: 9e:22:79:44:5a:70:75:8c:eb:73:8f:57:a6:16:b2:13: 8a:e9:a5:bf:6c:3f:18:7b:63:86:ca:ba:ad:9b:bc:28: 9c:f3:96:73:a0:4f:4a:67:bc:7c:90:f2:c1:f0:5b:b8: 52:43:81:6d:63:86:1d:e5:e3:f5:20:09:3d:cf:a0:b8: 1d:c5:23:58:62:5d:5d:7d:1e:61:b3:99:2a:fc:71:15: 59:d1:c9:1b:5c:1b:ca:61:f3:58:4b:a7:0f:c5:c6:8b: b6:ac:47:6e:3c:ee:0f:26:90:6e:4f:a8:60:d6:60:6b: 03:df:69:1d:13:94:14:97:8b:f2:40:6e:72:8e:a8:d6: 7a:40:df:69:4c:8c:3d:48:1a:85:c2:32:1f:c9:9f:63: 0a:53:3f:a6:ef:61:ad:b7:ce:7a:08:31:40:e0:f7:16: 76:58:54:fd:e2:b2:8e:97:aa:d9:77:2a:bb:bc:19:4d: 78:41:db:17:d4:37:c3:34:d9:0e:7e:06:93:0c:38:9d Fingerprint (SHA-256): 9B:C8:55:13:92:65:DC:94:BA:E0:C9:C0:05:20:C4:75:F4:E4:B7:A1:E2:D9:4F:D5:61:96:4E:EF:1D:30:45:1E Fingerprint (SHA1): 1F:E5:8D:3D:3C:13:70:8E:55:99:77:08:E3:DB:9E:0D:51:3F:A8:9A Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #3825: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #3826: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #3827: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #3828: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #3829: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #3830: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3831: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #3832: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #3833: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3834: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #3835: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #3836: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #3837: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #3838: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3839: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #3840: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3841: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #3842: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3843: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #3844: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3845: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #3846: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3847: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #3848: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 17054 at Fri Mar 31 16:08:26 UTC 2017 kill -USR1 17054 httpserv: normal termination httpserv -b -p 9636 2>/dev/null; httpserv with PID 17054 killed at Fri Mar 31 16:08:26 UTC 2017 httpserv starting at Fri Mar 31 16:08:26 UTC 2017 httpserv -D -p 9636 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/aiahttp/http_pid.2460 & trying to connect to httpserv at Fri Mar 31 16:08:26 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 retrying to connect to httpserv at Fri Mar 31 16:08:32 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 chains.sh: #3849: Waiting for Server - FAILED kill -0 606 >/dev/null 2>/dev/null httpserv with PID 606 found at Fri Mar 31 16:08:32 UTC 2017 httpserv with PID 606 started at Fri Mar 31 16:08:32 UTC 2017 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3850: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153451 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3851: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3852: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3853: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153452 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3854: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3855: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3856: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3857: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 331153453 -7 Bridge@Army < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3858: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3859: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 331153454 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3860: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3861: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3862: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3863: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3864: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 331153455 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3865: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3866: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3867: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #3868: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #3869: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153452 (0x13bd002c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 16:08:52 2017 Not After : Thu Mar 31 16:08:52 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:52:96:18:e7:ca:8f:1e:97:6e:e1:21:e9:c7:d9:51: fc:be:75:b1:f7:7f:42:e6:ed:22:92:20:62:5b:f2:34: 66:12:2e:9d:d7:3d:ca:02:dc:3c:84:ab:37:5c:7e:4a: 7a:bc:db:c7:23:48:42:a0:62:c9:4d:68:f2:4b:61:93: 2c:fe:68:ad:4d:83:2a:8a:9d:34:b3:32:38:b4:51:a8: c5:bc:74:7b:b1:93:23:92:68:76:4a:27:e4:c1:fe:cb: 05:b4:36:e5:6f:22:33:3e:9a:97:45:e5:bf:99:6c:77: 3e:50:4d:54:f7:09:55:6b:aa:69:0a:df:2f:9a:f2:91: f0:2e:39:3a:73:37:cf:f1:63:64:2d:79:fe:da:85:c1: 80:40:b5:b5:ab:b6:95:23:4a:e0:43:09:62:c3:1d:3f: bb:db:c6:c0:cb:37:a6:1a:24:ce:b8:41:2e:e3:d6:63: 94:e7:72:ef:1b:ad:b2:9f:ec:a2:05:e7:3b:46:db:49: a3:ab:96:a0:f3:0c:0a:a8:0a:5d:a7:64:e7:32:a3:9e: ea:3a:00:b0:7d:46:f6:15:c0:16:c1:7a:95:03:31:6c: d9:3a:e0:1d:2a:de:b9:83:b0:b2:86:f2:72:bf:20:c5: e9:0f:84:01:e5:4a:78:91:2b:5a:ce:a6:b0:32:ac:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:8e:b1:c6:a5:b1:14:70:17:1b:c8:66:7c:58:84:12: 73:92:31:ef:48:0d:ba:43:e3:03:bd:5f:25:83:8e:f5: a4:41:8b:b3:53:2a:4d:56:03:2d:c2:78:f0:ca:fd:2c: 9f:35:83:11:2d:76:26:4a:43:88:5a:38:0b:26:fb:55: a9:dc:bd:49:91:23:40:21:38:4d:73:f5:75:89:4d:e1: d6:01:59:e9:ae:f8:ed:8c:d8:a4:3c:be:58:5d:6d:cc: b3:ff:4d:11:88:a0:b6:fa:88:74:68:ce:eb:63:c3:0a: f8:f8:65:35:70:4b:4f:08:4a:b0:ce:9b:e9:a7:4d:1f: 36:72:b0:fe:58:a0:e7:62:92:96:e6:9a:31:85:bc:bb: cd:2f:5a:e7:c2:21:30:d5:00:08:f4:8c:21:49:1f:92: 6d:73:61:d3:bc:ea:9d:d2:0a:28:ae:15:21:5f:58:4f: 25:8c:2f:06:22:b4:30:4e:ce:e6:c0:f9:27:ce:ed:27: 56:b0:d5:01:4e:d3:6e:f8:75:c8:06:6e:fc:1a:2c:70: 9e:e9:58:4f:24:31:a6:f9:a4:1a:53:8a:9c:b3:99:ec: b0:73:54:46:31:c4:7b:71:fa:db:2a:00:fa:21:d7:8c: 79:ba:d8:af:91:99:be:bc:16:32:a0:dc:e0:8e:b2:aa Fingerprint (SHA-256): 14:AC:66:57:3A:2A:AF:1A:94:59:74:73:5F:48:D5:20:0F:8A:DB:27:A8:09:8C:C6:EB:29:81:88:62:BF:4B:C4 Fingerprint (SHA1): 1E:66:CB:FA:5D:C2:0F:7B:81:59:CF:CC:C1:F8:C7:AA:93:6E:B2:64 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3870: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153451 (0x13bd002b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 16:08:37 2017 Not After : Thu Mar 31 16:08:37 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:f3:c4:7b:e2:9b:ae:56:96:f8:cd:74:2b:9a:70:2e: df:dc:3e:3b:94:9b:dc:f2:6b:94:6a:80:e4:6e:0c:31: 17:e3:e5:8d:8b:a4:92:87:be:87:cd:45:dd:a9:48:6e: 91:69:1b:8f:d1:d4:4f:91:c5:83:6d:86:81:d6:0d:04: f2:4d:df:2b:71:c8:4c:b1:ba:5a:99:5c:9c:61:a1:60: 09:a9:fb:9a:0f:11:ab:84:49:06:77:51:96:8f:29:5f: e5:eb:2f:bf:cb:f9:15:1b:32:7b:ab:66:1d:4f:a3:2b: 14:f9:bd:40:36:82:97:64:05:19:75:18:bd:74:60:12: 7a:67:b5:5f:56:66:50:b3:e3:5f:33:18:8a:16:99:03: 22:4b:a1:a8:71:cd:4b:6e:f3:79:88:1f:15:98:31:12: 89:d6:30:b1:4b:0a:07:8b:74:a2:76:d8:5f:ef:7d:6e: 09:a4:43:9a:64:cf:39:87:aa:f2:76:2a:fa:a5:68:20: ea:29:fd:f8:75:6f:ea:35:17:d8:a7:7b:76:4b:ee:4e: 20:12:61:6e:d8:59:af:67:ae:2a:b5:34:b3:db:d4:46: c5:e2:61:a1:b7:43:0e:b6:7c:56:95:a8:6e:5d:d0:a2: 2a:c2:5d:3f:f3:3a:e1:07:3e:1e:4b:8a:e9:30:49:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:72:29:48:ba:7a:56:95:45:cc:52:1d:21:1a:2e:10: 54:6f:f2:dd:3a:f9:72:dc:60:42:56:60:fc:d2:a8:87: 65:ae:fc:df:e0:24:f9:24:25:a6:17:79:9e:17:b1:9a: ae:2b:ee:57:80:ab:21:ba:85:36:32:94:2c:6d:e6:42: 01:40:ac:4f:2b:26:e3:b3:04:58:6b:8c:72:fb:b1:02: 12:25:68:71:33:5e:65:41:94:85:3f:09:93:81:74:4b: ac:88:c4:0a:8f:23:5c:7f:c5:05:a1:68:ba:8b:b7:46: 86:18:9f:96:0a:c6:25:cb:e2:41:c6:12:00:10:ba:9f: 4c:7d:ff:d8:f7:9a:c8:94:d0:6e:52:64:8d:6c:8f:bd: 3b:b1:e0:ce:34:93:89:8a:a0:b5:92:b8:bf:61:5a:84: c7:25:7b:11:3c:6e:85:12:26:4f:b4:80:e7:aa:d1:71: 53:3a:f9:ba:e2:14:bf:af:6f:5d:09:82:65:80:1a:3e: c2:2e:f4:06:9d:79:03:ed:2c:04:30:fe:54:e8:af:59: 7d:d7:db:7f:28:27:84:82:7b:6c:2c:1f:00:ff:b0:e4: 4c:9f:e8:17:a3:e7:0b:46:63:86:84:61:d6:ce:d9:72: b2:90:c5:73:2f:6a:82:a3:31:85:83:92:39:aa:62:52 Fingerprint (SHA-256): 12:47:7F:9F:DA:CE:3A:B4:6B:F7:B3:42:E9:24:07:9E:93:19:3E:8A:23:54:B4:62:34:0D:AD:EF:64:4C:DD:D7 Fingerprint (SHA1): C7:1F:84:5B:81:47:CF:7D:24:37:FE:84:CE:DC:D0:D8:CD:6B:D9:5C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3871: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #3872: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #3873: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #3874: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153451 (0x13bd002b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 16:08:37 2017 Not After : Thu Mar 31 16:08:37 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:f3:c4:7b:e2:9b:ae:56:96:f8:cd:74:2b:9a:70:2e: df:dc:3e:3b:94:9b:dc:f2:6b:94:6a:80:e4:6e:0c:31: 17:e3:e5:8d:8b:a4:92:87:be:87:cd:45:dd:a9:48:6e: 91:69:1b:8f:d1:d4:4f:91:c5:83:6d:86:81:d6:0d:04: f2:4d:df:2b:71:c8:4c:b1:ba:5a:99:5c:9c:61:a1:60: 09:a9:fb:9a:0f:11:ab:84:49:06:77:51:96:8f:29:5f: e5:eb:2f:bf:cb:f9:15:1b:32:7b:ab:66:1d:4f:a3:2b: 14:f9:bd:40:36:82:97:64:05:19:75:18:bd:74:60:12: 7a:67:b5:5f:56:66:50:b3:e3:5f:33:18:8a:16:99:03: 22:4b:a1:a8:71:cd:4b:6e:f3:79:88:1f:15:98:31:12: 89:d6:30:b1:4b:0a:07:8b:74:a2:76:d8:5f:ef:7d:6e: 09:a4:43:9a:64:cf:39:87:aa:f2:76:2a:fa:a5:68:20: ea:29:fd:f8:75:6f:ea:35:17:d8:a7:7b:76:4b:ee:4e: 20:12:61:6e:d8:59:af:67:ae:2a:b5:34:b3:db:d4:46: c5:e2:61:a1:b7:43:0e:b6:7c:56:95:a8:6e:5d:d0:a2: 2a:c2:5d:3f:f3:3a:e1:07:3e:1e:4b:8a:e9:30:49:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:72:29:48:ba:7a:56:95:45:cc:52:1d:21:1a:2e:10: 54:6f:f2:dd:3a:f9:72:dc:60:42:56:60:fc:d2:a8:87: 65:ae:fc:df:e0:24:f9:24:25:a6:17:79:9e:17:b1:9a: ae:2b:ee:57:80:ab:21:ba:85:36:32:94:2c:6d:e6:42: 01:40:ac:4f:2b:26:e3:b3:04:58:6b:8c:72:fb:b1:02: 12:25:68:71:33:5e:65:41:94:85:3f:09:93:81:74:4b: ac:88:c4:0a:8f:23:5c:7f:c5:05:a1:68:ba:8b:b7:46: 86:18:9f:96:0a:c6:25:cb:e2:41:c6:12:00:10:ba:9f: 4c:7d:ff:d8:f7:9a:c8:94:d0:6e:52:64:8d:6c:8f:bd: 3b:b1:e0:ce:34:93:89:8a:a0:b5:92:b8:bf:61:5a:84: c7:25:7b:11:3c:6e:85:12:26:4f:b4:80:e7:aa:d1:71: 53:3a:f9:ba:e2:14:bf:af:6f:5d:09:82:65:80:1a:3e: c2:2e:f4:06:9d:79:03:ed:2c:04:30:fe:54:e8:af:59: 7d:d7:db:7f:28:27:84:82:7b:6c:2c:1f:00:ff:b0:e4: 4c:9f:e8:17:a3:e7:0b:46:63:86:84:61:d6:ce:d9:72: b2:90:c5:73:2f:6a:82:a3:31:85:83:92:39:aa:62:52 Fingerprint (SHA-256): 12:47:7F:9F:DA:CE:3A:B4:6B:F7:B3:42:E9:24:07:9E:93:19:3E:8A:23:54:B4:62:34:0D:AD:EF:64:4C:DD:D7 Fingerprint (SHA1): C7:1F:84:5B:81:47:CF:7D:24:37:FE:84:CE:DC:D0:D8:CD:6B:D9:5C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3875: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153452 (0x13bd002c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 16:08:52 2017 Not After : Thu Mar 31 16:08:52 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:52:96:18:e7:ca:8f:1e:97:6e:e1:21:e9:c7:d9:51: fc:be:75:b1:f7:7f:42:e6:ed:22:92:20:62:5b:f2:34: 66:12:2e:9d:d7:3d:ca:02:dc:3c:84:ab:37:5c:7e:4a: 7a:bc:db:c7:23:48:42:a0:62:c9:4d:68:f2:4b:61:93: 2c:fe:68:ad:4d:83:2a:8a:9d:34:b3:32:38:b4:51:a8: c5:bc:74:7b:b1:93:23:92:68:76:4a:27:e4:c1:fe:cb: 05:b4:36:e5:6f:22:33:3e:9a:97:45:e5:bf:99:6c:77: 3e:50:4d:54:f7:09:55:6b:aa:69:0a:df:2f:9a:f2:91: f0:2e:39:3a:73:37:cf:f1:63:64:2d:79:fe:da:85:c1: 80:40:b5:b5:ab:b6:95:23:4a:e0:43:09:62:c3:1d:3f: bb:db:c6:c0:cb:37:a6:1a:24:ce:b8:41:2e:e3:d6:63: 94:e7:72:ef:1b:ad:b2:9f:ec:a2:05:e7:3b:46:db:49: a3:ab:96:a0:f3:0c:0a:a8:0a:5d:a7:64:e7:32:a3:9e: ea:3a:00:b0:7d:46:f6:15:c0:16:c1:7a:95:03:31:6c: d9:3a:e0:1d:2a:de:b9:83:b0:b2:86:f2:72:bf:20:c5: e9:0f:84:01:e5:4a:78:91:2b:5a:ce:a6:b0:32:ac:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:8e:b1:c6:a5:b1:14:70:17:1b:c8:66:7c:58:84:12: 73:92:31:ef:48:0d:ba:43:e3:03:bd:5f:25:83:8e:f5: a4:41:8b:b3:53:2a:4d:56:03:2d:c2:78:f0:ca:fd:2c: 9f:35:83:11:2d:76:26:4a:43:88:5a:38:0b:26:fb:55: a9:dc:bd:49:91:23:40:21:38:4d:73:f5:75:89:4d:e1: d6:01:59:e9:ae:f8:ed:8c:d8:a4:3c:be:58:5d:6d:cc: b3:ff:4d:11:88:a0:b6:fa:88:74:68:ce:eb:63:c3:0a: f8:f8:65:35:70:4b:4f:08:4a:b0:ce:9b:e9:a7:4d:1f: 36:72:b0:fe:58:a0:e7:62:92:96:e6:9a:31:85:bc:bb: cd:2f:5a:e7:c2:21:30:d5:00:08:f4:8c:21:49:1f:92: 6d:73:61:d3:bc:ea:9d:d2:0a:28:ae:15:21:5f:58:4f: 25:8c:2f:06:22:b4:30:4e:ce:e6:c0:f9:27:ce:ed:27: 56:b0:d5:01:4e:d3:6e:f8:75:c8:06:6e:fc:1a:2c:70: 9e:e9:58:4f:24:31:a6:f9:a4:1a:53:8a:9c:b3:99:ec: b0:73:54:46:31:c4:7b:71:fa:db:2a:00:fa:21:d7:8c: 79:ba:d8:af:91:99:be:bc:16:32:a0:dc:e0:8e:b2:aa Fingerprint (SHA-256): 14:AC:66:57:3A:2A:AF:1A:94:59:74:73:5F:48:D5:20:0F:8A:DB:27:A8:09:8C:C6:EB:29:81:88:62:BF:4B:C4 Fingerprint (SHA1): 1E:66:CB:FA:5D:C2:0F:7B:81:59:CF:CC:C1:F8:C7:AA:93:6E:B2:64 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3876: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #3877: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #3878: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3879: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #3880: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #3881: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153452 (0x13bd002c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 16:08:52 2017 Not After : Thu Mar 31 16:08:52 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:52:96:18:e7:ca:8f:1e:97:6e:e1:21:e9:c7:d9:51: fc:be:75:b1:f7:7f:42:e6:ed:22:92:20:62:5b:f2:34: 66:12:2e:9d:d7:3d:ca:02:dc:3c:84:ab:37:5c:7e:4a: 7a:bc:db:c7:23:48:42:a0:62:c9:4d:68:f2:4b:61:93: 2c:fe:68:ad:4d:83:2a:8a:9d:34:b3:32:38:b4:51:a8: c5:bc:74:7b:b1:93:23:92:68:76:4a:27:e4:c1:fe:cb: 05:b4:36:e5:6f:22:33:3e:9a:97:45:e5:bf:99:6c:77: 3e:50:4d:54:f7:09:55:6b:aa:69:0a:df:2f:9a:f2:91: f0:2e:39:3a:73:37:cf:f1:63:64:2d:79:fe:da:85:c1: 80:40:b5:b5:ab:b6:95:23:4a:e0:43:09:62:c3:1d:3f: bb:db:c6:c0:cb:37:a6:1a:24:ce:b8:41:2e:e3:d6:63: 94:e7:72:ef:1b:ad:b2:9f:ec:a2:05:e7:3b:46:db:49: a3:ab:96:a0:f3:0c:0a:a8:0a:5d:a7:64:e7:32:a3:9e: ea:3a:00:b0:7d:46:f6:15:c0:16:c1:7a:95:03:31:6c: d9:3a:e0:1d:2a:de:b9:83:b0:b2:86:f2:72:bf:20:c5: e9:0f:84:01:e5:4a:78:91:2b:5a:ce:a6:b0:32:ac:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:8e:b1:c6:a5:b1:14:70:17:1b:c8:66:7c:58:84:12: 73:92:31:ef:48:0d:ba:43:e3:03:bd:5f:25:83:8e:f5: a4:41:8b:b3:53:2a:4d:56:03:2d:c2:78:f0:ca:fd:2c: 9f:35:83:11:2d:76:26:4a:43:88:5a:38:0b:26:fb:55: a9:dc:bd:49:91:23:40:21:38:4d:73:f5:75:89:4d:e1: d6:01:59:e9:ae:f8:ed:8c:d8:a4:3c:be:58:5d:6d:cc: b3:ff:4d:11:88:a0:b6:fa:88:74:68:ce:eb:63:c3:0a: f8:f8:65:35:70:4b:4f:08:4a:b0:ce:9b:e9:a7:4d:1f: 36:72:b0:fe:58:a0:e7:62:92:96:e6:9a:31:85:bc:bb: cd:2f:5a:e7:c2:21:30:d5:00:08:f4:8c:21:49:1f:92: 6d:73:61:d3:bc:ea:9d:d2:0a:28:ae:15:21:5f:58:4f: 25:8c:2f:06:22:b4:30:4e:ce:e6:c0:f9:27:ce:ed:27: 56:b0:d5:01:4e:d3:6e:f8:75:c8:06:6e:fc:1a:2c:70: 9e:e9:58:4f:24:31:a6:f9:a4:1a:53:8a:9c:b3:99:ec: b0:73:54:46:31:c4:7b:71:fa:db:2a:00:fa:21:d7:8c: 79:ba:d8:af:91:99:be:bc:16:32:a0:dc:e0:8e:b2:aa Fingerprint (SHA-256): 14:AC:66:57:3A:2A:AF:1A:94:59:74:73:5F:48:D5:20:0F:8A:DB:27:A8:09:8C:C6:EB:29:81:88:62:BF:4B:C4 Fingerprint (SHA1): 1E:66:CB:FA:5D:C2:0F:7B:81:59:CF:CC:C1:F8:C7:AA:93:6E:B2:64 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3882: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153452 (0x13bd002c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 16:08:52 2017 Not After : Thu Mar 31 16:08:52 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:52:96:18:e7:ca:8f:1e:97:6e:e1:21:e9:c7:d9:51: fc:be:75:b1:f7:7f:42:e6:ed:22:92:20:62:5b:f2:34: 66:12:2e:9d:d7:3d:ca:02:dc:3c:84:ab:37:5c:7e:4a: 7a:bc:db:c7:23:48:42:a0:62:c9:4d:68:f2:4b:61:93: 2c:fe:68:ad:4d:83:2a:8a:9d:34:b3:32:38:b4:51:a8: c5:bc:74:7b:b1:93:23:92:68:76:4a:27:e4:c1:fe:cb: 05:b4:36:e5:6f:22:33:3e:9a:97:45:e5:bf:99:6c:77: 3e:50:4d:54:f7:09:55:6b:aa:69:0a:df:2f:9a:f2:91: f0:2e:39:3a:73:37:cf:f1:63:64:2d:79:fe:da:85:c1: 80:40:b5:b5:ab:b6:95:23:4a:e0:43:09:62:c3:1d:3f: bb:db:c6:c0:cb:37:a6:1a:24:ce:b8:41:2e:e3:d6:63: 94:e7:72:ef:1b:ad:b2:9f:ec:a2:05:e7:3b:46:db:49: a3:ab:96:a0:f3:0c:0a:a8:0a:5d:a7:64:e7:32:a3:9e: ea:3a:00:b0:7d:46:f6:15:c0:16:c1:7a:95:03:31:6c: d9:3a:e0:1d:2a:de:b9:83:b0:b2:86:f2:72:bf:20:c5: e9:0f:84:01:e5:4a:78:91:2b:5a:ce:a6:b0:32:ac:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:8e:b1:c6:a5:b1:14:70:17:1b:c8:66:7c:58:84:12: 73:92:31:ef:48:0d:ba:43:e3:03:bd:5f:25:83:8e:f5: a4:41:8b:b3:53:2a:4d:56:03:2d:c2:78:f0:ca:fd:2c: 9f:35:83:11:2d:76:26:4a:43:88:5a:38:0b:26:fb:55: a9:dc:bd:49:91:23:40:21:38:4d:73:f5:75:89:4d:e1: d6:01:59:e9:ae:f8:ed:8c:d8:a4:3c:be:58:5d:6d:cc: b3:ff:4d:11:88:a0:b6:fa:88:74:68:ce:eb:63:c3:0a: f8:f8:65:35:70:4b:4f:08:4a:b0:ce:9b:e9:a7:4d:1f: 36:72:b0:fe:58:a0:e7:62:92:96:e6:9a:31:85:bc:bb: cd:2f:5a:e7:c2:21:30:d5:00:08:f4:8c:21:49:1f:92: 6d:73:61:d3:bc:ea:9d:d2:0a:28:ae:15:21:5f:58:4f: 25:8c:2f:06:22:b4:30:4e:ce:e6:c0:f9:27:ce:ed:27: 56:b0:d5:01:4e:d3:6e:f8:75:c8:06:6e:fc:1a:2c:70: 9e:e9:58:4f:24:31:a6:f9:a4:1a:53:8a:9c:b3:99:ec: b0:73:54:46:31:c4:7b:71:fa:db:2a:00:fa:21:d7:8c: 79:ba:d8:af:91:99:be:bc:16:32:a0:dc:e0:8e:b2:aa Fingerprint (SHA-256): 14:AC:66:57:3A:2A:AF:1A:94:59:74:73:5F:48:D5:20:0F:8A:DB:27:A8:09:8C:C6:EB:29:81:88:62:BF:4B:C4 Fingerprint (SHA1): 1E:66:CB:FA:5D:C2:0F:7B:81:59:CF:CC:C1:F8:C7:AA:93:6E:B2:64 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3883: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #3884: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #3885: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3886: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #3887: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #3888: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153451 (0x13bd002b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 16:08:37 2017 Not After : Thu Mar 31 16:08:37 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:f3:c4:7b:e2:9b:ae:56:96:f8:cd:74:2b:9a:70:2e: df:dc:3e:3b:94:9b:dc:f2:6b:94:6a:80:e4:6e:0c:31: 17:e3:e5:8d:8b:a4:92:87:be:87:cd:45:dd:a9:48:6e: 91:69:1b:8f:d1:d4:4f:91:c5:83:6d:86:81:d6:0d:04: f2:4d:df:2b:71:c8:4c:b1:ba:5a:99:5c:9c:61:a1:60: 09:a9:fb:9a:0f:11:ab:84:49:06:77:51:96:8f:29:5f: e5:eb:2f:bf:cb:f9:15:1b:32:7b:ab:66:1d:4f:a3:2b: 14:f9:bd:40:36:82:97:64:05:19:75:18:bd:74:60:12: 7a:67:b5:5f:56:66:50:b3:e3:5f:33:18:8a:16:99:03: 22:4b:a1:a8:71:cd:4b:6e:f3:79:88:1f:15:98:31:12: 89:d6:30:b1:4b:0a:07:8b:74:a2:76:d8:5f:ef:7d:6e: 09:a4:43:9a:64:cf:39:87:aa:f2:76:2a:fa:a5:68:20: ea:29:fd:f8:75:6f:ea:35:17:d8:a7:7b:76:4b:ee:4e: 20:12:61:6e:d8:59:af:67:ae:2a:b5:34:b3:db:d4:46: c5:e2:61:a1:b7:43:0e:b6:7c:56:95:a8:6e:5d:d0:a2: 2a:c2:5d:3f:f3:3a:e1:07:3e:1e:4b:8a:e9:30:49:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:72:29:48:ba:7a:56:95:45:cc:52:1d:21:1a:2e:10: 54:6f:f2:dd:3a:f9:72:dc:60:42:56:60:fc:d2:a8:87: 65:ae:fc:df:e0:24:f9:24:25:a6:17:79:9e:17:b1:9a: ae:2b:ee:57:80:ab:21:ba:85:36:32:94:2c:6d:e6:42: 01:40:ac:4f:2b:26:e3:b3:04:58:6b:8c:72:fb:b1:02: 12:25:68:71:33:5e:65:41:94:85:3f:09:93:81:74:4b: ac:88:c4:0a:8f:23:5c:7f:c5:05:a1:68:ba:8b:b7:46: 86:18:9f:96:0a:c6:25:cb:e2:41:c6:12:00:10:ba:9f: 4c:7d:ff:d8:f7:9a:c8:94:d0:6e:52:64:8d:6c:8f:bd: 3b:b1:e0:ce:34:93:89:8a:a0:b5:92:b8:bf:61:5a:84: c7:25:7b:11:3c:6e:85:12:26:4f:b4:80:e7:aa:d1:71: 53:3a:f9:ba:e2:14:bf:af:6f:5d:09:82:65:80:1a:3e: c2:2e:f4:06:9d:79:03:ed:2c:04:30:fe:54:e8:af:59: 7d:d7:db:7f:28:27:84:82:7b:6c:2c:1f:00:ff:b0:e4: 4c:9f:e8:17:a3:e7:0b:46:63:86:84:61:d6:ce:d9:72: b2:90:c5:73:2f:6a:82:a3:31:85:83:92:39:aa:62:52 Fingerprint (SHA-256): 12:47:7F:9F:DA:CE:3A:B4:6B:F7:B3:42:E9:24:07:9E:93:19:3E:8A:23:54:B4:62:34:0D:AD:EF:64:4C:DD:D7 Fingerprint (SHA1): C7:1F:84:5B:81:47:CF:7D:24:37:FE:84:CE:DC:D0:D8:CD:6B:D9:5C Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3889: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153451 (0x13bd002b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 16:08:37 2017 Not After : Thu Mar 31 16:08:37 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:f3:c4:7b:e2:9b:ae:56:96:f8:cd:74:2b:9a:70:2e: df:dc:3e:3b:94:9b:dc:f2:6b:94:6a:80:e4:6e:0c:31: 17:e3:e5:8d:8b:a4:92:87:be:87:cd:45:dd:a9:48:6e: 91:69:1b:8f:d1:d4:4f:91:c5:83:6d:86:81:d6:0d:04: f2:4d:df:2b:71:c8:4c:b1:ba:5a:99:5c:9c:61:a1:60: 09:a9:fb:9a:0f:11:ab:84:49:06:77:51:96:8f:29:5f: e5:eb:2f:bf:cb:f9:15:1b:32:7b:ab:66:1d:4f:a3:2b: 14:f9:bd:40:36:82:97:64:05:19:75:18:bd:74:60:12: 7a:67:b5:5f:56:66:50:b3:e3:5f:33:18:8a:16:99:03: 22:4b:a1:a8:71:cd:4b:6e:f3:79:88:1f:15:98:31:12: 89:d6:30:b1:4b:0a:07:8b:74:a2:76:d8:5f:ef:7d:6e: 09:a4:43:9a:64:cf:39:87:aa:f2:76:2a:fa:a5:68:20: ea:29:fd:f8:75:6f:ea:35:17:d8:a7:7b:76:4b:ee:4e: 20:12:61:6e:d8:59:af:67:ae:2a:b5:34:b3:db:d4:46: c5:e2:61:a1:b7:43:0e:b6:7c:56:95:a8:6e:5d:d0:a2: 2a:c2:5d:3f:f3:3a:e1:07:3e:1e:4b:8a:e9:30:49:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:72:29:48:ba:7a:56:95:45:cc:52:1d:21:1a:2e:10: 54:6f:f2:dd:3a:f9:72:dc:60:42:56:60:fc:d2:a8:87: 65:ae:fc:df:e0:24:f9:24:25:a6:17:79:9e:17:b1:9a: ae:2b:ee:57:80:ab:21:ba:85:36:32:94:2c:6d:e6:42: 01:40:ac:4f:2b:26:e3:b3:04:58:6b:8c:72:fb:b1:02: 12:25:68:71:33:5e:65:41:94:85:3f:09:93:81:74:4b: ac:88:c4:0a:8f:23:5c:7f:c5:05:a1:68:ba:8b:b7:46: 86:18:9f:96:0a:c6:25:cb:e2:41:c6:12:00:10:ba:9f: 4c:7d:ff:d8:f7:9a:c8:94:d0:6e:52:64:8d:6c:8f:bd: 3b:b1:e0:ce:34:93:89:8a:a0:b5:92:b8:bf:61:5a:84: c7:25:7b:11:3c:6e:85:12:26:4f:b4:80:e7:aa:d1:71: 53:3a:f9:ba:e2:14:bf:af:6f:5d:09:82:65:80:1a:3e: c2:2e:f4:06:9d:79:03:ed:2c:04:30:fe:54:e8:af:59: 7d:d7:db:7f:28:27:84:82:7b:6c:2c:1f:00:ff:b0:e4: 4c:9f:e8:17:a3:e7:0b:46:63:86:84:61:d6:ce:d9:72: b2:90:c5:73:2f:6a:82:a3:31:85:83:92:39:aa:62:52 Fingerprint (SHA-256): 12:47:7F:9F:DA:CE:3A:B4:6B:F7:B3:42:E9:24:07:9E:93:19:3E:8A:23:54:B4:62:34:0D:AD:EF:64:4C:DD:D7 Fingerprint (SHA1): C7:1F:84:5B:81:47:CF:7D:24:37:FE:84:CE:DC:D0:D8:CD:6B:D9:5C Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3890: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #3891: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153456 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3892: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #3893: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #3894: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153457 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3895: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #3896: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #3897: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153458 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3898: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #3899: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #3900: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153459 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3901: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #3902: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #3903: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153460 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3904: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #3905: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #3906: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153461 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3907: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #3908: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #3909: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153462 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3910: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #3911: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #3912: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153463 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3913: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #3914: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #3915: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153464 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3916: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #3917: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #3918: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3919: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 331153465 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3920: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3921: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 331153466 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3922: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3923: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 331153467 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3924: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3925: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #3926: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #3927: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3928: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 331153468 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3929: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3930: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 331153469 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3931: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3932: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 331153470 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3933: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3934: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #3935: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #3936: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3937: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 331153471 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3938: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3939: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 331153472 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3940: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3941: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 331153473 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3942: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3943: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #3944: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #3945: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3946: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 331153474 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3947: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3948: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 331153475 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3949: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3950: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 331153476 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3951: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3952: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #3953: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3954: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3955: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 331153477 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3956: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3957: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3958: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3959: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331153478 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3960: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3961: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153456 (0x13bd0030) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Mar 31 16:09:42 2017 Not After : Thu Mar 31 16:09:42 2067 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:d1:56:21:c2:72:2e:a1:84:fa:44:e9:a4:cd:1b:5e: eb:10:9a:59:1f:63:36:f8:28:53:07:6a:e7:75:cb:e7: f6:9c:c4:f9:95:65:71:a6:97:73:cc:c8:01:4e:2a:f2: 6f:13:56:f7:93:92:b0:a1:36:d4:63:bf:21:e8:30:55: 71:82:39:4c:c1:8e:03:85:9f:2b:e0:1c:43:3f:80:2e: e4:39:09:bd:93:f8:ea:5d:7a:91:ab:7f:a8:b5:c1:2b: 87:f5:4d:7d:35:6a:cc:24:43:db:39:af:c0:ea:2a:99: a4:aa:b1:98:e6:34:d8:7f:c3:f5:f2:59:74:0e:b0:d0: 2f:11:f6:02:e5:37:93:db:ff:96:e4:08:ae:91:07:2e: 34:4b:f4:15:eb:f3:1f:ae:07:af:98:ed:9e:a6:17:ae: 47:e2:a9:fe:de:aa:9a:af:1f:e6:aa:f4:1b:ab:b1:1e: fe:c5:5e:bd:b2:16:a8:ec:48:90:69:31:d6:6a:01:61: 74:26:2b:c0:c1:77:f1:d6:6e:41:73:67:fa:70:62:1c: 2d:2d:a6:f4:f9:55:f4:31:03:f8:98:bb:dd:4c:de:88: 4a:74:98:90:3b:94:e1:c1:d8:ec:8a:0a:90:9c:d2:7c: e3:f4:1c:16:6e:0c:32:27:5e:54:85:e5:5e:13:92:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:94:41:c7:40:59:e9:82:15:7b:8d:c0:28:d6:4e:c2: 73:c7:91:bd:47:7a:60:f5:96:0e:ef:ae:79:3c:8d:43: 9a:ff:e3:e5:d8:12:04:97:2c:88:da:2b:15:98:de:e3: d5:b3:af:07:d7:11:0e:aa:2e:f3:42:37:08:43:1b:23: ad:25:ac:80:37:aa:d2:2d:ea:ff:f0:68:a1:96:0d:eb: f0:fe:e1:e4:fa:56:8e:b5:b9:06:c3:01:f0:20:f1:18: 08:63:f6:91:49:d5:0e:65:66:1b:f4:54:4a:dc:9d:e1: 85:6e:e4:3c:a3:29:fd:10:97:b6:b0:60:02:a4:f1:98: 75:4f:6f:6e:ab:de:f6:c8:07:22:07:76:3b:00:ef:ba: 1c:b5:30:2d:72:1a:b6:00:2c:9e:d4:32:88:5f:f1:08: 2e:77:d6:33:8d:f6:bc:5a:87:dc:28:28:40:05:db:52: 66:fe:f4:b8:d9:5b:85:38:7f:3e:77:4c:55:16:c7:b7: 3d:93:90:fd:c9:b8:b7:43:f4:34:04:2b:78:6c:00:93: e8:4e:8c:c0:d2:75:b0:ab:3c:6c:8f:af:0f:9a:a2:58: f4:46:57:9e:c2:56:dd:fd:3d:8c:45:74:fc:24:cc:e2: 35:c4:e8:79:ea:07:fd:f6:c8:65:c9:c6:7e:ea:85:dc Fingerprint (SHA-256): 2D:23:E2:A7:52:26:3D:8B:19:8F:C4:58:26:6B:1C:92:6C:7B:57:C9:37:EF:BC:F2:C8:0B:89:0C:30:65:B9:8C Fingerprint (SHA1): 97:24:31:FB:69:05:4A:38:53:4F:C1:7E:F7:78:0B:DA:0C:FA:CB:F3 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3962: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153457 (0x13bd0031) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Mar 31 16:09:46 2017 Not After : Thu Mar 31 16:09:46 2067 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:32:9f:20:66:10:91:b8:2f:71:af:19:5d:79:4b:45: f8:c5:5b:04:6e:3c:8f:48:4b:01:eb:73:72:7c:00:d1: 82:2e:ee:8a:26:86:86:1c:c0:d6:91:f5:60:99:78:ff: 5e:0f:16:22:38:5a:de:4a:47:98:f0:a4:2c:32:5b:e3: 0b:c3:ab:fc:e3:03:da:f5:73:ef:70:04:9d:ac:dd:52: 49:ba:d0:ff:4e:fd:4c:9a:32:16:f6:e7:a3:40:ea:d4: 38:89:9d:af:b7:10:94:fa:0b:ec:3c:0f:55:ff:da:38: 4d:a6:39:a7:f9:27:03:e1:30:67:06:ff:c8:ef:58:7a: 3a:21:f1:be:97:19:cc:be:37:c2:fd:61:dd:14:30:53: c9:67:46:6a:d7:7c:df:e2:78:e7:04:e6:3d:ff:49:67: 9b:37:5c:63:36:d8:c7:4b:1a:d9:d1:e6:58:c1:93:c9: 94:c6:bc:d4:de:e7:6e:0f:6d:88:72:b7:c4:0b:de:0b: d7:43:e2:bc:40:26:28:96:6a:88:e3:83:55:f9:ab:a6: cd:ec:d1:d9:be:9e:0b:4a:cf:07:0c:fa:37:53:dc:1a: 8d:dd:5f:39:41:b3:3c:35:20:15:50:1e:7a:6f:16:0c: 6f:54:91:63:af:69:09:c2:56:46:cc:de:d0:c0:97:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cf:e1:54:98:2c:93:41:a5:ad:2d:df:61:2b:51:75:84: 82:63:08:d4:36:e8:74:1e:2e:ca:ef:d1:d3:7a:64:16: 76:d9:3e:0b:fc:5f:e2:be:b0:76:27:30:d5:72:6e:94: 17:ed:cf:76:b4:f7:e7:a9:c2:c9:12:96:96:40:d5:2f: f1:14:45:3f:24:df:52:68:69:46:82:df:1d:c9:38:ad: 1e:a2:0d:82:70:15:7d:c2:4b:2e:dc:25:f6:06:6e:ff: 8b:fb:f5:ec:3b:43:76:c0:29:e5:6b:df:9a:b9:fd:85: 34:c5:9f:c3:36:2c:65:6a:a0:03:36:58:b8:ff:62:5d: e5:7e:db:5d:3a:a4:df:a7:fb:ee:d2:9c:af:7e:e9:f9: c0:c3:be:38:1f:5b:a4:79:bd:e7:54:3e:f1:3a:2f:00: ed:5f:0f:71:6e:45:ba:15:9c:87:ed:c4:78:a2:ec:f3: 19:65:6f:fb:29:29:a1:e0:42:b7:88:56:34:12:80:b5: c0:01:42:3e:2c:e5:d5:6f:0d:ba:f1:3f:03:7c:ed:01: c7:44:dc:20:9c:80:81:b6:c4:9d:e5:e3:c5:9d:7d:cc: 2f:34:6a:50:00:53:f4:c3:1b:46:ef:7a:57:65:83:ff: 7f:8c:3d:55:dd:f4:46:b8:c8:17:47:e2:a1:06:3f:82 Fingerprint (SHA-256): BA:6C:0C:7F:49:C5:56:76:80:A0:56:F1:28:8F:9C:35:E0:A0:49:E7:9E:13:4D:2B:74:4E:5E:5B:50:54:DE:96 Fingerprint (SHA1): DB:F7:E2:7B:3A:F6:DE:56:56:A4:32:D7:3E:14:B2:94:4A:23:BD:77 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3963: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153458 (0x13bd0032) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Mar 31 16:09:52 2017 Not After : Thu Mar 31 16:09:52 2067 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:3f:d8:30:32:98:72:46:2b:9c:11:76:d7:a7:ef:7a: 2d:80:50:7b:7b:58:ef:ea:38:63:1c:1a:c8:12:9b:3c: 9b:72:51:c3:43:ee:a5:79:db:82:9c:22:62:10:d8:1a: f5:77:34:6a:5c:09:35:9a:b8:8b:1b:26:0d:e9:41:a3: 55:8c:e1:9a:65:1f:08:b7:05:c9:1d:cf:89:69:e7:8c: 8b:fa:c4:83:ed:51:85:bb:e2:50:5a:f9:b5:5d:01:cb: 43:e7:80:d3:12:3e:59:47:16:e6:bd:09:37:29:a4:2b: 24:47:21:13:03:a6:09:ba:92:34:90:77:31:c4:7f:8e: fc:91:14:65:81:4e:f7:cd:83:60:06:1c:10:37:54:2d: 1a:cc:34:61:a9:c2:d8:03:97:a7:74:c9:d3:0a:6f:1a: 35:cd:bb:f1:a7:f8:b8:ec:a2:e9:92:47:3d:e2:1b:79: b1:f8:3d:48:a2:b1:ed:75:56:1a:0e:5b:b3:61:ee:19: 92:f7:b2:0b:f4:65:a9:22:a8:4b:bb:3d:ef:4f:07:25: 11:99:91:9c:ae:f5:35:ed:bf:24:ce:3f:1c:fc:10:d7: a4:a1:7a:51:35:50:f6:eb:40:9e:fd:aa:b8:03:7e:a6: ae:ee:ba:6f:5d:f4:37:53:26:e9:24:8d:1e:a7:1f:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:b5:21:1f:1e:3d:d3:f9:30:73:fc:42:0a:bf:ff:16: 97:ca:88:d8:87:f6:89:31:1d:8f:ac:a3:9c:af:02:f9: aa:fc:04:b9:b6:94:4e:be:fc:81:0b:1a:6b:78:4f:0a: ec:a0:ac:38:d3:e3:85:4d:d9:f7:c8:76:5f:02:d0:ec: 70:38:86:46:3d:fa:21:a7:9c:dd:c0:ed:c4:c8:e5:28: 28:22:88:04:98:af:e2:37:3e:ed:4a:5b:5b:c9:bc:73: 39:a3:e3:e8:32:3e:97:c7:1d:62:12:c5:bb:49:bc:c5: 55:ec:e6:71:91:0b:79:1c:df:47:68:e3:95:44:3c:7b: 7b:9f:4d:53:a4:2d:43:4a:4d:fb:9a:b0:98:3c:39:f0: db:c0:6a:58:66:01:dc:bc:6a:9c:0d:26:ad:32:0e:a1: 50:fa:ca:f6:20:68:4b:78:b3:07:26:0a:e8:e1:54:02: d3:7b:c9:17:73:98:f4:14:25:27:d3:f2:c1:3a:34:98: 58:55:f4:3b:b0:30:bd:98:61:d7:7b:d5:dd:25:d2:ef: 41:25:71:07:86:e6:36:c2:ad:75:23:cb:fb:c9:6a:ab: f2:e1:46:2a:18:88:64:39:67:74:cc:75:54:9e:d9:d2: 5d:fc:54:39:36:eb:87:dc:9c:a9:12:42:e2:10:e2:36 Fingerprint (SHA-256): 1F:76:8F:7E:C5:B0:64:3C:F3:BF:7A:36:F0:7E:C4:B1:8B:71:3C:E4:3C:44:F0:0A:3E:6C:0A:49:A6:98:A1:36 Fingerprint (SHA1): DC:64:99:B6:CE:A2:8D:15:BD:78:BE:0D:CE:46:15:EE:F6:08:FD:B7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3964: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153459 (0x13bd0033) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Mar 31 16:09:58 2017 Not After : Thu Mar 31 16:09:58 2067 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:47:aa:e2:b7:4f:1b:6e:76:41:37:bb:0b:09:71:c8: 77:f9:9f:f2:7b:33:98:06:b6:2a:46:b3:ad:83:61:7e: b7:48:6b:26:b1:a9:e4:15:95:cd:73:8d:98:9e:d2:4b: b8:43:6f:a6:99:7f:68:ca:cb:17:f6:0d:d8:0a:d0:16: 90:04:12:d7:d1:f4:11:01:c3:fc:f3:fc:47:7f:ed:48: 90:6a:fb:ee:7e:8f:9c:25:16:a1:1e:7d:aa:20:c3:9a: 64:fa:ea:73:78:a8:5c:28:0f:c3:9e:62:4a:b1:26:26: dd:73:5f:fd:06:fc:17:55:18:b9:56:10:90:2d:60:3a: f0:cd:d1:c8:6c:09:72:45:6e:07:35:3f:e2:6a:73:1c: ac:be:c9:29:3b:00:99:40:70:61:d4:50:4a:fc:f6:60: 9e:d7:b4:05:8b:4e:18:0e:d6:d0:9b:48:e7:9c:be:8a: 78:08:79:5a:47:1f:88:72:a1:34:23:e1:f8:7e:92:0b: df:7d:65:ce:c0:8e:18:65:d0:cc:5e:4e:3c:4e:a6:8b: 0c:64:ef:0b:f8:cb:14:8c:84:c8:ac:ef:c8:de:80:89: 26:6f:16:ba:32:69:02:6f:d6:0d:a2:7c:5a:e6:61:d7: 38:1f:d4:a9:cd:1e:13:3a:7d:c6:f3:a0:23:c5:7d:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:f4:99:3a:64:21:1b:2f:a2:bb:70:82:bf:62:8b:51: 2b:d8:6b:26:b6:42:d9:fe:5b:b0:bd:da:d6:aa:fc:5b: 57:f8:a3:53:d6:d3:47:9d:eb:bc:d9:bc:fa:bc:4b:58: 58:5e:bd:71:e4:05:ae:2d:6b:53:bd:b1:d5:81:14:1f: f5:d5:74:01:d4:a6:aa:a5:b7:3e:9c:e3:23:c6:17:8e: 9f:25:fb:7f:69:94:ca:2e:b0:c5:ca:8e:ce:6d:e2:b1: 5b:55:74:1f:2e:c3:d8:a8:dd:cb:de:a3:61:de:12:1e: 09:84:67:a5:b6:af:d5:44:c2:da:2c:53:ae:b8:eb:a8: b0:b2:1a:07:da:a7:14:1a:c6:73:92:43:54:d6:62:b7: 90:37:e4:57:ba:8b:93:7f:f8:47:98:dc:33:b4:de:8a: 13:0b:5c:86:f5:71:28:37:ea:2f:c8:aa:54:8e:08:4b: 30:05:e9:f6:87:64:2c:de:97:ed:d0:8f:77:95:24:8d: 8e:08:8e:61:85:ac:ed:e3:c3:cc:e3:be:4c:60:8d:a5: 31:37:e4:b3:d9:0a:53:95:ec:41:5a:f7:48:81:a2:8a: 49:ec:1b:6d:17:6f:98:c3:c1:dc:3d:63:97:75:d2:27: 6d:bc:27:13:36:0a:a1:d7:75:ea:18:85:b2:0d:1b:22 Fingerprint (SHA-256): 3D:CF:5D:A9:18:EB:C8:28:6D:EB:DA:01:1A:43:6E:56:39:EE:AE:E7:4B:46:68:D1:65:30:28:3C:58:38:F1:94 Fingerprint (SHA1): 28:8C:09:8E:4E:C7:50:D0:B0:FB:E7:7D:3C:5A:9E:29:D4:BD:6A:B9 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3965: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153460 (0x13bd0034) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Mar 31 16:10:06 2017 Not After : Thu Mar 31 16:10:06 2067 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:17:bb:e6:12:9d:ac:ef:47:24:73:7e:31:6c:9e:be: 0a:ac:47:50:5c:30:40:d6:2e:36:b6:9e:9a:7a:1f:26: 33:cf:6b:f5:de:76:3d:51:18:af:53:5b:77:ce:ba:c1: 93:70:16:2b:a5:74:fe:bf:39:b9:27:4f:f0:49:2a:cc: 80:db:68:87:85:1a:cd:f9:89:2a:9d:6f:17:3f:cb:de: 19:dc:b2:41:e7:c1:e7:65:2f:b0:66:bf:9b:bb:69:33: 5c:3d:9f:d0:a4:bc:9d:33:53:66:c5:d7:2b:dc:af:f9: 40:a6:2d:57:96:37:0d:c8:6f:18:b6:db:42:4a:52:29: b3:6e:89:43:11:1f:ee:2c:f3:04:6e:2c:22:56:5f:b1: 7d:09:ca:df:a7:f3:3c:01:ca:a5:d1:a1:ba:99:fd:86: cf:6a:06:48:02:70:ed:5e:86:ec:21:2f:bf:a4:52:b4: 66:dd:da:29:b8:26:38:6f:89:1b:90:91:b4:65:06:bf: ae:7d:67:ec:32:a7:37:41:fd:2d:80:17:6c:9b:c4:e5: f0:d8:df:05:df:8d:7d:25:84:7a:0b:ba:34:34:a4:f9: 51:d2:7b:8d:f9:b8:d5:45:39:99:80:cf:94:5b:fa:32: f8:3a:12:c2:13:52:16:2d:fe:2b:48:e0:75:f1:ef:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a4:87:62:79:a5:46:d4:de:cd:e2:22:df:ea:e8:72:8e: 51:61:6f:f1:65:58:32:83:8a:18:6e:81:45:11:42:30: bc:e0:6c:c0:2c:b2:d7:e8:be:2d:9e:7f:7b:36:18:e9: 75:5a:4c:1a:29:40:02:ed:85:26:8c:25:5b:4c:87:f0: fb:cd:13:99:7b:ab:e2:08:15:a7:ec:c3:b2:1e:5e:e8: bd:06:3f:a0:06:f0:4e:bf:22:d1:3b:11:c9:23:36:89: 3f:3c:9e:57:c0:90:5e:ff:48:d4:f6:d1:f1:0e:61:ab: 2f:88:b5:7f:76:ba:d9:13:00:d6:2a:f3:c7:e4:0f:13: d4:a2:b5:a4:5e:7a:a0:68:d5:14:bc:bc:fb:c3:a3:e0: f4:1d:dd:9a:23:a6:40:49:66:ca:76:a9:e5:08:5d:b7: fd:bd:6d:66:6f:99:5b:bb:61:23:90:fc:4f:40:0c:dc: 94:78:0a:9a:16:56:0e:45:1b:f8:3f:fd:ab:7a:a0:58: c1:be:08:47:73:f7:da:83:e9:d6:da:a5:eb:ac:89:52: 6f:62:c9:7b:61:97:a3:81:7c:3f:8a:c7:1a:34:ce:46: 69:f6:87:12:0b:ec:3d:3a:89:26:0e:89:3f:03:52:88: d1:99:7c:79:de:a2:15:0f:ca:12:e5:d6:a9:fb:94:92 Fingerprint (SHA-256): 76:85:BB:0B:10:70:D9:E3:38:6C:A8:C4:82:D6:99:22:2C:6A:57:8D:5A:70:4A:23:70:E4:D1:9B:DB:FD:F7:F5 Fingerprint (SHA1): A3:BE:6E:A0:53:7F:90:83:EC:E5:EF:AB:FF:FC:B9:ED:F2:A0:2D:08 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3966: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153461 (0x13bd0035) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Mar 31 16:10:40 2017 Not After : Thu Mar 31 16:10:40 2067 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:9d:43:ff:8b:00:32:e9:73:d0:12:26:3d:3f:49:ac: c4:03:6a:9c:69:10:8b:b5:58:20:8b:db:40:28:29:34: 7d:b4:c2:3e:cb:da:33:5e:4e:23:b8:03:31:e8:27:23: c2:e8:93:29:61:c6:c2:66:85:58:21:55:7d:ec:65:c5: f2:1d:c7:4d:8d:a5:aa:c6:83:2a:d4:b7:90:29:0d:5e: 08:37:5c:b7:39:33:95:ac:0a:03:c5:dd:c7:9c:c2:7c: 70:e0:02:cb:9e:2e:f7:28:16:b3:9c:13:b1:ea:05:d1: d6:c9:43:ff:bf:b1:f8:a0:61:35:c0:30:db:eb:3a:ed: 4d:58:d6:fd:e4:c2:37:21:de:57:f9:46:d5:ba:50:75: cc:eb:a7:0f:5b:ee:04:db:35:52:86:95:bc:6b:47:24: 0c:19:28:af:56:52:bd:70:96:82:19:5b:4b:1a:6f:ae: 63:3b:54:4e:f9:45:97:82:b2:cd:ff:2e:a8:f1:17:fd: d2:3f:6c:05:8a:7f:3b:2c:a4:a2:ec:f7:0a:d3:0d:23: 26:05:ca:15:21:3f:0b:e8:7d:9e:bb:56:2b:34:14:5f: 07:29:fa:70:2a:01:d8:f7:b8:bb:17:93:ff:77:27:8c: 53:3f:d3:14:5b:38:1c:43:90:f6:19:9c:d3:1e:63:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:ad:79:f8:80:63:40:11:19:06:77:38:45:0d:ab:00: 57:69:15:fa:d3:b2:29:7d:91:cc:3b:82:5d:0e:08:40: 52:b0:d0:f0:84:de:be:25:bc:35:d1:ef:ed:82:cc:df: bf:b7:53:09:c0:dc:79:9e:8e:a3:dd:cf:9c:e6:0b:df: 8f:36:65:75:cf:bc:59:18:bb:8a:93:3d:fd:b0:7f:0c: ea:6a:74:3d:33:96:9a:ea:d3:e8:9f:17:8e:0f:f0:9d: d0:66:94:9f:8d:df:63:87:71:d8:c7:df:40:5b:3e:06: 82:1a:59:1b:d2:1a:46:3f:e9:ff:b7:02:f2:0d:ae:c0: 4e:54:a8:54:9f:1e:73:8c:c0:45:5f:94:0b:b9:84:24: 73:ba:c9:be:96:b1:32:70:d5:c8:84:c0:de:9e:3d:4f: f8:b9:75:dc:f9:36:9a:5b:f1:60:f3:da:c5:5b:74:69: 61:ff:d7:f6:91:60:bd:98:43:dc:0d:5f:79:71:83:6b: 1f:02:91:89:29:be:63:04:46:28:e9:0d:c7:07:6d:54: 14:90:96:59:65:8b:c6:96:a6:24:91:cb:6d:22:b8:fb: 4e:38:1e:4c:fb:e5:04:e1:76:5a:72:13:44:25:13:c5: 27:eb:30:43:6d:85:2c:5c:b5:7e:92:7f:03:37:cf:df Fingerprint (SHA-256): 5E:6D:3D:04:6E:0A:39:89:73:AD:51:97:A3:4F:BB:85:1D:DD:C7:4B:3A:BC:90:78:E8:F3:4F:AD:8A:32:49:F5 Fingerprint (SHA1): 2F:C1:C8:E2:B3:B2:A4:FB:7A:E3:37:64:88:C7:8D:1E:C5:2A:50:87 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3967: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153462 (0x13bd0036) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Mar 31 16:10:49 2017 Not After : Thu Mar 31 16:10:49 2067 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:f0:64:75:68:39:68:b0:2f:35:68:7a:66:14:31:97: c8:50:43:ab:35:c6:19:46:ef:bb:6c:97:d1:30:5f:ce: 5f:f8:98:e8:a7:f4:e8:1d:f7:18:cd:35:37:5a:69:02: 0e:52:88:23:13:fe:94:17:44:1b:1a:1e:a8:0c:d7:c4: b3:d4:3c:c3:67:8b:6f:ef:09:39:c3:04:c1:33:ff:d7: f7:e8:04:7a:8c:7d:82:bb:09:c5:9a:93:19:bb:f1:18: 68:93:0c:23:d7:06:a4:b4:f5:8a:3e:13:2b:71:81:5c: d2:c6:5d:af:75:3d:6d:13:b3:df:16:4e:5b:f8:9a:79: d5:79:e5:80:97:8b:28:01:0d:8d:bb:c3:d8:9b:d8:0f: 2f:83:a8:0c:e2:78:68:59:72:f3:75:c1:21:70:6f:fb: 05:a1:2d:66:a1:fa:bb:4e:ca:57:e5:65:69:48:94:b3: c5:56:f0:37:bc:3b:d4:03:18:19:23:b5:ce:17:78:9e: 3f:f0:11:10:c6:6e:40:f5:08:4a:fd:91:31:8d:75:a1: 00:6b:55:0f:7b:b8:2a:a3:5f:bf:00:da:f5:d0:91:0e: 22:48:ad:13:62:fa:55:9b:fc:0e:e8:08:f2:06:34:97: 75:30:32:f4:44:67:b7:77:7a:c0:a1:07:e9:37:fb:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:e4:4c:bf:3f:8b:ac:9b:3f:ec:68:cc:07:23:ca:fd: 23:24:f3:48:6d:8d:96:77:ce:16:6f:e3:2e:e3:8b:1d: ec:07:d6:dc:e7:8d:88:70:2d:a8:73:15:19:a1:95:79: a4:7b:03:d5:53:b7:f9:e3:98:f6:aa:19:94:46:1a:04: c0:7f:79:6c:8d:b2:f4:55:be:1c:9a:a6:cd:4a:2e:de: d4:be:fa:63:ca:73:24:03:d8:4c:ea:84:bb:5e:17:db: e8:a9:60:bd:3c:a3:b3:53:f1:cb:a5:43:76:fb:82:e7: 5d:ae:23:b3:ae:9e:eb:39:d2:08:8b:01:01:42:4e:12: a7:90:7c:62:52:2e:e6:cf:ce:40:1c:ff:2c:4c:51:b7: 2b:0f:3f:13:94:77:32:0d:60:bc:ce:27:e9:57:1e:0e: 06:5d:f2:17:8a:cc:d8:74:d5:0c:1c:70:00:60:5c:df: be:dc:10:36:63:de:42:9e:a2:87:2c:ef:95:e0:7a:5a: 1d:cd:9a:00:57:99:49:56:ff:da:19:d7:1f:df:44:92: 46:08:89:66:d0:3c:ce:72:14:94:47:2e:db:3e:15:3a: 73:3d:16:8b:15:ab:f0:49:87:2d:6b:7c:01:a5:9c:29: 12:b4:75:b2:7c:19:89:bb:fa:bb:15:4a:f8:97:81:41 Fingerprint (SHA-256): A7:3B:5B:82:F4:87:A1:FB:EA:B0:D5:61:92:87:FD:68:7F:84:DF:A8:D2:DE:42:C0:AD:7F:0B:46:C8:11:F6:D2 Fingerprint (SHA1): EB:0D:13:E3:43:D9:D9:0F:0D:39:2A:EE:0F:26:16:69:02:64:A0:21 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3968: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153463 (0x13bd0037) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Mar 31 16:10:59 2017 Not After : Thu Mar 31 16:10:59 2067 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f0:c4:96:68:63:78:89:92:98:a8:4d:06:71:ab:1e:bc: 63:91:f1:a9:3e:83:c8:dd:c7:fd:f4:21:27:0d:cd:70: 8c:4e:69:93:77:f0:fc:47:12:73:d2:93:79:00:cb:9b: 1f:35:97:2b:1d:9d:bb:52:e1:0b:c9:84:dd:e2:bc:39: 15:e1:9d:bf:1d:5c:d4:bc:27:26:fb:6a:b6:59:e1:83: de:04:7c:08:50:e3:92:55:37:43:69:91:01:5d:e1:91: 80:7c:8b:e7:27:8e:7c:d4:19:99:c6:f6:1d:08:93:a6: e5:50:c8:e7:b1:d4:91:ab:ec:0e:ff:3b:b7:9f:03:e8: af:ad:8e:a8:3c:ad:fa:d2:be:8b:76:79:b8:48:c3:9b: 3d:4d:b6:93:55:2d:ed:a4:a3:75:19:c6:38:27:3d:eb: c3:3f:c3:5d:3f:64:a5:ff:95:66:b3:41:0e:0f:d7:e0: 51:95:d5:33:0c:41:39:88:6b:1d:52:c0:fc:0a:ed:3d: 92:fd:d6:79:df:9b:e9:8f:7e:9c:46:1c:fc:18:39:92: eb:1b:81:cb:87:ce:0c:25:4d:5c:5e:f7:a9:97:16:94: 9f:c3:7b:0e:f0:49:77:a6:99:17:8f:bf:c8:b9:9b:b1: 31:c9:af:01:02:5b:10:11:38:a2:f4:69:43:50:8f:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:83:ba:e7:4e:9f:af:77:25:f4:ec:28:fb:3f:a0:8e: f4:1d:7a:01:c7:fa:a7:a5:b2:15:06:04:98:5d:53:88: 40:64:9c:76:2a:3c:95:e8:ad:aa:17:e7:58:7f:c5:7b: 24:c5:4a:52:fc:54:14:1b:a1:cc:79:a1:41:1b:32:94: 59:55:73:c9:10:d4:e6:a8:fe:b6:4d:3e:de:a8:16:7d: 51:81:b1:a5:6a:88:eb:31:70:2c:1d:37:55:17:c7:45: 37:9a:6a:9b:e0:6c:77:21:12:c7:7d:7f:10:6f:e9:46: c6:fe:63:fd:3c:6c:8f:d6:3b:1d:54:39:1d:ac:26:08: 60:2e:19:b5:c8:6d:e5:33:91:b3:7e:5f:d1:01:26:9b: fa:5b:19:6b:0d:35:fa:77:af:01:f9:b1:ac:93:8c:0d: da:96:97:a7:8b:cb:5b:ef:ab:80:0d:28:ac:0d:48:87: 46:4e:d3:60:26:1d:34:5a:36:85:04:ec:75:8a:f6:70: c8:11:b9:7d:3b:44:e6:e4:36:43:c1:20:3e:5e:28:de: 5c:64:75:ef:1a:48:5f:d3:7a:61:2e:17:72:56:eb:b5: f3:05:01:b2:24:69:8c:96:dd:ce:e8:3a:59:05:cc:2b: 71:f8:ec:97:1b:50:17:96:40:8a:c5:84:30:c9:6c:16 Fingerprint (SHA-256): B9:86:44:D5:4C:3D:D9:D4:90:A6:FF:15:90:DA:07:94:99:09:F7:0A:02:43:7B:FF:A4:1C:DB:66:39:E0:A6:96 Fingerprint (SHA1): 46:B2:FC:50:68:CF:E4:EE:F7:EB:B5:EA:D0:9D:21:0C:26:DA:D7:7A Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3969: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153464 (0x13bd0038) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Mar 31 16:11:10 2017 Not After : Thu Mar 31 16:11:10 2067 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:0d:4b:7b:44:eb:f0:4f:f0:13:f4:77:ca:1e:51:31: 00:9d:10:32:d6:f8:9f:70:50:31:11:63:ae:07:74:3f: 1a:59:31:3b:79:81:73:65:0c:31:78:39:8c:3a:83:41: 8d:88:f2:55:64:81:48:4d:59:b5:38:6e:22:6d:20:d5: 9a:21:54:aa:f0:23:29:f9:b5:59:95:0b:c7:db:e2:87: 5b:03:8a:cf:81:3e:67:fe:fb:f8:b3:59:55:70:e2:fd: a2:79:7d:b5:ff:ae:f8:b1:f6:bf:8e:68:2f:3e:4d:23: 08:f2:dc:39:37:37:ae:58:b5:dc:31:31:01:1e:05:b1: 7d:42:1c:e5:ed:a7:21:1c:9b:25:b6:ae:53:71:dd:a2: 92:e9:1c:b8:cb:21:d2:e8:4f:fe:53:04:ac:ae:2e:98: f4:76:91:44:be:e8:70:27:91:7a:78:fe:08:d4:f5:14: 21:b2:81:6b:91:e9:db:ff:df:6c:59:a6:3f:61:26:00: 48:e7:11:7b:3e:8b:0d:f8:31:08:09:da:1f:3c:47:b9: 7b:ba:e6:24:ec:58:d4:8d:54:bd:9a:83:e0:63:d0:dd: be:ed:95:00:d7:25:18:a0:2c:de:9e:1c:3e:d7:a6:fb: 8e:6b:6a:7f:7e:5b:6e:c2:0e:92:19:2f:f8:94:4e:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:ad:9e:1f:ad:f5:d0:5a:b1:1c:56:a1:bf:af:27:2b: d8:48:3b:fc:70:b8:c8:25:85:fb:fd:70:0d:c5:76:b3: 99:aa:ad:66:57:24:31:b6:d8:99:42:b9:3a:c7:88:74: fd:dd:4d:93:c3:18:c0:8e:93:0b:87:21:1b:ac:3a:86: 6a:cc:e5:91:22:17:77:cf:03:22:57:94:3d:a7:08:23: 48:8a:27:dd:66:26:d9:d4:b4:55:fe:c7:c6:65:be:87: 74:ae:fa:00:e4:1f:6a:b5:21:dc:34:ff:36:68:e6:9f: bb:1b:51:ae:9c:6a:08:50:4e:96:6f:06:4f:33:66:76: 35:74:64:66:ad:76:75:22:46:0a:c7:2f:8f:50:ff:9d: 2c:8f:63:2c:8f:18:ce:cf:22:1e:04:18:ba:da:d7:23: c8:de:c6:d9:25:ad:c5:8c:9c:08:3e:b6:1f:ea:2e:64: c8:3f:e4:57:fa:3d:33:ee:1f:94:71:54:be:f0:e0:5d: e6:ff:36:09:81:dd:da:04:ab:d0:36:21:2c:cb:9e:6c: 59:b4:35:0e:33:dd:4d:80:60:be:11:6b:44:40:69:90: d5:6d:27:60:b6:81:c8:d8:f4:89:49:d4:3d:6c:ca:40: 27:38:7d:86:0d:39:8c:3b:fa:77:63:dd:8e:5f:10:61 Fingerprint (SHA-256): B9:DE:B4:00:D9:BF:6B:65:C1:16:D1:2A:24:B2:FF:7B:FB:9D:96:99:B9:7A:91:60:E2:82:DE:67:1D:C8:2D:7D Fingerprint (SHA1): 90:D4:65:16:08:69:A3:4A:90:A7:DA:5A:3F:88:82:8B:F1:DD:46:2C Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3970: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3971: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153479 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3972: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3973: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3974: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3975: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331153480 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3976: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3977: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3978: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3979: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331153481 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3980: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3981: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3982: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3983: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 331153482 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3984: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3985: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3986: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153479 (0x13bd0047) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:13:24 2017 Not After : Thu Mar 31 16:13:24 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:b0:10:11:e7:d3:5c:f6:db:fb:94:35:6f:69:5e:55: ea:dd:48:9e:13:0c:c6:18:13:a4:07:38:57:4c:b5:88: a7:7e:f0:b2:32:a4:d4:f2:6c:bd:a8:3a:c6:80:02:68: 66:d2:78:dc:cd:8d:f1:73:4e:8c:0f:b3:e1:b3:a4:92: e0:eb:22:a8:e8:9a:78:8f:40:30:a8:90:14:de:af:51: bb:ae:e8:a9:87:4c:73:87:47:6c:fc:c1:d6:52:75:36: b3:d3:50:06:74:26:9d:1d:0a:fa:ea:e3:4c:f7:4c:d4: 0e:71:03:65:37:b8:2f:24:12:d3:a8:50:ad:12:73:61: c9:db:80:c5:d8:3f:bb:d6:60:c7:65:8b:59:4c:59:03: 09:a0:4c:99:24:d6:cd:3f:32:6e:bf:5f:c1:01:d2:34: 1f:ec:1e:9a:c7:29:fb:63:ef:09:94:51:aa:25:dd:8b: 4a:33:3d:f2:13:d2:58:fe:30:66:0d:13:e1:20:a1:35: d4:63:f1:43:73:12:16:5c:3f:94:9c:94:6a:10:de:a7: 86:40:1c:c0:15:5e:cb:90:0b:69:38:73:97:de:b2:d3: 32:e2:34:7a:e9:ce:61:f1:fa:2f:c8:58:14:42:c3:ed: 6d:00:3c:7a:4f:82:f2:dd:39:38:75:55:15:97:69:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:13:6b:b4:17:3d:5a:c1:56:0e:ce:20:92:5d:05:54: 3b:8f:54:03:e4:1f:c3:cf:ea:46:2f:7c:5d:b1:05:fc: 4a:23:66:d2:f0:51:c9:c0:5f:f8:77:18:c8:ee:8a:6d: be:7d:86:d6:fa:5b:6d:e8:bc:b8:05:26:75:aa:90:74: d4:78:e6:6a:c1:a7:ae:36:67:f4:68:be:a4:36:27:29: 5a:83:00:31:d3:af:f2:82:6e:09:10:fb:46:d9:d4:c6: ae:f4:36:aa:2c:22:61:93:3e:e1:e8:03:c6:50:ef:d8: 17:1c:89:36:0a:29:a0:08:92:31:d9:61:4b:79:00:42: f1:26:c6:b3:ab:c6:ec:e9:9d:2c:74:60:c6:4b:6d:37: ee:59:3e:f3:92:d0:ab:f8:44:85:e6:32:ad:65:3b:df: 2b:b0:06:7c:33:b2:d0:b6:be:ce:a2:9b:83:42:c7:2a: 7d:23:f6:d1:6b:4a:0e:ba:f8:b4:db:5f:f8:cf:70:7c: 66:2a:17:ee:92:e0:9e:66:5d:01:8b:5f:17:be:bd:c6: 1f:03:21:8d:1f:ef:70:39:bd:d8:e2:5b:a0:6b:e4:bb: 5d:41:18:1f:84:02:c5:32:cf:35:9b:86:04:16:d2:38: 95:cf:5a:70:08:5b:4e:ee:e8:ce:9a:60:36:23:ab:1a Fingerprint (SHA-256): D0:15:FE:9A:FA:1F:8B:50:EE:D1:91:50:FE:A1:85:D5:A3:E9:47:75:00:2D:9D:F8:D6:8A:8B:17:53:E9:40:9C Fingerprint (SHA1): 97:AF:A0:B8:75:CB:3A:C3:5D:B5:A3:78:4F:C3:AF:52:F2:86:78:80 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3987: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3988: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153480 (0x13bd0048) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:13:36 2017 Not After : Thu Mar 31 16:13:36 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:c1:89:f5:8c:ba:14:6c:63:90:10:13:07:4c:18:71: 68:84:dc:67:1e:3f:72:72:b9:fb:22:f3:71:d3:5e:e3: 4a:9b:b0:d0:d3:45:93:bb:1d:a6:0c:d4:19:bf:de:02: 49:3b:db:ca:16:20:04:1e:a3:b6:e9:f6:3e:62:1a:95: c1:04:e1:78:6f:9b:1c:17:be:6d:a6:dd:b4:87:21:d7: 6f:22:ef:2d:2c:9d:6e:bc:f0:7b:50:44:5d:fa:e2:11: 1e:ea:2b:e9:c3:61:76:6f:4b:57:6f:22:89:4c:37:12: 87:81:4b:f5:ec:ad:94:71:be:f1:41:86:8d:fd:19:e2: fc:e8:7a:a6:8f:9e:33:29:46:9d:47:e1:cf:a2:23:d8: 27:96:3d:80:c4:9a:62:e7:90:8e:ee:63:52:c8:7f:d2: 5e:0a:4c:12:ee:b2:63:2e:9b:de:3a:3c:63:63:e5:38: 12:92:da:42:a3:52:d6:1d:1b:c8:16:ee:ca:bf:e2:27: 11:2f:5a:0e:ff:9b:05:8a:b0:f2:4d:3c:16:6c:01:66: 59:9d:16:b1:db:b5:ca:2a:2b:b3:f7:e3:61:51:f5:82: 3c:29:ef:9a:7c:f9:ff:21:1d:3c:45:03:b1:3f:ae:b0: 9d:9c:62:5d:fc:9e:7e:09:31:9e:a8:c5:96:bf:a4:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:3d:59:2e:a7:38:57:33:9b:62:a6:f3:52:8f:92:6b: 8f:cb:28:e5:19:54:e8:7c:4b:f5:f5:39:e7:24:46:a0: a3:36:32:41:8a:46:08:c3:ec:fa:b7:6d:f1:69:c3:d2: 16:18:e5:50:98:47:61:90:f2:a3:4b:bc:35:c7:14:3a: 6f:b7:66:1d:63:cd:61:35:e8:bd:76:92:b0:cc:88:95: 0c:78:ff:a4:13:cd:55:cc:07:09:2d:29:72:d6:ec:35: a2:22:b1:1b:0a:b0:3d:81:0f:22:04:e0:e9:b7:28:00: a9:43:9d:5f:bd:79:01:fe:1b:ba:f2:55:dd:2b:16:49: e6:69:48:70:97:bb:97:2e:91:28:e4:18:f6:ff:7c:90: 37:4a:40:24:66:72:e5:a3:6a:02:10:5f:d4:43:f1:59: 7a:e3:21:82:94:35:cf:29:1c:8d:22:fd:9e:0e:ae:79: 74:cd:aa:df:36:30:09:bd:1e:9d:e0:1d:fb:ae:1d:50: ba:9b:d6:a2:fb:42:c4:0c:61:69:43:80:6e:16:2b:2e: 3d:31:17:7c:54:02:67:48:b5:f9:b2:71:40:ab:68:eb: 14:97:5d:a7:f2:c5:1e:ba:13:5a:ba:5a:49:fb:55:20: c1:00:66:05:b3:54:ba:fc:d9:6c:a4:1e:d4:f6:8a:df Fingerprint (SHA-256): 3A:18:A0:1F:45:79:AD:96:03:48:9D:8C:64:51:87:B4:96:74:44:3E:68:2F:50:13:87:95:EA:7F:98:51:EB:F7 Fingerprint (SHA1): 8E:F6:AB:78:64:B3:15:0A:30:59:30:F7:C7:1D:52:92:C5:71:EE:CE Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3989: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3990: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153481 (0x13bd0049) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 16:13:42 2017 Not After : Thu Mar 31 16:13:42 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 93:74:02:93:7c:b2:16:8e:5e:7c:e7:20:89:80:26:66: d7:0d:20:51:48:47:c9:b2:49:5f:02:ad:c1:eb:dc:c9: 2c:c9:a9:67:fb:f5:17:42:36:4e:cb:16:c8:1b:32:d2: 33:fd:42:6d:39:06:22:45:c9:f5:65:95:d4:35:f0:b0: 34:4c:a8:08:a4:02:75:db:f3:15:c5:6c:17:f8:55:d9: 41:20:ec:4d:3a:6b:20:98:e0:b0:85:1e:85:eb:dc:4d: 1b:5c:38:4b:de:32:a7:dd:1d:63:33:3f:e9:f8:ab:6c: e8:03:0f:f1:78:22:d1:58:c8:77:c8:e6:9d:91:9a:32: b3:99:2f:f9:e7:9d:a6:8f:0c:44:14:35:f4:63:f8:82: ff:02:0e:c7:75:73:c6:02:3f:bb:9e:62:c7:73:ec:4f: a2:ba:7e:57:49:e3:bb:44:51:a7:60:78:b3:2b:b9:a5: 6f:28:67:bf:25:3f:be:c9:79:16:67:8d:15:52:50:e8: 9b:9e:9e:1c:56:4b:7f:43:eb:5f:4b:28:7f:17:1d:93: 5a:ae:8c:20:ed:b3:52:21:0f:16:92:d2:95:77:33:35: 9d:f5:b9:a8:70:3f:18:75:8c:64:07:ad:f9:36:6d:5c: 32:22:48:9a:5f:f8:5d:d8:8b:e0:83:3c:b9:77:18:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:f9:a4:8d:f1:45:0b:24:5e:a5:4b:b2:89:2f:34:52: f9:65:f7:ed:05:44:56:90:d2:c8:09:b4:a8:e8:0f:a5: 7f:d9:36:c3:b3:06:c0:72:d8:8c:d4:76:f3:ee:12:43: cb:41:1d:58:77:ad:a0:ca:9c:7e:80:45:bc:c9:cc:b5: d3:52:a3:42:52:60:0a:e6:cc:fd:b5:88:da:07:47:9d: e7:da:e8:a6:b3:01:ee:bb:9b:e3:22:e0:6a:6b:ad:d0: b9:65:b3:63:bf:3d:58:2c:8e:50:bb:41:37:61:09:cb: 4a:0e:6a:2c:f7:53:e6:04:7d:d7:1c:25:f1:d3:4b:26: ed:b2:46:02:74:20:90:fa:5d:f7:62:35:f1:0e:7e:c0: da:c6:cb:34:60:4e:88:b8:17:06:62:b1:5f:b5:1f:d5: c8:ff:68:34:88:72:a7:bf:8e:8e:5b:75:d3:c0:13:1c: f9:89:1e:9f:f3:c0:ca:91:5b:d6:0a:d1:b8:77:d5:1e: 4b:fa:af:3f:35:23:52:9e:b6:62:79:be:8c:d4:5c:77: b1:bb:1a:c3:05:46:7b:9c:1c:81:96:94:78:73:e5:c7: 0b:6e:5c:70:ba:ea:67:ee:02:79:1e:5c:de:0e:90:f7: 31:eb:b8:49:27:2e:65:84:01:34:ac:1a:e0:c0:d8:b5 Fingerprint (SHA-256): 0B:94:47:F9:FB:E5:32:69:AA:F4:21:0C:B1:CE:7F:B3:01:D9:2F:FD:66:BA:EC:26:5C:80:1B:5C:D2:81:FD:93 Fingerprint (SHA1): 36:61:41:59:8F:6D:1C:F1:4B:CC:3A:64:29:E8:01:56:79:2B:C9:0C Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3991: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3992: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3993: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3994: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3995: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153479 (0x13bd0047) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:13:24 2017 Not After : Thu Mar 31 16:13:24 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:b0:10:11:e7:d3:5c:f6:db:fb:94:35:6f:69:5e:55: ea:dd:48:9e:13:0c:c6:18:13:a4:07:38:57:4c:b5:88: a7:7e:f0:b2:32:a4:d4:f2:6c:bd:a8:3a:c6:80:02:68: 66:d2:78:dc:cd:8d:f1:73:4e:8c:0f:b3:e1:b3:a4:92: e0:eb:22:a8:e8:9a:78:8f:40:30:a8:90:14:de:af:51: bb:ae:e8:a9:87:4c:73:87:47:6c:fc:c1:d6:52:75:36: b3:d3:50:06:74:26:9d:1d:0a:fa:ea:e3:4c:f7:4c:d4: 0e:71:03:65:37:b8:2f:24:12:d3:a8:50:ad:12:73:61: c9:db:80:c5:d8:3f:bb:d6:60:c7:65:8b:59:4c:59:03: 09:a0:4c:99:24:d6:cd:3f:32:6e:bf:5f:c1:01:d2:34: 1f:ec:1e:9a:c7:29:fb:63:ef:09:94:51:aa:25:dd:8b: 4a:33:3d:f2:13:d2:58:fe:30:66:0d:13:e1:20:a1:35: d4:63:f1:43:73:12:16:5c:3f:94:9c:94:6a:10:de:a7: 86:40:1c:c0:15:5e:cb:90:0b:69:38:73:97:de:b2:d3: 32:e2:34:7a:e9:ce:61:f1:fa:2f:c8:58:14:42:c3:ed: 6d:00:3c:7a:4f:82:f2:dd:39:38:75:55:15:97:69:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:13:6b:b4:17:3d:5a:c1:56:0e:ce:20:92:5d:05:54: 3b:8f:54:03:e4:1f:c3:cf:ea:46:2f:7c:5d:b1:05:fc: 4a:23:66:d2:f0:51:c9:c0:5f:f8:77:18:c8:ee:8a:6d: be:7d:86:d6:fa:5b:6d:e8:bc:b8:05:26:75:aa:90:74: d4:78:e6:6a:c1:a7:ae:36:67:f4:68:be:a4:36:27:29: 5a:83:00:31:d3:af:f2:82:6e:09:10:fb:46:d9:d4:c6: ae:f4:36:aa:2c:22:61:93:3e:e1:e8:03:c6:50:ef:d8: 17:1c:89:36:0a:29:a0:08:92:31:d9:61:4b:79:00:42: f1:26:c6:b3:ab:c6:ec:e9:9d:2c:74:60:c6:4b:6d:37: ee:59:3e:f3:92:d0:ab:f8:44:85:e6:32:ad:65:3b:df: 2b:b0:06:7c:33:b2:d0:b6:be:ce:a2:9b:83:42:c7:2a: 7d:23:f6:d1:6b:4a:0e:ba:f8:b4:db:5f:f8:cf:70:7c: 66:2a:17:ee:92:e0:9e:66:5d:01:8b:5f:17:be:bd:c6: 1f:03:21:8d:1f:ef:70:39:bd:d8:e2:5b:a0:6b:e4:bb: 5d:41:18:1f:84:02:c5:32:cf:35:9b:86:04:16:d2:38: 95:cf:5a:70:08:5b:4e:ee:e8:ce:9a:60:36:23:ab:1a Fingerprint (SHA-256): D0:15:FE:9A:FA:1F:8B:50:EE:D1:91:50:FE:A1:85:D5:A3:E9:47:75:00:2D:9D:F8:D6:8A:8B:17:53:E9:40:9C Fingerprint (SHA1): 97:AF:A0:B8:75:CB:3A:C3:5D:B5:A3:78:4F:C3:AF:52:F2:86:78:80 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3996: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3997: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153480 (0x13bd0048) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:13:36 2017 Not After : Thu Mar 31 16:13:36 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:c1:89:f5:8c:ba:14:6c:63:90:10:13:07:4c:18:71: 68:84:dc:67:1e:3f:72:72:b9:fb:22:f3:71:d3:5e:e3: 4a:9b:b0:d0:d3:45:93:bb:1d:a6:0c:d4:19:bf:de:02: 49:3b:db:ca:16:20:04:1e:a3:b6:e9:f6:3e:62:1a:95: c1:04:e1:78:6f:9b:1c:17:be:6d:a6:dd:b4:87:21:d7: 6f:22:ef:2d:2c:9d:6e:bc:f0:7b:50:44:5d:fa:e2:11: 1e:ea:2b:e9:c3:61:76:6f:4b:57:6f:22:89:4c:37:12: 87:81:4b:f5:ec:ad:94:71:be:f1:41:86:8d:fd:19:e2: fc:e8:7a:a6:8f:9e:33:29:46:9d:47:e1:cf:a2:23:d8: 27:96:3d:80:c4:9a:62:e7:90:8e:ee:63:52:c8:7f:d2: 5e:0a:4c:12:ee:b2:63:2e:9b:de:3a:3c:63:63:e5:38: 12:92:da:42:a3:52:d6:1d:1b:c8:16:ee:ca:bf:e2:27: 11:2f:5a:0e:ff:9b:05:8a:b0:f2:4d:3c:16:6c:01:66: 59:9d:16:b1:db:b5:ca:2a:2b:b3:f7:e3:61:51:f5:82: 3c:29:ef:9a:7c:f9:ff:21:1d:3c:45:03:b1:3f:ae:b0: 9d:9c:62:5d:fc:9e:7e:09:31:9e:a8:c5:96:bf:a4:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:3d:59:2e:a7:38:57:33:9b:62:a6:f3:52:8f:92:6b: 8f:cb:28:e5:19:54:e8:7c:4b:f5:f5:39:e7:24:46:a0: a3:36:32:41:8a:46:08:c3:ec:fa:b7:6d:f1:69:c3:d2: 16:18:e5:50:98:47:61:90:f2:a3:4b:bc:35:c7:14:3a: 6f:b7:66:1d:63:cd:61:35:e8:bd:76:92:b0:cc:88:95: 0c:78:ff:a4:13:cd:55:cc:07:09:2d:29:72:d6:ec:35: a2:22:b1:1b:0a:b0:3d:81:0f:22:04:e0:e9:b7:28:00: a9:43:9d:5f:bd:79:01:fe:1b:ba:f2:55:dd:2b:16:49: e6:69:48:70:97:bb:97:2e:91:28:e4:18:f6:ff:7c:90: 37:4a:40:24:66:72:e5:a3:6a:02:10:5f:d4:43:f1:59: 7a:e3:21:82:94:35:cf:29:1c:8d:22:fd:9e:0e:ae:79: 74:cd:aa:df:36:30:09:bd:1e:9d:e0:1d:fb:ae:1d:50: ba:9b:d6:a2:fb:42:c4:0c:61:69:43:80:6e:16:2b:2e: 3d:31:17:7c:54:02:67:48:b5:f9:b2:71:40:ab:68:eb: 14:97:5d:a7:f2:c5:1e:ba:13:5a:ba:5a:49:fb:55:20: c1:00:66:05:b3:54:ba:fc:d9:6c:a4:1e:d4:f6:8a:df Fingerprint (SHA-256): 3A:18:A0:1F:45:79:AD:96:03:48:9D:8C:64:51:87:B4:96:74:44:3E:68:2F:50:13:87:95:EA:7F:98:51:EB:F7 Fingerprint (SHA1): 8E:F6:AB:78:64:B3:15:0A:30:59:30:F7:C7:1D:52:92:C5:71:EE:CE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3998: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3999: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153481 (0x13bd0049) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 16:13:42 2017 Not After : Thu Mar 31 16:13:42 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 93:74:02:93:7c:b2:16:8e:5e:7c:e7:20:89:80:26:66: d7:0d:20:51:48:47:c9:b2:49:5f:02:ad:c1:eb:dc:c9: 2c:c9:a9:67:fb:f5:17:42:36:4e:cb:16:c8:1b:32:d2: 33:fd:42:6d:39:06:22:45:c9:f5:65:95:d4:35:f0:b0: 34:4c:a8:08:a4:02:75:db:f3:15:c5:6c:17:f8:55:d9: 41:20:ec:4d:3a:6b:20:98:e0:b0:85:1e:85:eb:dc:4d: 1b:5c:38:4b:de:32:a7:dd:1d:63:33:3f:e9:f8:ab:6c: e8:03:0f:f1:78:22:d1:58:c8:77:c8:e6:9d:91:9a:32: b3:99:2f:f9:e7:9d:a6:8f:0c:44:14:35:f4:63:f8:82: ff:02:0e:c7:75:73:c6:02:3f:bb:9e:62:c7:73:ec:4f: a2:ba:7e:57:49:e3:bb:44:51:a7:60:78:b3:2b:b9:a5: 6f:28:67:bf:25:3f:be:c9:79:16:67:8d:15:52:50:e8: 9b:9e:9e:1c:56:4b:7f:43:eb:5f:4b:28:7f:17:1d:93: 5a:ae:8c:20:ed:b3:52:21:0f:16:92:d2:95:77:33:35: 9d:f5:b9:a8:70:3f:18:75:8c:64:07:ad:f9:36:6d:5c: 32:22:48:9a:5f:f8:5d:d8:8b:e0:83:3c:b9:77:18:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:f9:a4:8d:f1:45:0b:24:5e:a5:4b:b2:89:2f:34:52: f9:65:f7:ed:05:44:56:90:d2:c8:09:b4:a8:e8:0f:a5: 7f:d9:36:c3:b3:06:c0:72:d8:8c:d4:76:f3:ee:12:43: cb:41:1d:58:77:ad:a0:ca:9c:7e:80:45:bc:c9:cc:b5: d3:52:a3:42:52:60:0a:e6:cc:fd:b5:88:da:07:47:9d: e7:da:e8:a6:b3:01:ee:bb:9b:e3:22:e0:6a:6b:ad:d0: b9:65:b3:63:bf:3d:58:2c:8e:50:bb:41:37:61:09:cb: 4a:0e:6a:2c:f7:53:e6:04:7d:d7:1c:25:f1:d3:4b:26: ed:b2:46:02:74:20:90:fa:5d:f7:62:35:f1:0e:7e:c0: da:c6:cb:34:60:4e:88:b8:17:06:62:b1:5f:b5:1f:d5: c8:ff:68:34:88:72:a7:bf:8e:8e:5b:75:d3:c0:13:1c: f9:89:1e:9f:f3:c0:ca:91:5b:d6:0a:d1:b8:77:d5:1e: 4b:fa:af:3f:35:23:52:9e:b6:62:79:be:8c:d4:5c:77: b1:bb:1a:c3:05:46:7b:9c:1c:81:96:94:78:73:e5:c7: 0b:6e:5c:70:ba:ea:67:ee:02:79:1e:5c:de:0e:90:f7: 31:eb:b8:49:27:2e:65:84:01:34:ac:1a:e0:c0:d8:b5 Fingerprint (SHA-256): 0B:94:47:F9:FB:E5:32:69:AA:F4:21:0C:B1:CE:7F:B3:01:D9:2F:FD:66:BA:EC:26:5C:80:1B:5C:D2:81:FD:93 Fingerprint (SHA1): 36:61:41:59:8F:6D:1C:F1:4B:CC:3A:64:29:E8:01:56:79:2B:C9:0C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #4000: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4001: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4002: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153483 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4003: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4004: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4005: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4006: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331153484 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4007: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4008: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4009: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4010: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331153485 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4011: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4012: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #4013: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4014: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 331153486 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4015: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4016: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #4017: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4018: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 331153487 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4019: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4020: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4021: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153483 (0x13bd004b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:14:24 2017 Not After : Thu Mar 31 16:14:24 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:68:a1:23:a1:62:56:8a:c8:dd:c1:4b:32:3f:0d:b7: d4:8a:44:3b:9b:a4:b4:4c:45:6e:64:32:fe:5e:fe:2e: 1c:fe:59:a2:c8:d2:4c:91:a7:be:75:4c:43:93:bf:7a: a0:60:cc:93:45:24:e5:2b:74:f2:ad:bf:4c:a6:74:48: 69:95:71:0d:a4:6d:07:45:c3:a3:50:6d:3e:79:c2:2a: 56:2c:7c:f7:c0:82:a1:52:57:dc:4e:89:2f:45:c9:17: 36:c8:50:da:40:44:db:99:aa:d2:a9:1a:11:5e:f4:f4: 57:de:6c:66:3e:59:da:81:8d:1d:0a:cb:1c:24:2c:6f: 63:d3:98:46:b1:99:4b:f2:a2:2e:d8:d4:e6:de:ee:a5: e5:0b:bd:52:73:0a:d5:2b:16:95:40:d7:a0:7a:d0:34: 39:15:93:c4:cd:98:3e:97:9e:5d:98:6c:27:2d:66:ae: 4e:b8:79:fc:fc:6d:b5:28:50:c0:96:53:9b:76:00:ee: 1e:51:ec:7c:83:5a:bf:7e:f0:18:46:dd:ac:82:4b:d4: 3d:6a:c6:62:f3:1a:eb:ff:d2:e7:93:3d:26:52:da:b0: 33:a0:25:07:a7:68:0e:15:cc:eb:c4:73:b0:cf:bc:b7: 2c:49:af:34:2e:26:b9:5e:8e:86:98:98:ac:a1:28:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:68:b3:e5:45:a4:c1:fa:65:3e:59:48:af:a7:1b:12: 28:4d:50:12:88:c0:76:6f:63:47:f9:76:79:b6:54:f3: d3:a4:9e:26:32:38:ee:b3:d7:c0:e9:e8:69:67:1c:b8: 11:13:48:e2:99:ce:19:96:73:39:3a:07:ec:4b:58:e5: b6:ac:6e:ba:6d:51:4a:35:f9:f9:d5:87:c2:a3:72:fc: fd:f6:f0:cd:cc:34:92:96:a4:08:62:75:10:9e:e7:95: 09:59:00:7a:c6:e1:87:9e:75:4e:8f:68:1e:c4:6c:28: 48:fa:b9:d7:ee:6a:b0:03:30:f6:b5:bc:f3:fa:e1:62: ae:29:33:4a:2d:b1:b8:bf:93:ab:94:20:63:93:07:9e: a5:9b:ff:13:29:9b:28:52:1c:6f:d2:90:86:5f:36:51: 16:f2:c6:98:10:82:95:db:3d:35:1b:05:83:35:4c:eb: ba:c5:77:44:cb:37:0a:fd:2d:c7:67:e4:58:6e:8c:19: 2f:13:0f:ee:15:50:fd:3c:c5:9f:ea:36:a6:ee:55:84: 8e:38:4e:2b:5d:b3:42:d9:88:20:c6:6c:39:7c:ed:92: 52:0e:3f:b9:9a:d0:98:f6:d6:8a:97:50:3e:aa:5d:bc: c0:82:58:75:f2:12:3e:83:fd:da:e0:c7:ad:75:d4:76 Fingerprint (SHA-256): BC:B2:7C:34:68:AC:9A:41:78:BE:E3:68:2E:29:10:0D:51:66:AD:43:0B:CE:D3:DB:83:1B:01:4C:62:4B:4C:D1 Fingerprint (SHA1): 54:64:A1:9C:A3:CD:EE:2A:6A:D4:54:32:9C:2E:8F:3F:1C:6C:B2:D7 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4022: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4023: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153484 (0x13bd004c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:14:33 2017 Not After : Thu Mar 31 16:14:33 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:9b:74:a6:a8:ac:48:b6:17:c0:36:43:0b:e1:85:2d: e1:b4:17:ac:4a:ae:50:07:d7:3e:50:53:5e:a8:23:b4: 98:34:45:a3:74:ad:61:53:65:f5:22:fc:2b:9e:a3:d4: 5c:bd:8c:57:a8:78:38:d3:57:07:1e:e9:0c:8a:b5:66: df:8e:14:75:f4:dd:81:60:4a:ee:44:63:fb:03:44:a6: 1a:36:70:2c:c2:fb:d7:c0:c6:2a:d0:b3:17:d3:38:2b: 3f:64:ed:01:ce:cb:82:af:49:97:6f:6d:23:d1:6b:72: dc:28:c1:f6:2a:e0:27:54:b6:d8:38:81:4e:47:41:72: c2:68:7a:7f:90:71:ee:e1:c1:03:39:ec:27:99:9e:b0: 64:ce:02:26:73:91:e9:7b:7d:85:1d:86:6e:23:2c:7c: 6a:7b:8e:31:1e:fd:02:07:87:b1:17:6c:7b:12:8a:f5: f0:ee:19:59:4c:f0:80:99:30:f4:77:65:ca:bb:b3:af: d3:3e:5e:fa:3e:d8:43:bd:33:56:ea:43:f2:ef:b3:37: 2a:96:c1:5e:01:b6:00:50:cf:1e:d8:5a:04:97:04:ec: 7d:79:26:7d:72:a3:ce:4b:dd:cc:7a:54:a2:7e:69:bc: 06:ea:b9:3f:18:ee:6f:f2:2d:59:83:9a:97:10:a6:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:42:f1:cd:5d:88:5c:42:93:d3:fb:a0:9d:4f:0c:44: 05:a4:33:ea:8b:c6:99:a2:7d:f0:8d:97:74:5f:93:a2: a3:30:a7:9a:95:db:e9:c5:da:b2:7b:1e:46:44:6e:a4: 04:26:4a:b7:23:90:cc:23:64:14:1a:d7:05:77:0a:4c: 64:1c:33:97:d9:b4:ac:89:d8:0a:97:9d:f1:77:72:44: a3:cd:94:f4:49:06:c0:f3:74:47:a7:65:a8:41:a4:86: 1f:ec:c3:84:79:5a:60:f6:20:6b:e4:8c:83:39:74:cb: b0:8c:fc:e1:3d:91:cd:5d:c1:be:dd:1e:90:fb:77:c9: a3:72:19:76:d2:30:d6:a4:ac:7f:d6:78:c8:8a:ec:f0: a4:d2:63:c7:3a:a6:b0:d3:8d:19:7a:2e:9d:dc:c0:62: cf:17:03:24:9f:db:58:8a:ee:26:5d:b4:42:61:b0:10: bd:a5:4d:29:82:42:6e:7b:70:e9:d4:6c:de:08:01:73: 67:fd:7b:78:59:73:9d:56:c2:5d:39:6b:e8:36:b3:3c: b4:82:17:98:97:64:cc:c4:3e:52:47:41:a7:37:b0:00: c5:a6:bf:79:b5:2d:9e:e6:8c:d1:5f:d3:c4:45:b4:d2: 3f:3d:77:90:36:ff:e1:6e:8f:ce:05:ed:0d:95:e3:4e Fingerprint (SHA-256): C2:36:25:B9:1B:FC:35:86:58:74:7C:2D:1E:4E:CA:E7:93:03:89:C0:57:3F:72:37:DF:45:C5:66:DC:F8:88:59 Fingerprint (SHA1): 41:58:81:74:BE:0C:CC:06:C5:A2:BE:0A:E0:5F:2A:22:B6:CA:4E:73 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4024: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4025: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153485 (0x13bd004d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 16:14:39 2017 Not After : Thu Mar 31 16:14:39 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:2e:6a:20:86:73:5e:eb:11:ac:72:9f:b6:13:e8:0b: f0:48:c4:26:33:d8:b1:39:0b:53:f6:00:aa:a6:ff:49: 51:7a:17:34:89:75:12:a5:79:e2:d5:6a:92:5a:08:85: 4c:fe:66:93:37:f1:09:9e:27:a6:37:fc:13:3e:64:06: 46:41:b2:27:5e:bd:6b:3f:b1:c6:75:fa:a6:d1:9b:d9: 18:79:3c:f5:b2:2f:37:0f:ec:03:49:0e:53:13:03:a5: 7e:c1:6e:4d:6e:31:29:6e:3e:a7:25:45:89:c9:f1:2f: 9a:de:0a:2e:5b:47:ab:8f:1d:63:e5:e8:7d:6a:54:b5: cc:92:a7:4f:dc:99:a8:f4:c6:ad:ee:39:33:58:c9:c7: ab:30:37:3a:81:dc:c4:bb:e4:7d:a4:47:c6:44:70:88: e8:a5:4b:cc:0d:18:40:d6:5f:9a:0e:5a:51:48:06:3f: ab:95:2f:e2:8e:85:15:ab:a8:c1:92:1f:92:2a:71:6f: 9a:66:27:42:fe:51:f4:00:09:cb:1a:08:47:c6:3b:6d: b6:2b:cc:9e:d8:cd:5e:7d:f8:e7:b0:56:53:15:be:06: b7:31:f7:65:6c:c2:a4:4b:c1:2c:4a:41:9b:74:b3:b9: c6:a3:f0:64:71:87:35:be:68:7b:65:a9:34:7e:ca:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:0c:ec:c4:ed:9a:40:bf:ef:db:a5:5b:af:8c:87:d2: 4b:fc:2e:10:76:f4:da:71:1d:da:23:96:4a:1d:f4:c4: bb:ca:b4:07:6a:be:f8:9d:25:b1:ef:9c:60:f5:94:ac: f3:0e:ea:82:8b:0e:98:41:ae:25:e4:f7:52:8c:26:39: cc:c7:73:e2:81:cd:a5:00:72:10:fc:cd:0d:08:59:6f: de:4c:d8:f7:27:1d:a7:0f:db:8f:a0:cf:e5:cc:85:e7: d1:3c:cd:47:0d:cd:51:10:7f:b4:c9:c3:73:e0:b1:84: 4a:cb:9f:b2:4b:8c:55:aa:fa:54:e9:5f:74:de:4a:27: d8:f2:2c:74:7d:af:96:49:cf:bf:a3:5b:f0:fd:39:ab: 3e:8c:f5:f6:a4:c3:33:50:ee:62:2a:46:72:e8:6c:1e: 43:4a:a2:37:c3:db:04:51:32:91:bb:7a:79:8d:1a:a9: 65:66:ae:d8:21:27:52:37:81:57:f6:5a:e4:4a:ad:27: a0:10:a6:fa:3b:c1:f2:12:cf:da:fd:25:ff:d7:f3:d1: 03:42:ca:fd:57:83:3d:5a:0d:76:cf:c1:2c:8e:75:36: 5f:d6:57:e4:e6:80:2f:94:f0:ea:6c:fc:02:00:6d:da: 2c:8e:54:c8:f5:ab:3a:05:8c:f4:06:81:1e:3c:20:3e Fingerprint (SHA-256): EC:5E:66:90:74:62:43:18:B3:82:F7:5A:92:9A:DC:46:7B:04:1B:DD:3A:83:92:CA:91:55:FE:C6:8A:01:0F:C8 Fingerprint (SHA1): 20:8B:88:54:7A:9F:90:98:C9:80:AF:A0:D8:43:76:DB:1E:83:6A:28 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #4026: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4027: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #4028: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #4029: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #4030: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153483 (0x13bd004b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:14:24 2017 Not After : Thu Mar 31 16:14:24 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:68:a1:23:a1:62:56:8a:c8:dd:c1:4b:32:3f:0d:b7: d4:8a:44:3b:9b:a4:b4:4c:45:6e:64:32:fe:5e:fe:2e: 1c:fe:59:a2:c8:d2:4c:91:a7:be:75:4c:43:93:bf:7a: a0:60:cc:93:45:24:e5:2b:74:f2:ad:bf:4c:a6:74:48: 69:95:71:0d:a4:6d:07:45:c3:a3:50:6d:3e:79:c2:2a: 56:2c:7c:f7:c0:82:a1:52:57:dc:4e:89:2f:45:c9:17: 36:c8:50:da:40:44:db:99:aa:d2:a9:1a:11:5e:f4:f4: 57:de:6c:66:3e:59:da:81:8d:1d:0a:cb:1c:24:2c:6f: 63:d3:98:46:b1:99:4b:f2:a2:2e:d8:d4:e6:de:ee:a5: e5:0b:bd:52:73:0a:d5:2b:16:95:40:d7:a0:7a:d0:34: 39:15:93:c4:cd:98:3e:97:9e:5d:98:6c:27:2d:66:ae: 4e:b8:79:fc:fc:6d:b5:28:50:c0:96:53:9b:76:00:ee: 1e:51:ec:7c:83:5a:bf:7e:f0:18:46:dd:ac:82:4b:d4: 3d:6a:c6:62:f3:1a:eb:ff:d2:e7:93:3d:26:52:da:b0: 33:a0:25:07:a7:68:0e:15:cc:eb:c4:73:b0:cf:bc:b7: 2c:49:af:34:2e:26:b9:5e:8e:86:98:98:ac:a1:28:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:68:b3:e5:45:a4:c1:fa:65:3e:59:48:af:a7:1b:12: 28:4d:50:12:88:c0:76:6f:63:47:f9:76:79:b6:54:f3: d3:a4:9e:26:32:38:ee:b3:d7:c0:e9:e8:69:67:1c:b8: 11:13:48:e2:99:ce:19:96:73:39:3a:07:ec:4b:58:e5: b6:ac:6e:ba:6d:51:4a:35:f9:f9:d5:87:c2:a3:72:fc: fd:f6:f0:cd:cc:34:92:96:a4:08:62:75:10:9e:e7:95: 09:59:00:7a:c6:e1:87:9e:75:4e:8f:68:1e:c4:6c:28: 48:fa:b9:d7:ee:6a:b0:03:30:f6:b5:bc:f3:fa:e1:62: ae:29:33:4a:2d:b1:b8:bf:93:ab:94:20:63:93:07:9e: a5:9b:ff:13:29:9b:28:52:1c:6f:d2:90:86:5f:36:51: 16:f2:c6:98:10:82:95:db:3d:35:1b:05:83:35:4c:eb: ba:c5:77:44:cb:37:0a:fd:2d:c7:67:e4:58:6e:8c:19: 2f:13:0f:ee:15:50:fd:3c:c5:9f:ea:36:a6:ee:55:84: 8e:38:4e:2b:5d:b3:42:d9:88:20:c6:6c:39:7c:ed:92: 52:0e:3f:b9:9a:d0:98:f6:d6:8a:97:50:3e:aa:5d:bc: c0:82:58:75:f2:12:3e:83:fd:da:e0:c7:ad:75:d4:76 Fingerprint (SHA-256): BC:B2:7C:34:68:AC:9A:41:78:BE:E3:68:2E:29:10:0D:51:66:AD:43:0B:CE:D3:DB:83:1B:01:4C:62:4B:4C:D1 Fingerprint (SHA1): 54:64:A1:9C:A3:CD:EE:2A:6A:D4:54:32:9C:2E:8F:3F:1C:6C:B2:D7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4031: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4032: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153484 (0x13bd004c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:14:33 2017 Not After : Thu Mar 31 16:14:33 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:9b:74:a6:a8:ac:48:b6:17:c0:36:43:0b:e1:85:2d: e1:b4:17:ac:4a:ae:50:07:d7:3e:50:53:5e:a8:23:b4: 98:34:45:a3:74:ad:61:53:65:f5:22:fc:2b:9e:a3:d4: 5c:bd:8c:57:a8:78:38:d3:57:07:1e:e9:0c:8a:b5:66: df:8e:14:75:f4:dd:81:60:4a:ee:44:63:fb:03:44:a6: 1a:36:70:2c:c2:fb:d7:c0:c6:2a:d0:b3:17:d3:38:2b: 3f:64:ed:01:ce:cb:82:af:49:97:6f:6d:23:d1:6b:72: dc:28:c1:f6:2a:e0:27:54:b6:d8:38:81:4e:47:41:72: c2:68:7a:7f:90:71:ee:e1:c1:03:39:ec:27:99:9e:b0: 64:ce:02:26:73:91:e9:7b:7d:85:1d:86:6e:23:2c:7c: 6a:7b:8e:31:1e:fd:02:07:87:b1:17:6c:7b:12:8a:f5: f0:ee:19:59:4c:f0:80:99:30:f4:77:65:ca:bb:b3:af: d3:3e:5e:fa:3e:d8:43:bd:33:56:ea:43:f2:ef:b3:37: 2a:96:c1:5e:01:b6:00:50:cf:1e:d8:5a:04:97:04:ec: 7d:79:26:7d:72:a3:ce:4b:dd:cc:7a:54:a2:7e:69:bc: 06:ea:b9:3f:18:ee:6f:f2:2d:59:83:9a:97:10:a6:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:42:f1:cd:5d:88:5c:42:93:d3:fb:a0:9d:4f:0c:44: 05:a4:33:ea:8b:c6:99:a2:7d:f0:8d:97:74:5f:93:a2: a3:30:a7:9a:95:db:e9:c5:da:b2:7b:1e:46:44:6e:a4: 04:26:4a:b7:23:90:cc:23:64:14:1a:d7:05:77:0a:4c: 64:1c:33:97:d9:b4:ac:89:d8:0a:97:9d:f1:77:72:44: a3:cd:94:f4:49:06:c0:f3:74:47:a7:65:a8:41:a4:86: 1f:ec:c3:84:79:5a:60:f6:20:6b:e4:8c:83:39:74:cb: b0:8c:fc:e1:3d:91:cd:5d:c1:be:dd:1e:90:fb:77:c9: a3:72:19:76:d2:30:d6:a4:ac:7f:d6:78:c8:8a:ec:f0: a4:d2:63:c7:3a:a6:b0:d3:8d:19:7a:2e:9d:dc:c0:62: cf:17:03:24:9f:db:58:8a:ee:26:5d:b4:42:61:b0:10: bd:a5:4d:29:82:42:6e:7b:70:e9:d4:6c:de:08:01:73: 67:fd:7b:78:59:73:9d:56:c2:5d:39:6b:e8:36:b3:3c: b4:82:17:98:97:64:cc:c4:3e:52:47:41:a7:37:b0:00: c5:a6:bf:79:b5:2d:9e:e6:8c:d1:5f:d3:c4:45:b4:d2: 3f:3d:77:90:36:ff:e1:6e:8f:ce:05:ed:0d:95:e3:4e Fingerprint (SHA-256): C2:36:25:B9:1B:FC:35:86:58:74:7C:2D:1E:4E:CA:E7:93:03:89:C0:57:3F:72:37:DF:45:C5:66:DC:F8:88:59 Fingerprint (SHA1): 41:58:81:74:BE:0C:CC:06:C5:A2:BE:0A:E0:5F:2A:22:B6:CA:4E:73 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4033: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4034: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153485 (0x13bd004d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 16:14:39 2017 Not After : Thu Mar 31 16:14:39 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:2e:6a:20:86:73:5e:eb:11:ac:72:9f:b6:13:e8:0b: f0:48:c4:26:33:d8:b1:39:0b:53:f6:00:aa:a6:ff:49: 51:7a:17:34:89:75:12:a5:79:e2:d5:6a:92:5a:08:85: 4c:fe:66:93:37:f1:09:9e:27:a6:37:fc:13:3e:64:06: 46:41:b2:27:5e:bd:6b:3f:b1:c6:75:fa:a6:d1:9b:d9: 18:79:3c:f5:b2:2f:37:0f:ec:03:49:0e:53:13:03:a5: 7e:c1:6e:4d:6e:31:29:6e:3e:a7:25:45:89:c9:f1:2f: 9a:de:0a:2e:5b:47:ab:8f:1d:63:e5:e8:7d:6a:54:b5: cc:92:a7:4f:dc:99:a8:f4:c6:ad:ee:39:33:58:c9:c7: ab:30:37:3a:81:dc:c4:bb:e4:7d:a4:47:c6:44:70:88: e8:a5:4b:cc:0d:18:40:d6:5f:9a:0e:5a:51:48:06:3f: ab:95:2f:e2:8e:85:15:ab:a8:c1:92:1f:92:2a:71:6f: 9a:66:27:42:fe:51:f4:00:09:cb:1a:08:47:c6:3b:6d: b6:2b:cc:9e:d8:cd:5e:7d:f8:e7:b0:56:53:15:be:06: b7:31:f7:65:6c:c2:a4:4b:c1:2c:4a:41:9b:74:b3:b9: c6:a3:f0:64:71:87:35:be:68:7b:65:a9:34:7e:ca:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:0c:ec:c4:ed:9a:40:bf:ef:db:a5:5b:af:8c:87:d2: 4b:fc:2e:10:76:f4:da:71:1d:da:23:96:4a:1d:f4:c4: bb:ca:b4:07:6a:be:f8:9d:25:b1:ef:9c:60:f5:94:ac: f3:0e:ea:82:8b:0e:98:41:ae:25:e4:f7:52:8c:26:39: cc:c7:73:e2:81:cd:a5:00:72:10:fc:cd:0d:08:59:6f: de:4c:d8:f7:27:1d:a7:0f:db:8f:a0:cf:e5:cc:85:e7: d1:3c:cd:47:0d:cd:51:10:7f:b4:c9:c3:73:e0:b1:84: 4a:cb:9f:b2:4b:8c:55:aa:fa:54:e9:5f:74:de:4a:27: d8:f2:2c:74:7d:af:96:49:cf:bf:a3:5b:f0:fd:39:ab: 3e:8c:f5:f6:a4:c3:33:50:ee:62:2a:46:72:e8:6c:1e: 43:4a:a2:37:c3:db:04:51:32:91:bb:7a:79:8d:1a:a9: 65:66:ae:d8:21:27:52:37:81:57:f6:5a:e4:4a:ad:27: a0:10:a6:fa:3b:c1:f2:12:cf:da:fd:25:ff:d7:f3:d1: 03:42:ca:fd:57:83:3d:5a:0d:76:cf:c1:2c:8e:75:36: 5f:d6:57:e4:e6:80:2f:94:f0:ea:6c:fc:02:00:6d:da: 2c:8e:54:c8:f5:ab:3a:05:8c:f4:06:81:1e:3c:20:3e Fingerprint (SHA-256): EC:5E:66:90:74:62:43:18:B3:82:F7:5A:92:9A:DC:46:7B:04:1B:DD:3A:83:92:CA:91:55:FE:C6:8A:01:0F:C8 Fingerprint (SHA1): 20:8B:88:54:7A:9F:90:98:C9:80:AF:A0:D8:43:76:DB:1E:83:6A:28 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #4035: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4036: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153483 (0x13bd004b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:14:24 2017 Not After : Thu Mar 31 16:14:24 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:68:a1:23:a1:62:56:8a:c8:dd:c1:4b:32:3f:0d:b7: d4:8a:44:3b:9b:a4:b4:4c:45:6e:64:32:fe:5e:fe:2e: 1c:fe:59:a2:c8:d2:4c:91:a7:be:75:4c:43:93:bf:7a: a0:60:cc:93:45:24:e5:2b:74:f2:ad:bf:4c:a6:74:48: 69:95:71:0d:a4:6d:07:45:c3:a3:50:6d:3e:79:c2:2a: 56:2c:7c:f7:c0:82:a1:52:57:dc:4e:89:2f:45:c9:17: 36:c8:50:da:40:44:db:99:aa:d2:a9:1a:11:5e:f4:f4: 57:de:6c:66:3e:59:da:81:8d:1d:0a:cb:1c:24:2c:6f: 63:d3:98:46:b1:99:4b:f2:a2:2e:d8:d4:e6:de:ee:a5: e5:0b:bd:52:73:0a:d5:2b:16:95:40:d7:a0:7a:d0:34: 39:15:93:c4:cd:98:3e:97:9e:5d:98:6c:27:2d:66:ae: 4e:b8:79:fc:fc:6d:b5:28:50:c0:96:53:9b:76:00:ee: 1e:51:ec:7c:83:5a:bf:7e:f0:18:46:dd:ac:82:4b:d4: 3d:6a:c6:62:f3:1a:eb:ff:d2:e7:93:3d:26:52:da:b0: 33:a0:25:07:a7:68:0e:15:cc:eb:c4:73:b0:cf:bc:b7: 2c:49:af:34:2e:26:b9:5e:8e:86:98:98:ac:a1:28:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:68:b3:e5:45:a4:c1:fa:65:3e:59:48:af:a7:1b:12: 28:4d:50:12:88:c0:76:6f:63:47:f9:76:79:b6:54:f3: d3:a4:9e:26:32:38:ee:b3:d7:c0:e9:e8:69:67:1c:b8: 11:13:48:e2:99:ce:19:96:73:39:3a:07:ec:4b:58:e5: b6:ac:6e:ba:6d:51:4a:35:f9:f9:d5:87:c2:a3:72:fc: fd:f6:f0:cd:cc:34:92:96:a4:08:62:75:10:9e:e7:95: 09:59:00:7a:c6:e1:87:9e:75:4e:8f:68:1e:c4:6c:28: 48:fa:b9:d7:ee:6a:b0:03:30:f6:b5:bc:f3:fa:e1:62: ae:29:33:4a:2d:b1:b8:bf:93:ab:94:20:63:93:07:9e: a5:9b:ff:13:29:9b:28:52:1c:6f:d2:90:86:5f:36:51: 16:f2:c6:98:10:82:95:db:3d:35:1b:05:83:35:4c:eb: ba:c5:77:44:cb:37:0a:fd:2d:c7:67:e4:58:6e:8c:19: 2f:13:0f:ee:15:50:fd:3c:c5:9f:ea:36:a6:ee:55:84: 8e:38:4e:2b:5d:b3:42:d9:88:20:c6:6c:39:7c:ed:92: 52:0e:3f:b9:9a:d0:98:f6:d6:8a:97:50:3e:aa:5d:bc: c0:82:58:75:f2:12:3e:83:fd:da:e0:c7:ad:75:d4:76 Fingerprint (SHA-256): BC:B2:7C:34:68:AC:9A:41:78:BE:E3:68:2E:29:10:0D:51:66:AD:43:0B:CE:D3:DB:83:1B:01:4C:62:4B:4C:D1 Fingerprint (SHA1): 54:64:A1:9C:A3:CD:EE:2A:6A:D4:54:32:9C:2E:8F:3F:1C:6C:B2:D7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4037: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153483 (0x13bd004b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:14:24 2017 Not After : Thu Mar 31 16:14:24 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:68:a1:23:a1:62:56:8a:c8:dd:c1:4b:32:3f:0d:b7: d4:8a:44:3b:9b:a4:b4:4c:45:6e:64:32:fe:5e:fe:2e: 1c:fe:59:a2:c8:d2:4c:91:a7:be:75:4c:43:93:bf:7a: a0:60:cc:93:45:24:e5:2b:74:f2:ad:bf:4c:a6:74:48: 69:95:71:0d:a4:6d:07:45:c3:a3:50:6d:3e:79:c2:2a: 56:2c:7c:f7:c0:82:a1:52:57:dc:4e:89:2f:45:c9:17: 36:c8:50:da:40:44:db:99:aa:d2:a9:1a:11:5e:f4:f4: 57:de:6c:66:3e:59:da:81:8d:1d:0a:cb:1c:24:2c:6f: 63:d3:98:46:b1:99:4b:f2:a2:2e:d8:d4:e6:de:ee:a5: e5:0b:bd:52:73:0a:d5:2b:16:95:40:d7:a0:7a:d0:34: 39:15:93:c4:cd:98:3e:97:9e:5d:98:6c:27:2d:66:ae: 4e:b8:79:fc:fc:6d:b5:28:50:c0:96:53:9b:76:00:ee: 1e:51:ec:7c:83:5a:bf:7e:f0:18:46:dd:ac:82:4b:d4: 3d:6a:c6:62:f3:1a:eb:ff:d2:e7:93:3d:26:52:da:b0: 33:a0:25:07:a7:68:0e:15:cc:eb:c4:73:b0:cf:bc:b7: 2c:49:af:34:2e:26:b9:5e:8e:86:98:98:ac:a1:28:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:68:b3:e5:45:a4:c1:fa:65:3e:59:48:af:a7:1b:12: 28:4d:50:12:88:c0:76:6f:63:47:f9:76:79:b6:54:f3: d3:a4:9e:26:32:38:ee:b3:d7:c0:e9:e8:69:67:1c:b8: 11:13:48:e2:99:ce:19:96:73:39:3a:07:ec:4b:58:e5: b6:ac:6e:ba:6d:51:4a:35:f9:f9:d5:87:c2:a3:72:fc: fd:f6:f0:cd:cc:34:92:96:a4:08:62:75:10:9e:e7:95: 09:59:00:7a:c6:e1:87:9e:75:4e:8f:68:1e:c4:6c:28: 48:fa:b9:d7:ee:6a:b0:03:30:f6:b5:bc:f3:fa:e1:62: ae:29:33:4a:2d:b1:b8:bf:93:ab:94:20:63:93:07:9e: a5:9b:ff:13:29:9b:28:52:1c:6f:d2:90:86:5f:36:51: 16:f2:c6:98:10:82:95:db:3d:35:1b:05:83:35:4c:eb: ba:c5:77:44:cb:37:0a:fd:2d:c7:67:e4:58:6e:8c:19: 2f:13:0f:ee:15:50:fd:3c:c5:9f:ea:36:a6:ee:55:84: 8e:38:4e:2b:5d:b3:42:d9:88:20:c6:6c:39:7c:ed:92: 52:0e:3f:b9:9a:d0:98:f6:d6:8a:97:50:3e:aa:5d:bc: c0:82:58:75:f2:12:3e:83:fd:da:e0:c7:ad:75:d4:76 Fingerprint (SHA-256): BC:B2:7C:34:68:AC:9A:41:78:BE:E3:68:2E:29:10:0D:51:66:AD:43:0B:CE:D3:DB:83:1B:01:4C:62:4B:4C:D1 Fingerprint (SHA1): 54:64:A1:9C:A3:CD:EE:2A:6A:D4:54:32:9C:2E:8F:3F:1C:6C:B2:D7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4038: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153484 (0x13bd004c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:14:33 2017 Not After : Thu Mar 31 16:14:33 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:9b:74:a6:a8:ac:48:b6:17:c0:36:43:0b:e1:85:2d: e1:b4:17:ac:4a:ae:50:07:d7:3e:50:53:5e:a8:23:b4: 98:34:45:a3:74:ad:61:53:65:f5:22:fc:2b:9e:a3:d4: 5c:bd:8c:57:a8:78:38:d3:57:07:1e:e9:0c:8a:b5:66: df:8e:14:75:f4:dd:81:60:4a:ee:44:63:fb:03:44:a6: 1a:36:70:2c:c2:fb:d7:c0:c6:2a:d0:b3:17:d3:38:2b: 3f:64:ed:01:ce:cb:82:af:49:97:6f:6d:23:d1:6b:72: dc:28:c1:f6:2a:e0:27:54:b6:d8:38:81:4e:47:41:72: c2:68:7a:7f:90:71:ee:e1:c1:03:39:ec:27:99:9e:b0: 64:ce:02:26:73:91:e9:7b:7d:85:1d:86:6e:23:2c:7c: 6a:7b:8e:31:1e:fd:02:07:87:b1:17:6c:7b:12:8a:f5: f0:ee:19:59:4c:f0:80:99:30:f4:77:65:ca:bb:b3:af: d3:3e:5e:fa:3e:d8:43:bd:33:56:ea:43:f2:ef:b3:37: 2a:96:c1:5e:01:b6:00:50:cf:1e:d8:5a:04:97:04:ec: 7d:79:26:7d:72:a3:ce:4b:dd:cc:7a:54:a2:7e:69:bc: 06:ea:b9:3f:18:ee:6f:f2:2d:59:83:9a:97:10:a6:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:42:f1:cd:5d:88:5c:42:93:d3:fb:a0:9d:4f:0c:44: 05:a4:33:ea:8b:c6:99:a2:7d:f0:8d:97:74:5f:93:a2: a3:30:a7:9a:95:db:e9:c5:da:b2:7b:1e:46:44:6e:a4: 04:26:4a:b7:23:90:cc:23:64:14:1a:d7:05:77:0a:4c: 64:1c:33:97:d9:b4:ac:89:d8:0a:97:9d:f1:77:72:44: a3:cd:94:f4:49:06:c0:f3:74:47:a7:65:a8:41:a4:86: 1f:ec:c3:84:79:5a:60:f6:20:6b:e4:8c:83:39:74:cb: b0:8c:fc:e1:3d:91:cd:5d:c1:be:dd:1e:90:fb:77:c9: a3:72:19:76:d2:30:d6:a4:ac:7f:d6:78:c8:8a:ec:f0: a4:d2:63:c7:3a:a6:b0:d3:8d:19:7a:2e:9d:dc:c0:62: cf:17:03:24:9f:db:58:8a:ee:26:5d:b4:42:61:b0:10: bd:a5:4d:29:82:42:6e:7b:70:e9:d4:6c:de:08:01:73: 67:fd:7b:78:59:73:9d:56:c2:5d:39:6b:e8:36:b3:3c: b4:82:17:98:97:64:cc:c4:3e:52:47:41:a7:37:b0:00: c5:a6:bf:79:b5:2d:9e:e6:8c:d1:5f:d3:c4:45:b4:d2: 3f:3d:77:90:36:ff:e1:6e:8f:ce:05:ed:0d:95:e3:4e Fingerprint (SHA-256): C2:36:25:B9:1B:FC:35:86:58:74:7C:2D:1E:4E:CA:E7:93:03:89:C0:57:3F:72:37:DF:45:C5:66:DC:F8:88:59 Fingerprint (SHA1): 41:58:81:74:BE:0C:CC:06:C5:A2:BE:0A:E0:5F:2A:22:B6:CA:4E:73 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4039: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153484 (0x13bd004c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:14:33 2017 Not After : Thu Mar 31 16:14:33 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:9b:74:a6:a8:ac:48:b6:17:c0:36:43:0b:e1:85:2d: e1:b4:17:ac:4a:ae:50:07:d7:3e:50:53:5e:a8:23:b4: 98:34:45:a3:74:ad:61:53:65:f5:22:fc:2b:9e:a3:d4: 5c:bd:8c:57:a8:78:38:d3:57:07:1e:e9:0c:8a:b5:66: df:8e:14:75:f4:dd:81:60:4a:ee:44:63:fb:03:44:a6: 1a:36:70:2c:c2:fb:d7:c0:c6:2a:d0:b3:17:d3:38:2b: 3f:64:ed:01:ce:cb:82:af:49:97:6f:6d:23:d1:6b:72: dc:28:c1:f6:2a:e0:27:54:b6:d8:38:81:4e:47:41:72: c2:68:7a:7f:90:71:ee:e1:c1:03:39:ec:27:99:9e:b0: 64:ce:02:26:73:91:e9:7b:7d:85:1d:86:6e:23:2c:7c: 6a:7b:8e:31:1e:fd:02:07:87:b1:17:6c:7b:12:8a:f5: f0:ee:19:59:4c:f0:80:99:30:f4:77:65:ca:bb:b3:af: d3:3e:5e:fa:3e:d8:43:bd:33:56:ea:43:f2:ef:b3:37: 2a:96:c1:5e:01:b6:00:50:cf:1e:d8:5a:04:97:04:ec: 7d:79:26:7d:72:a3:ce:4b:dd:cc:7a:54:a2:7e:69:bc: 06:ea:b9:3f:18:ee:6f:f2:2d:59:83:9a:97:10:a6:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:42:f1:cd:5d:88:5c:42:93:d3:fb:a0:9d:4f:0c:44: 05:a4:33:ea:8b:c6:99:a2:7d:f0:8d:97:74:5f:93:a2: a3:30:a7:9a:95:db:e9:c5:da:b2:7b:1e:46:44:6e:a4: 04:26:4a:b7:23:90:cc:23:64:14:1a:d7:05:77:0a:4c: 64:1c:33:97:d9:b4:ac:89:d8:0a:97:9d:f1:77:72:44: a3:cd:94:f4:49:06:c0:f3:74:47:a7:65:a8:41:a4:86: 1f:ec:c3:84:79:5a:60:f6:20:6b:e4:8c:83:39:74:cb: b0:8c:fc:e1:3d:91:cd:5d:c1:be:dd:1e:90:fb:77:c9: a3:72:19:76:d2:30:d6:a4:ac:7f:d6:78:c8:8a:ec:f0: a4:d2:63:c7:3a:a6:b0:d3:8d:19:7a:2e:9d:dc:c0:62: cf:17:03:24:9f:db:58:8a:ee:26:5d:b4:42:61:b0:10: bd:a5:4d:29:82:42:6e:7b:70:e9:d4:6c:de:08:01:73: 67:fd:7b:78:59:73:9d:56:c2:5d:39:6b:e8:36:b3:3c: b4:82:17:98:97:64:cc:c4:3e:52:47:41:a7:37:b0:00: c5:a6:bf:79:b5:2d:9e:e6:8c:d1:5f:d3:c4:45:b4:d2: 3f:3d:77:90:36:ff:e1:6e:8f:ce:05:ed:0d:95:e3:4e Fingerprint (SHA-256): C2:36:25:B9:1B:FC:35:86:58:74:7C:2D:1E:4E:CA:E7:93:03:89:C0:57:3F:72:37:DF:45:C5:66:DC:F8:88:59 Fingerprint (SHA1): 41:58:81:74:BE:0C:CC:06:C5:A2:BE:0A:E0:5F:2A:22:B6:CA:4E:73 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4040: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153485 (0x13bd004d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 16:14:39 2017 Not After : Thu Mar 31 16:14:39 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:2e:6a:20:86:73:5e:eb:11:ac:72:9f:b6:13:e8:0b: f0:48:c4:26:33:d8:b1:39:0b:53:f6:00:aa:a6:ff:49: 51:7a:17:34:89:75:12:a5:79:e2:d5:6a:92:5a:08:85: 4c:fe:66:93:37:f1:09:9e:27:a6:37:fc:13:3e:64:06: 46:41:b2:27:5e:bd:6b:3f:b1:c6:75:fa:a6:d1:9b:d9: 18:79:3c:f5:b2:2f:37:0f:ec:03:49:0e:53:13:03:a5: 7e:c1:6e:4d:6e:31:29:6e:3e:a7:25:45:89:c9:f1:2f: 9a:de:0a:2e:5b:47:ab:8f:1d:63:e5:e8:7d:6a:54:b5: cc:92:a7:4f:dc:99:a8:f4:c6:ad:ee:39:33:58:c9:c7: ab:30:37:3a:81:dc:c4:bb:e4:7d:a4:47:c6:44:70:88: e8:a5:4b:cc:0d:18:40:d6:5f:9a:0e:5a:51:48:06:3f: ab:95:2f:e2:8e:85:15:ab:a8:c1:92:1f:92:2a:71:6f: 9a:66:27:42:fe:51:f4:00:09:cb:1a:08:47:c6:3b:6d: b6:2b:cc:9e:d8:cd:5e:7d:f8:e7:b0:56:53:15:be:06: b7:31:f7:65:6c:c2:a4:4b:c1:2c:4a:41:9b:74:b3:b9: c6:a3:f0:64:71:87:35:be:68:7b:65:a9:34:7e:ca:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:0c:ec:c4:ed:9a:40:bf:ef:db:a5:5b:af:8c:87:d2: 4b:fc:2e:10:76:f4:da:71:1d:da:23:96:4a:1d:f4:c4: bb:ca:b4:07:6a:be:f8:9d:25:b1:ef:9c:60:f5:94:ac: f3:0e:ea:82:8b:0e:98:41:ae:25:e4:f7:52:8c:26:39: cc:c7:73:e2:81:cd:a5:00:72:10:fc:cd:0d:08:59:6f: de:4c:d8:f7:27:1d:a7:0f:db:8f:a0:cf:e5:cc:85:e7: d1:3c:cd:47:0d:cd:51:10:7f:b4:c9:c3:73:e0:b1:84: 4a:cb:9f:b2:4b:8c:55:aa:fa:54:e9:5f:74:de:4a:27: d8:f2:2c:74:7d:af:96:49:cf:bf:a3:5b:f0:fd:39:ab: 3e:8c:f5:f6:a4:c3:33:50:ee:62:2a:46:72:e8:6c:1e: 43:4a:a2:37:c3:db:04:51:32:91:bb:7a:79:8d:1a:a9: 65:66:ae:d8:21:27:52:37:81:57:f6:5a:e4:4a:ad:27: a0:10:a6:fa:3b:c1:f2:12:cf:da:fd:25:ff:d7:f3:d1: 03:42:ca:fd:57:83:3d:5a:0d:76:cf:c1:2c:8e:75:36: 5f:d6:57:e4:e6:80:2f:94:f0:ea:6c:fc:02:00:6d:da: 2c:8e:54:c8:f5:ab:3a:05:8c:f4:06:81:1e:3c:20:3e Fingerprint (SHA-256): EC:5E:66:90:74:62:43:18:B3:82:F7:5A:92:9A:DC:46:7B:04:1B:DD:3A:83:92:CA:91:55:FE:C6:8A:01:0F:C8 Fingerprint (SHA1): 20:8B:88:54:7A:9F:90:98:C9:80:AF:A0:D8:43:76:DB:1E:83:6A:28 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #4041: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153485 (0x13bd004d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 16:14:39 2017 Not After : Thu Mar 31 16:14:39 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:2e:6a:20:86:73:5e:eb:11:ac:72:9f:b6:13:e8:0b: f0:48:c4:26:33:d8:b1:39:0b:53:f6:00:aa:a6:ff:49: 51:7a:17:34:89:75:12:a5:79:e2:d5:6a:92:5a:08:85: 4c:fe:66:93:37:f1:09:9e:27:a6:37:fc:13:3e:64:06: 46:41:b2:27:5e:bd:6b:3f:b1:c6:75:fa:a6:d1:9b:d9: 18:79:3c:f5:b2:2f:37:0f:ec:03:49:0e:53:13:03:a5: 7e:c1:6e:4d:6e:31:29:6e:3e:a7:25:45:89:c9:f1:2f: 9a:de:0a:2e:5b:47:ab:8f:1d:63:e5:e8:7d:6a:54:b5: cc:92:a7:4f:dc:99:a8:f4:c6:ad:ee:39:33:58:c9:c7: ab:30:37:3a:81:dc:c4:bb:e4:7d:a4:47:c6:44:70:88: e8:a5:4b:cc:0d:18:40:d6:5f:9a:0e:5a:51:48:06:3f: ab:95:2f:e2:8e:85:15:ab:a8:c1:92:1f:92:2a:71:6f: 9a:66:27:42:fe:51:f4:00:09:cb:1a:08:47:c6:3b:6d: b6:2b:cc:9e:d8:cd:5e:7d:f8:e7:b0:56:53:15:be:06: b7:31:f7:65:6c:c2:a4:4b:c1:2c:4a:41:9b:74:b3:b9: c6:a3:f0:64:71:87:35:be:68:7b:65:a9:34:7e:ca:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:0c:ec:c4:ed:9a:40:bf:ef:db:a5:5b:af:8c:87:d2: 4b:fc:2e:10:76:f4:da:71:1d:da:23:96:4a:1d:f4:c4: bb:ca:b4:07:6a:be:f8:9d:25:b1:ef:9c:60:f5:94:ac: f3:0e:ea:82:8b:0e:98:41:ae:25:e4:f7:52:8c:26:39: cc:c7:73:e2:81:cd:a5:00:72:10:fc:cd:0d:08:59:6f: de:4c:d8:f7:27:1d:a7:0f:db:8f:a0:cf:e5:cc:85:e7: d1:3c:cd:47:0d:cd:51:10:7f:b4:c9:c3:73:e0:b1:84: 4a:cb:9f:b2:4b:8c:55:aa:fa:54:e9:5f:74:de:4a:27: d8:f2:2c:74:7d:af:96:49:cf:bf:a3:5b:f0:fd:39:ab: 3e:8c:f5:f6:a4:c3:33:50:ee:62:2a:46:72:e8:6c:1e: 43:4a:a2:37:c3:db:04:51:32:91:bb:7a:79:8d:1a:a9: 65:66:ae:d8:21:27:52:37:81:57:f6:5a:e4:4a:ad:27: a0:10:a6:fa:3b:c1:f2:12:cf:da:fd:25:ff:d7:f3:d1: 03:42:ca:fd:57:83:3d:5a:0d:76:cf:c1:2c:8e:75:36: 5f:d6:57:e4:e6:80:2f:94:f0:ea:6c:fc:02:00:6d:da: 2c:8e:54:c8:f5:ab:3a:05:8c:f4:06:81:1e:3c:20:3e Fingerprint (SHA-256): EC:5E:66:90:74:62:43:18:B3:82:F7:5A:92:9A:DC:46:7B:04:1B:DD:3A:83:92:CA:91:55:FE:C6:8A:01:0F:C8 Fingerprint (SHA1): 20:8B:88:54:7A:9F:90:98:C9:80:AF:A0:D8:43:76:DB:1E:83:6A:28 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #4042: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #4043: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153488 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4044: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #4045: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4046: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4047: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 331153489 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4048: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4049: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4050: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4051: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331153490 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #4052: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4053: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #4054: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4055: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 331153491 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4056: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4057: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #4058: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4059: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 331153492 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4060: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4061: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #4062: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4063: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 331153493 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4064: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4065: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #4066: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4067: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 331153494 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4068: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4069: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4070: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #4071: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #4072: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #4073: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #4074: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153488 (0x13bd0050) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:15:27 2017 Not After : Thu Mar 31 16:15:27 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e2:d1:96:77:60:60:0c:95:2c:21:e3:14:90:47:ed: c4:fb:da:28:fe:ed:0e:48:34:cc:45:dc:b2:ee:a6:a5: e6:6f:7c:9c:f4:e7:4f:dd:1a:dd:be:bf:6a:87:63:f1: 96:73:b8:13:de:39:b1:ed:f8:e1:65:1c:0b:c3:31:a7: dd:bc:11:b3:55:7e:e6:00:45:dc:63:2d:cc:5a:6d:0d: ce:ae:00:8a:99:c9:65:b2:f1:bb:4d:5a:e7:9a:e7:da: 41:26:7a:75:71:bd:1f:f8:97:bb:bc:c1:18:99:51:8f: cb:aa:9a:a8:34:01:d0:18:7c:02:69:a7:d6:b3:8b:c4: 4b:78:e9:2a:53:df:cb:95:ad:71:df:36:83:6b:1f:d0: e2:75:87:6c:fe:41:a9:4e:58:33:f0:e9:01:9c:d3:b1: 12:2d:67:be:ce:1f:71:d9:5a:2b:6f:8c:d2:c0:9c:7c: 56:25:82:9a:dc:79:ad:dd:8e:2e:64:c6:5a:60:d0:0f: 58:96:4e:7e:68:bc:5e:74:c9:4a:13:a2:9c:92:dd:81: 2c:b7:02:73:2b:99:42:07:79:22:0e:fe:12:67:da:fe: b9:3b:93:b7:32:f7:1a:dc:72:7b:7d:52:5e:43:1b:19: 39:4c:ee:0f:d5:f2:4c:8c:83:94:21:1c:32:cf:c6:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:20:30:8d:20:05:da:36:29:a9:20:18:a7:48:0c:ac: 8f:90:98:aa:1d:d9:8c:88:54:e9:f0:7c:e2:d6:4e:02: a9:ff:9b:67:04:b1:69:67:49:f5:8e:f7:5d:d9:5a:ba: a2:1d:a9:64:ee:54:6a:2f:f0:02:b4:ba:92:c4:4c:d8: 65:14:05:d4:e7:98:8c:f6:05:58:ea:29:9b:d4:b9:0e: d1:46:15:2b:d1:4a:61:4e:af:f4:15:bc:94:9d:8b:45: a6:7e:59:fe:df:05:37:53:e8:64:9f:85:c2:09:33:0c: 5d:ca:7f:70:98:62:7f:98:73:eb:bc:66:84:78:e9:73: 77:3f:cb:6e:b8:ab:19:4f:25:12:e9:d3:28:68:c7:34: da:7e:c5:2f:4b:61:06:25:d3:57:24:81:16:5d:b0:3e: 1a:d3:e9:c5:2d:1f:a2:0c:0a:fc:25:b9:64:6d:22:ab: b4:56:fe:73:8e:37:08:36:8b:e1:84:f9:b8:77:d1:76: e5:22:de:ab:be:d3:f1:1f:b2:24:20:34:5f:1a:45:2a: 4e:44:b4:a6:41:48:40:ff:38:ee:46:42:17:c8:f0:03: eb:c2:8f:ce:31:2a:0f:6b:db:b0:bb:49:3b:1b:70:0b: a4:1b:47:f8:15:d1:b8:f3:64:94:71:fe:6a:88:6c:55 Fingerprint (SHA-256): 8D:EA:EB:1F:BF:EC:BC:85:BB:5B:B3:CC:83:9B:4D:30:F0:20:FD:D3:42:4E:5D:DD:C9:66:C9:CE:6F:5F:7B:CD Fingerprint (SHA1): 58:89:52:EC:19:32:B2:98:CA:7F:93:79:ED:AE:A3:04:F5:A6:4F:C7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4075: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4076: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4077: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4078: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153488 (0x13bd0050) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:15:27 2017 Not After : Thu Mar 31 16:15:27 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e2:d1:96:77:60:60:0c:95:2c:21:e3:14:90:47:ed: c4:fb:da:28:fe:ed:0e:48:34:cc:45:dc:b2:ee:a6:a5: e6:6f:7c:9c:f4:e7:4f:dd:1a:dd:be:bf:6a:87:63:f1: 96:73:b8:13:de:39:b1:ed:f8:e1:65:1c:0b:c3:31:a7: dd:bc:11:b3:55:7e:e6:00:45:dc:63:2d:cc:5a:6d:0d: ce:ae:00:8a:99:c9:65:b2:f1:bb:4d:5a:e7:9a:e7:da: 41:26:7a:75:71:bd:1f:f8:97:bb:bc:c1:18:99:51:8f: cb:aa:9a:a8:34:01:d0:18:7c:02:69:a7:d6:b3:8b:c4: 4b:78:e9:2a:53:df:cb:95:ad:71:df:36:83:6b:1f:d0: e2:75:87:6c:fe:41:a9:4e:58:33:f0:e9:01:9c:d3:b1: 12:2d:67:be:ce:1f:71:d9:5a:2b:6f:8c:d2:c0:9c:7c: 56:25:82:9a:dc:79:ad:dd:8e:2e:64:c6:5a:60:d0:0f: 58:96:4e:7e:68:bc:5e:74:c9:4a:13:a2:9c:92:dd:81: 2c:b7:02:73:2b:99:42:07:79:22:0e:fe:12:67:da:fe: b9:3b:93:b7:32:f7:1a:dc:72:7b:7d:52:5e:43:1b:19: 39:4c:ee:0f:d5:f2:4c:8c:83:94:21:1c:32:cf:c6:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:20:30:8d:20:05:da:36:29:a9:20:18:a7:48:0c:ac: 8f:90:98:aa:1d:d9:8c:88:54:e9:f0:7c:e2:d6:4e:02: a9:ff:9b:67:04:b1:69:67:49:f5:8e:f7:5d:d9:5a:ba: a2:1d:a9:64:ee:54:6a:2f:f0:02:b4:ba:92:c4:4c:d8: 65:14:05:d4:e7:98:8c:f6:05:58:ea:29:9b:d4:b9:0e: d1:46:15:2b:d1:4a:61:4e:af:f4:15:bc:94:9d:8b:45: a6:7e:59:fe:df:05:37:53:e8:64:9f:85:c2:09:33:0c: 5d:ca:7f:70:98:62:7f:98:73:eb:bc:66:84:78:e9:73: 77:3f:cb:6e:b8:ab:19:4f:25:12:e9:d3:28:68:c7:34: da:7e:c5:2f:4b:61:06:25:d3:57:24:81:16:5d:b0:3e: 1a:d3:e9:c5:2d:1f:a2:0c:0a:fc:25:b9:64:6d:22:ab: b4:56:fe:73:8e:37:08:36:8b:e1:84:f9:b8:77:d1:76: e5:22:de:ab:be:d3:f1:1f:b2:24:20:34:5f:1a:45:2a: 4e:44:b4:a6:41:48:40:ff:38:ee:46:42:17:c8:f0:03: eb:c2:8f:ce:31:2a:0f:6b:db:b0:bb:49:3b:1b:70:0b: a4:1b:47:f8:15:d1:b8:f3:64:94:71:fe:6a:88:6c:55 Fingerprint (SHA-256): 8D:EA:EB:1F:BF:EC:BC:85:BB:5B:B3:CC:83:9B:4D:30:F0:20:FD:D3:42:4E:5D:DD:C9:66:C9:CE:6F:5F:7B:CD Fingerprint (SHA1): 58:89:52:EC:19:32:B2:98:CA:7F:93:79:ED:AE:A3:04:F5:A6:4F:C7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4079: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4080: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #4081: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153495 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4082: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #4083: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4084: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4085: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 331153496 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #4086: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4087: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #4088: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4089: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 331153497 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4090: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4091: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #4092: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4093: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 331153498 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4094: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4095: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4096: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4097: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 331153499 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4098: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4099: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #4100: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4101: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 331153500 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4102: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4103: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #4104: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4105: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 331153501 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4106: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4107: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4108: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4109: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 331153502 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4110: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4111: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #4112: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4113: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 331153503 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #4114: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4115: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #4116: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4117: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 331153504 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4118: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4119: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #4120: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4121: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 331153505 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4122: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4123: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #4124: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4125: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 331153506 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4126: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4127: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #4128: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4129: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 331153507 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4130: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4131: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #4132: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4133: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 331153508 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4134: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4135: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #4136: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4137: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 331153509 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4138: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4139: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #4140: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4141: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 331153510 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4142: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4143: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #4144: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4145: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 331153511 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4146: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4147: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #4148: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4149: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 331153512 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #4150: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4151: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #4152: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4153: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 331153513 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4154: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4155: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #4156: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4157: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 331153514 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4158: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4159: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #4160: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4161: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 331153515 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4162: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4163: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #4164: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4165: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 331153516 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4166: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4167: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #4168: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4169: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 331153517 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4170: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4171: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #4172: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4173: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 331153518 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4174: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4175: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #4176: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4177: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 331153519 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4178: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4179: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #4180: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4181: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 331153520 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4182: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4183: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #4184: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4185: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 331153521 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4186: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4187: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #4188: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4189: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 331153522 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4190: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4191: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #4192: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4193: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 331153523 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4194: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4195: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #4196: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4197: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 331153524 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4198: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4199: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4200: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153495 (0x13bd0057) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:17:01 2017 Not After : Thu Mar 31 16:17:01 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fc:74:92:37:75:e2:13:d9:0f:92:92:94:cc:17:fb:ce: 36:41:b9:b1:00:08:fe:18:0b:97:a1:6a:47:00:fb:36: 9f:61:da:01:5d:7d:79:56:9b:a0:fd:66:51:8d:ec:0f: 48:1d:84:ad:7d:81:ed:c1:df:af:2e:78:86:a8:e2:a9: b8:a1:4a:c8:8e:eb:39:ab:88:4a:d3:f7:fa:58:d5:49: ed:7d:eb:c8:91:6b:ce:16:93:3b:75:4b:b9:ce:df:fe: c6:e6:d2:d2:c0:84:a2:df:c8:69:25:93:c5:53:64:ff: f0:34:57:d6:69:9e:cd:3f:f3:b6:ab:5b:bf:79:a6:d0: 4b:b7:92:cb:6f:4f:3c:43:0e:bc:e2:f3:e4:28:59:f8: c2:41:c7:3a:54:40:f7:07:19:ee:ed:b7:09:88:b9:f2: 16:51:b4:86:8a:a9:18:bc:d3:d3:23:bf:79:ff:59:1f: 42:b3:35:22:03:80:a1:37:10:87:85:30:a8:d9:b9:43: f5:2c:aa:ed:6e:0d:f8:62:bc:e8:f2:b8:ff:f5:6c:17: a0:39:32:88:46:f2:e9:49:11:22:4f:10:7e:a6:e9:4e: bd:13:94:90:5b:ad:ae:32:ad:aa:a9:12:2e:eb:26:49: 61:68:9e:45:39:c3:d9:97:a3:73:cb:75:80:36:1c:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e8:7d:ff:66:aa:32:31:f1:a2:05:04:a4:33:53:82:be: cf:95:a2:66:79:ce:0b:87:f5:2e:31:13:4a:06:27:04: d1:26:c7:fc:47:aa:c2:65:9a:f0:8e:af:bc:43:8e:25: 1e:09:da:67:6f:c3:5a:60:8d:01:36:f6:83:18:86:f4: 7c:da:69:2c:87:3e:bc:32:32:0e:6e:06:f6:b5:c9:d2: 4c:5a:60:44:3e:ec:ae:89:77:94:76:9b:5d:e8:dd:22: 13:df:86:d7:dd:52:19:23:12:41:51:b8:95:16:e6:45: 62:34:0d:78:97:d2:74:29:5a:0c:29:0b:45:34:7b:69: 6a:da:87:70:0d:bf:7f:e4:27:53:8f:47:7a:ca:92:87: 71:df:25:a2:2b:ee:d6:fe:14:6c:91:01:ec:80:31:9e: f2:8d:35:58:fe:5b:ae:4e:4f:e1:32:b8:11:38:52:81: 50:cf:99:23:29:a2:c6:d9:6b:39:42:94:ce:5d:08:eb: 0f:17:aa:e6:a1:4c:36:cd:59:b1:36:36:95:ef:e7:fd: 88:06:85:d8:41:b7:a9:6b:4b:9b:be:62:09:05:f9:f1: fb:2e:08:bf:c8:1b:a8:af:04:4a:ec:fd:ba:5c:ce:37: 2d:72:df:82:5e:37:3e:59:5d:af:a8:9b:56:7f:c2:8b Fingerprint (SHA-256): FD:F4:CA:DE:48:23:DA:63:02:EE:D4:77:6C:CF:3C:91:68:F4:E0:2D:55:6B:17:6A:DF:77:96:96:75:AD:76:54 Fingerprint (SHA1): 9D:39:DE:AC:C6:0C:C5:70:47:0C:BF:79:36:60:FE:38:FF:10:9E:A5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4201: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4202: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153495 (0x13bd0057) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:17:01 2017 Not After : Thu Mar 31 16:17:01 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fc:74:92:37:75:e2:13:d9:0f:92:92:94:cc:17:fb:ce: 36:41:b9:b1:00:08:fe:18:0b:97:a1:6a:47:00:fb:36: 9f:61:da:01:5d:7d:79:56:9b:a0:fd:66:51:8d:ec:0f: 48:1d:84:ad:7d:81:ed:c1:df:af:2e:78:86:a8:e2:a9: b8:a1:4a:c8:8e:eb:39:ab:88:4a:d3:f7:fa:58:d5:49: ed:7d:eb:c8:91:6b:ce:16:93:3b:75:4b:b9:ce:df:fe: c6:e6:d2:d2:c0:84:a2:df:c8:69:25:93:c5:53:64:ff: f0:34:57:d6:69:9e:cd:3f:f3:b6:ab:5b:bf:79:a6:d0: 4b:b7:92:cb:6f:4f:3c:43:0e:bc:e2:f3:e4:28:59:f8: c2:41:c7:3a:54:40:f7:07:19:ee:ed:b7:09:88:b9:f2: 16:51:b4:86:8a:a9:18:bc:d3:d3:23:bf:79:ff:59:1f: 42:b3:35:22:03:80:a1:37:10:87:85:30:a8:d9:b9:43: f5:2c:aa:ed:6e:0d:f8:62:bc:e8:f2:b8:ff:f5:6c:17: a0:39:32:88:46:f2:e9:49:11:22:4f:10:7e:a6:e9:4e: bd:13:94:90:5b:ad:ae:32:ad:aa:a9:12:2e:eb:26:49: 61:68:9e:45:39:c3:d9:97:a3:73:cb:75:80:36:1c:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e8:7d:ff:66:aa:32:31:f1:a2:05:04:a4:33:53:82:be: cf:95:a2:66:79:ce:0b:87:f5:2e:31:13:4a:06:27:04: d1:26:c7:fc:47:aa:c2:65:9a:f0:8e:af:bc:43:8e:25: 1e:09:da:67:6f:c3:5a:60:8d:01:36:f6:83:18:86:f4: 7c:da:69:2c:87:3e:bc:32:32:0e:6e:06:f6:b5:c9:d2: 4c:5a:60:44:3e:ec:ae:89:77:94:76:9b:5d:e8:dd:22: 13:df:86:d7:dd:52:19:23:12:41:51:b8:95:16:e6:45: 62:34:0d:78:97:d2:74:29:5a:0c:29:0b:45:34:7b:69: 6a:da:87:70:0d:bf:7f:e4:27:53:8f:47:7a:ca:92:87: 71:df:25:a2:2b:ee:d6:fe:14:6c:91:01:ec:80:31:9e: f2:8d:35:58:fe:5b:ae:4e:4f:e1:32:b8:11:38:52:81: 50:cf:99:23:29:a2:c6:d9:6b:39:42:94:ce:5d:08:eb: 0f:17:aa:e6:a1:4c:36:cd:59:b1:36:36:95:ef:e7:fd: 88:06:85:d8:41:b7:a9:6b:4b:9b:be:62:09:05:f9:f1: fb:2e:08:bf:c8:1b:a8:af:04:4a:ec:fd:ba:5c:ce:37: 2d:72:df:82:5e:37:3e:59:5d:af:a8:9b:56:7f:c2:8b Fingerprint (SHA-256): FD:F4:CA:DE:48:23:DA:63:02:EE:D4:77:6C:CF:3C:91:68:F4:E0:2D:55:6B:17:6A:DF:77:96:96:75:AD:76:54 Fingerprint (SHA1): 9D:39:DE:AC:C6:0C:C5:70:47:0C:BF:79:36:60:FE:38:FF:10:9E:A5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4203: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4204: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4205: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4206: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153495 (0x13bd0057) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:17:01 2017 Not After : Thu Mar 31 16:17:01 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fc:74:92:37:75:e2:13:d9:0f:92:92:94:cc:17:fb:ce: 36:41:b9:b1:00:08:fe:18:0b:97:a1:6a:47:00:fb:36: 9f:61:da:01:5d:7d:79:56:9b:a0:fd:66:51:8d:ec:0f: 48:1d:84:ad:7d:81:ed:c1:df:af:2e:78:86:a8:e2:a9: b8:a1:4a:c8:8e:eb:39:ab:88:4a:d3:f7:fa:58:d5:49: ed:7d:eb:c8:91:6b:ce:16:93:3b:75:4b:b9:ce:df:fe: c6:e6:d2:d2:c0:84:a2:df:c8:69:25:93:c5:53:64:ff: f0:34:57:d6:69:9e:cd:3f:f3:b6:ab:5b:bf:79:a6:d0: 4b:b7:92:cb:6f:4f:3c:43:0e:bc:e2:f3:e4:28:59:f8: c2:41:c7:3a:54:40:f7:07:19:ee:ed:b7:09:88:b9:f2: 16:51:b4:86:8a:a9:18:bc:d3:d3:23:bf:79:ff:59:1f: 42:b3:35:22:03:80:a1:37:10:87:85:30:a8:d9:b9:43: f5:2c:aa:ed:6e:0d:f8:62:bc:e8:f2:b8:ff:f5:6c:17: a0:39:32:88:46:f2:e9:49:11:22:4f:10:7e:a6:e9:4e: bd:13:94:90:5b:ad:ae:32:ad:aa:a9:12:2e:eb:26:49: 61:68:9e:45:39:c3:d9:97:a3:73:cb:75:80:36:1c:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e8:7d:ff:66:aa:32:31:f1:a2:05:04:a4:33:53:82:be: cf:95:a2:66:79:ce:0b:87:f5:2e:31:13:4a:06:27:04: d1:26:c7:fc:47:aa:c2:65:9a:f0:8e:af:bc:43:8e:25: 1e:09:da:67:6f:c3:5a:60:8d:01:36:f6:83:18:86:f4: 7c:da:69:2c:87:3e:bc:32:32:0e:6e:06:f6:b5:c9:d2: 4c:5a:60:44:3e:ec:ae:89:77:94:76:9b:5d:e8:dd:22: 13:df:86:d7:dd:52:19:23:12:41:51:b8:95:16:e6:45: 62:34:0d:78:97:d2:74:29:5a:0c:29:0b:45:34:7b:69: 6a:da:87:70:0d:bf:7f:e4:27:53:8f:47:7a:ca:92:87: 71:df:25:a2:2b:ee:d6:fe:14:6c:91:01:ec:80:31:9e: f2:8d:35:58:fe:5b:ae:4e:4f:e1:32:b8:11:38:52:81: 50:cf:99:23:29:a2:c6:d9:6b:39:42:94:ce:5d:08:eb: 0f:17:aa:e6:a1:4c:36:cd:59:b1:36:36:95:ef:e7:fd: 88:06:85:d8:41:b7:a9:6b:4b:9b:be:62:09:05:f9:f1: fb:2e:08:bf:c8:1b:a8:af:04:4a:ec:fd:ba:5c:ce:37: 2d:72:df:82:5e:37:3e:59:5d:af:a8:9b:56:7f:c2:8b Fingerprint (SHA-256): FD:F4:CA:DE:48:23:DA:63:02:EE:D4:77:6C:CF:3C:91:68:F4:E0:2D:55:6B:17:6A:DF:77:96:96:75:AD:76:54 Fingerprint (SHA1): 9D:39:DE:AC:C6:0C:C5:70:47:0C:BF:79:36:60:FE:38:FF:10:9E:A5 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4207: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4208: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4209: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4210: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153495 (0x13bd0057) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:17:01 2017 Not After : Thu Mar 31 16:17:01 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fc:74:92:37:75:e2:13:d9:0f:92:92:94:cc:17:fb:ce: 36:41:b9:b1:00:08:fe:18:0b:97:a1:6a:47:00:fb:36: 9f:61:da:01:5d:7d:79:56:9b:a0:fd:66:51:8d:ec:0f: 48:1d:84:ad:7d:81:ed:c1:df:af:2e:78:86:a8:e2:a9: b8:a1:4a:c8:8e:eb:39:ab:88:4a:d3:f7:fa:58:d5:49: ed:7d:eb:c8:91:6b:ce:16:93:3b:75:4b:b9:ce:df:fe: c6:e6:d2:d2:c0:84:a2:df:c8:69:25:93:c5:53:64:ff: f0:34:57:d6:69:9e:cd:3f:f3:b6:ab:5b:bf:79:a6:d0: 4b:b7:92:cb:6f:4f:3c:43:0e:bc:e2:f3:e4:28:59:f8: c2:41:c7:3a:54:40:f7:07:19:ee:ed:b7:09:88:b9:f2: 16:51:b4:86:8a:a9:18:bc:d3:d3:23:bf:79:ff:59:1f: 42:b3:35:22:03:80:a1:37:10:87:85:30:a8:d9:b9:43: f5:2c:aa:ed:6e:0d:f8:62:bc:e8:f2:b8:ff:f5:6c:17: a0:39:32:88:46:f2:e9:49:11:22:4f:10:7e:a6:e9:4e: bd:13:94:90:5b:ad:ae:32:ad:aa:a9:12:2e:eb:26:49: 61:68:9e:45:39:c3:d9:97:a3:73:cb:75:80:36:1c:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e8:7d:ff:66:aa:32:31:f1:a2:05:04:a4:33:53:82:be: cf:95:a2:66:79:ce:0b:87:f5:2e:31:13:4a:06:27:04: d1:26:c7:fc:47:aa:c2:65:9a:f0:8e:af:bc:43:8e:25: 1e:09:da:67:6f:c3:5a:60:8d:01:36:f6:83:18:86:f4: 7c:da:69:2c:87:3e:bc:32:32:0e:6e:06:f6:b5:c9:d2: 4c:5a:60:44:3e:ec:ae:89:77:94:76:9b:5d:e8:dd:22: 13:df:86:d7:dd:52:19:23:12:41:51:b8:95:16:e6:45: 62:34:0d:78:97:d2:74:29:5a:0c:29:0b:45:34:7b:69: 6a:da:87:70:0d:bf:7f:e4:27:53:8f:47:7a:ca:92:87: 71:df:25:a2:2b:ee:d6:fe:14:6c:91:01:ec:80:31:9e: f2:8d:35:58:fe:5b:ae:4e:4f:e1:32:b8:11:38:52:81: 50:cf:99:23:29:a2:c6:d9:6b:39:42:94:ce:5d:08:eb: 0f:17:aa:e6:a1:4c:36:cd:59:b1:36:36:95:ef:e7:fd: 88:06:85:d8:41:b7:a9:6b:4b:9b:be:62:09:05:f9:f1: fb:2e:08:bf:c8:1b:a8:af:04:4a:ec:fd:ba:5c:ce:37: 2d:72:df:82:5e:37:3e:59:5d:af:a8:9b:56:7f:c2:8b Fingerprint (SHA-256): FD:F4:CA:DE:48:23:DA:63:02:EE:D4:77:6C:CF:3C:91:68:F4:E0:2D:55:6B:17:6A:DF:77:96:96:75:AD:76:54 Fingerprint (SHA1): 9D:39:DE:AC:C6:0C:C5:70:47:0C:BF:79:36:60:FE:38:FF:10:9E:A5 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4211: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153495 (0x13bd0057) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:17:01 2017 Not After : Thu Mar 31 16:17:01 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fc:74:92:37:75:e2:13:d9:0f:92:92:94:cc:17:fb:ce: 36:41:b9:b1:00:08:fe:18:0b:97:a1:6a:47:00:fb:36: 9f:61:da:01:5d:7d:79:56:9b:a0:fd:66:51:8d:ec:0f: 48:1d:84:ad:7d:81:ed:c1:df:af:2e:78:86:a8:e2:a9: b8:a1:4a:c8:8e:eb:39:ab:88:4a:d3:f7:fa:58:d5:49: ed:7d:eb:c8:91:6b:ce:16:93:3b:75:4b:b9:ce:df:fe: c6:e6:d2:d2:c0:84:a2:df:c8:69:25:93:c5:53:64:ff: f0:34:57:d6:69:9e:cd:3f:f3:b6:ab:5b:bf:79:a6:d0: 4b:b7:92:cb:6f:4f:3c:43:0e:bc:e2:f3:e4:28:59:f8: c2:41:c7:3a:54:40:f7:07:19:ee:ed:b7:09:88:b9:f2: 16:51:b4:86:8a:a9:18:bc:d3:d3:23:bf:79:ff:59:1f: 42:b3:35:22:03:80:a1:37:10:87:85:30:a8:d9:b9:43: f5:2c:aa:ed:6e:0d:f8:62:bc:e8:f2:b8:ff:f5:6c:17: a0:39:32:88:46:f2:e9:49:11:22:4f:10:7e:a6:e9:4e: bd:13:94:90:5b:ad:ae:32:ad:aa:a9:12:2e:eb:26:49: 61:68:9e:45:39:c3:d9:97:a3:73:cb:75:80:36:1c:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e8:7d:ff:66:aa:32:31:f1:a2:05:04:a4:33:53:82:be: cf:95:a2:66:79:ce:0b:87:f5:2e:31:13:4a:06:27:04: d1:26:c7:fc:47:aa:c2:65:9a:f0:8e:af:bc:43:8e:25: 1e:09:da:67:6f:c3:5a:60:8d:01:36:f6:83:18:86:f4: 7c:da:69:2c:87:3e:bc:32:32:0e:6e:06:f6:b5:c9:d2: 4c:5a:60:44:3e:ec:ae:89:77:94:76:9b:5d:e8:dd:22: 13:df:86:d7:dd:52:19:23:12:41:51:b8:95:16:e6:45: 62:34:0d:78:97:d2:74:29:5a:0c:29:0b:45:34:7b:69: 6a:da:87:70:0d:bf:7f:e4:27:53:8f:47:7a:ca:92:87: 71:df:25:a2:2b:ee:d6:fe:14:6c:91:01:ec:80:31:9e: f2:8d:35:58:fe:5b:ae:4e:4f:e1:32:b8:11:38:52:81: 50:cf:99:23:29:a2:c6:d9:6b:39:42:94:ce:5d:08:eb: 0f:17:aa:e6:a1:4c:36:cd:59:b1:36:36:95:ef:e7:fd: 88:06:85:d8:41:b7:a9:6b:4b:9b:be:62:09:05:f9:f1: fb:2e:08:bf:c8:1b:a8:af:04:4a:ec:fd:ba:5c:ce:37: 2d:72:df:82:5e:37:3e:59:5d:af:a8:9b:56:7f:c2:8b Fingerprint (SHA-256): FD:F4:CA:DE:48:23:DA:63:02:EE:D4:77:6C:CF:3C:91:68:F4:E0:2D:55:6B:17:6A:DF:77:96:96:75:AD:76:54 Fingerprint (SHA1): 9D:39:DE:AC:C6:0C:C5:70:47:0C:BF:79:36:60:FE:38:FF:10:9E:A5 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4212: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4213: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153495 (0x13bd0057) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:17:01 2017 Not After : Thu Mar 31 16:17:01 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fc:74:92:37:75:e2:13:d9:0f:92:92:94:cc:17:fb:ce: 36:41:b9:b1:00:08:fe:18:0b:97:a1:6a:47:00:fb:36: 9f:61:da:01:5d:7d:79:56:9b:a0:fd:66:51:8d:ec:0f: 48:1d:84:ad:7d:81:ed:c1:df:af:2e:78:86:a8:e2:a9: b8:a1:4a:c8:8e:eb:39:ab:88:4a:d3:f7:fa:58:d5:49: ed:7d:eb:c8:91:6b:ce:16:93:3b:75:4b:b9:ce:df:fe: c6:e6:d2:d2:c0:84:a2:df:c8:69:25:93:c5:53:64:ff: f0:34:57:d6:69:9e:cd:3f:f3:b6:ab:5b:bf:79:a6:d0: 4b:b7:92:cb:6f:4f:3c:43:0e:bc:e2:f3:e4:28:59:f8: c2:41:c7:3a:54:40:f7:07:19:ee:ed:b7:09:88:b9:f2: 16:51:b4:86:8a:a9:18:bc:d3:d3:23:bf:79:ff:59:1f: 42:b3:35:22:03:80:a1:37:10:87:85:30:a8:d9:b9:43: f5:2c:aa:ed:6e:0d:f8:62:bc:e8:f2:b8:ff:f5:6c:17: a0:39:32:88:46:f2:e9:49:11:22:4f:10:7e:a6:e9:4e: bd:13:94:90:5b:ad:ae:32:ad:aa:a9:12:2e:eb:26:49: 61:68:9e:45:39:c3:d9:97:a3:73:cb:75:80:36:1c:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e8:7d:ff:66:aa:32:31:f1:a2:05:04:a4:33:53:82:be: cf:95:a2:66:79:ce:0b:87:f5:2e:31:13:4a:06:27:04: d1:26:c7:fc:47:aa:c2:65:9a:f0:8e:af:bc:43:8e:25: 1e:09:da:67:6f:c3:5a:60:8d:01:36:f6:83:18:86:f4: 7c:da:69:2c:87:3e:bc:32:32:0e:6e:06:f6:b5:c9:d2: 4c:5a:60:44:3e:ec:ae:89:77:94:76:9b:5d:e8:dd:22: 13:df:86:d7:dd:52:19:23:12:41:51:b8:95:16:e6:45: 62:34:0d:78:97:d2:74:29:5a:0c:29:0b:45:34:7b:69: 6a:da:87:70:0d:bf:7f:e4:27:53:8f:47:7a:ca:92:87: 71:df:25:a2:2b:ee:d6:fe:14:6c:91:01:ec:80:31:9e: f2:8d:35:58:fe:5b:ae:4e:4f:e1:32:b8:11:38:52:81: 50:cf:99:23:29:a2:c6:d9:6b:39:42:94:ce:5d:08:eb: 0f:17:aa:e6:a1:4c:36:cd:59:b1:36:36:95:ef:e7:fd: 88:06:85:d8:41:b7:a9:6b:4b:9b:be:62:09:05:f9:f1: fb:2e:08:bf:c8:1b:a8:af:04:4a:ec:fd:ba:5c:ce:37: 2d:72:df:82:5e:37:3e:59:5d:af:a8:9b:56:7f:c2:8b Fingerprint (SHA-256): FD:F4:CA:DE:48:23:DA:63:02:EE:D4:77:6C:CF:3C:91:68:F4:E0:2D:55:6B:17:6A:DF:77:96:96:75:AD:76:54 Fingerprint (SHA1): 9D:39:DE:AC:C6:0C:C5:70:47:0C:BF:79:36:60:FE:38:FF:10:9E:A5 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4214: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4215: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4216: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4217: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153495 (0x13bd0057) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:17:01 2017 Not After : Thu Mar 31 16:17:01 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fc:74:92:37:75:e2:13:d9:0f:92:92:94:cc:17:fb:ce: 36:41:b9:b1:00:08:fe:18:0b:97:a1:6a:47:00:fb:36: 9f:61:da:01:5d:7d:79:56:9b:a0:fd:66:51:8d:ec:0f: 48:1d:84:ad:7d:81:ed:c1:df:af:2e:78:86:a8:e2:a9: b8:a1:4a:c8:8e:eb:39:ab:88:4a:d3:f7:fa:58:d5:49: ed:7d:eb:c8:91:6b:ce:16:93:3b:75:4b:b9:ce:df:fe: c6:e6:d2:d2:c0:84:a2:df:c8:69:25:93:c5:53:64:ff: f0:34:57:d6:69:9e:cd:3f:f3:b6:ab:5b:bf:79:a6:d0: 4b:b7:92:cb:6f:4f:3c:43:0e:bc:e2:f3:e4:28:59:f8: c2:41:c7:3a:54:40:f7:07:19:ee:ed:b7:09:88:b9:f2: 16:51:b4:86:8a:a9:18:bc:d3:d3:23:bf:79:ff:59:1f: 42:b3:35:22:03:80:a1:37:10:87:85:30:a8:d9:b9:43: f5:2c:aa:ed:6e:0d:f8:62:bc:e8:f2:b8:ff:f5:6c:17: a0:39:32:88:46:f2:e9:49:11:22:4f:10:7e:a6:e9:4e: bd:13:94:90:5b:ad:ae:32:ad:aa:a9:12:2e:eb:26:49: 61:68:9e:45:39:c3:d9:97:a3:73:cb:75:80:36:1c:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e8:7d:ff:66:aa:32:31:f1:a2:05:04:a4:33:53:82:be: cf:95:a2:66:79:ce:0b:87:f5:2e:31:13:4a:06:27:04: d1:26:c7:fc:47:aa:c2:65:9a:f0:8e:af:bc:43:8e:25: 1e:09:da:67:6f:c3:5a:60:8d:01:36:f6:83:18:86:f4: 7c:da:69:2c:87:3e:bc:32:32:0e:6e:06:f6:b5:c9:d2: 4c:5a:60:44:3e:ec:ae:89:77:94:76:9b:5d:e8:dd:22: 13:df:86:d7:dd:52:19:23:12:41:51:b8:95:16:e6:45: 62:34:0d:78:97:d2:74:29:5a:0c:29:0b:45:34:7b:69: 6a:da:87:70:0d:bf:7f:e4:27:53:8f:47:7a:ca:92:87: 71:df:25:a2:2b:ee:d6:fe:14:6c:91:01:ec:80:31:9e: f2:8d:35:58:fe:5b:ae:4e:4f:e1:32:b8:11:38:52:81: 50:cf:99:23:29:a2:c6:d9:6b:39:42:94:ce:5d:08:eb: 0f:17:aa:e6:a1:4c:36:cd:59:b1:36:36:95:ef:e7:fd: 88:06:85:d8:41:b7:a9:6b:4b:9b:be:62:09:05:f9:f1: fb:2e:08:bf:c8:1b:a8:af:04:4a:ec:fd:ba:5c:ce:37: 2d:72:df:82:5e:37:3e:59:5d:af:a8:9b:56:7f:c2:8b Fingerprint (SHA-256): FD:F4:CA:DE:48:23:DA:63:02:EE:D4:77:6C:CF:3C:91:68:F4:E0:2D:55:6B:17:6A:DF:77:96:96:75:AD:76:54 Fingerprint (SHA1): 9D:39:DE:AC:C6:0C:C5:70:47:0C:BF:79:36:60:FE:38:FF:10:9E:A5 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4218: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153495 (0x13bd0057) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:17:01 2017 Not After : Thu Mar 31 16:17:01 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fc:74:92:37:75:e2:13:d9:0f:92:92:94:cc:17:fb:ce: 36:41:b9:b1:00:08:fe:18:0b:97:a1:6a:47:00:fb:36: 9f:61:da:01:5d:7d:79:56:9b:a0:fd:66:51:8d:ec:0f: 48:1d:84:ad:7d:81:ed:c1:df:af:2e:78:86:a8:e2:a9: b8:a1:4a:c8:8e:eb:39:ab:88:4a:d3:f7:fa:58:d5:49: ed:7d:eb:c8:91:6b:ce:16:93:3b:75:4b:b9:ce:df:fe: c6:e6:d2:d2:c0:84:a2:df:c8:69:25:93:c5:53:64:ff: f0:34:57:d6:69:9e:cd:3f:f3:b6:ab:5b:bf:79:a6:d0: 4b:b7:92:cb:6f:4f:3c:43:0e:bc:e2:f3:e4:28:59:f8: c2:41:c7:3a:54:40:f7:07:19:ee:ed:b7:09:88:b9:f2: 16:51:b4:86:8a:a9:18:bc:d3:d3:23:bf:79:ff:59:1f: 42:b3:35:22:03:80:a1:37:10:87:85:30:a8:d9:b9:43: f5:2c:aa:ed:6e:0d:f8:62:bc:e8:f2:b8:ff:f5:6c:17: a0:39:32:88:46:f2:e9:49:11:22:4f:10:7e:a6:e9:4e: bd:13:94:90:5b:ad:ae:32:ad:aa:a9:12:2e:eb:26:49: 61:68:9e:45:39:c3:d9:97:a3:73:cb:75:80:36:1c:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e8:7d:ff:66:aa:32:31:f1:a2:05:04:a4:33:53:82:be: cf:95:a2:66:79:ce:0b:87:f5:2e:31:13:4a:06:27:04: d1:26:c7:fc:47:aa:c2:65:9a:f0:8e:af:bc:43:8e:25: 1e:09:da:67:6f:c3:5a:60:8d:01:36:f6:83:18:86:f4: 7c:da:69:2c:87:3e:bc:32:32:0e:6e:06:f6:b5:c9:d2: 4c:5a:60:44:3e:ec:ae:89:77:94:76:9b:5d:e8:dd:22: 13:df:86:d7:dd:52:19:23:12:41:51:b8:95:16:e6:45: 62:34:0d:78:97:d2:74:29:5a:0c:29:0b:45:34:7b:69: 6a:da:87:70:0d:bf:7f:e4:27:53:8f:47:7a:ca:92:87: 71:df:25:a2:2b:ee:d6:fe:14:6c:91:01:ec:80:31:9e: f2:8d:35:58:fe:5b:ae:4e:4f:e1:32:b8:11:38:52:81: 50:cf:99:23:29:a2:c6:d9:6b:39:42:94:ce:5d:08:eb: 0f:17:aa:e6:a1:4c:36:cd:59:b1:36:36:95:ef:e7:fd: 88:06:85:d8:41:b7:a9:6b:4b:9b:be:62:09:05:f9:f1: fb:2e:08:bf:c8:1b:a8:af:04:4a:ec:fd:ba:5c:ce:37: 2d:72:df:82:5e:37:3e:59:5d:af:a8:9b:56:7f:c2:8b Fingerprint (SHA-256): FD:F4:CA:DE:48:23:DA:63:02:EE:D4:77:6C:CF:3C:91:68:F4:E0:2D:55:6B:17:6A:DF:77:96:96:75:AD:76:54 Fingerprint (SHA1): 9D:39:DE:AC:C6:0C:C5:70:47:0C:BF:79:36:60:FE:38:FF:10:9E:A5 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #4219: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153495 (0x13bd0057) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:17:01 2017 Not After : Thu Mar 31 16:17:01 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fc:74:92:37:75:e2:13:d9:0f:92:92:94:cc:17:fb:ce: 36:41:b9:b1:00:08:fe:18:0b:97:a1:6a:47:00:fb:36: 9f:61:da:01:5d:7d:79:56:9b:a0:fd:66:51:8d:ec:0f: 48:1d:84:ad:7d:81:ed:c1:df:af:2e:78:86:a8:e2:a9: b8:a1:4a:c8:8e:eb:39:ab:88:4a:d3:f7:fa:58:d5:49: ed:7d:eb:c8:91:6b:ce:16:93:3b:75:4b:b9:ce:df:fe: c6:e6:d2:d2:c0:84:a2:df:c8:69:25:93:c5:53:64:ff: f0:34:57:d6:69:9e:cd:3f:f3:b6:ab:5b:bf:79:a6:d0: 4b:b7:92:cb:6f:4f:3c:43:0e:bc:e2:f3:e4:28:59:f8: c2:41:c7:3a:54:40:f7:07:19:ee:ed:b7:09:88:b9:f2: 16:51:b4:86:8a:a9:18:bc:d3:d3:23:bf:79:ff:59:1f: 42:b3:35:22:03:80:a1:37:10:87:85:30:a8:d9:b9:43: f5:2c:aa:ed:6e:0d:f8:62:bc:e8:f2:b8:ff:f5:6c:17: a0:39:32:88:46:f2:e9:49:11:22:4f:10:7e:a6:e9:4e: bd:13:94:90:5b:ad:ae:32:ad:aa:a9:12:2e:eb:26:49: 61:68:9e:45:39:c3:d9:97:a3:73:cb:75:80:36:1c:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e8:7d:ff:66:aa:32:31:f1:a2:05:04:a4:33:53:82:be: cf:95:a2:66:79:ce:0b:87:f5:2e:31:13:4a:06:27:04: d1:26:c7:fc:47:aa:c2:65:9a:f0:8e:af:bc:43:8e:25: 1e:09:da:67:6f:c3:5a:60:8d:01:36:f6:83:18:86:f4: 7c:da:69:2c:87:3e:bc:32:32:0e:6e:06:f6:b5:c9:d2: 4c:5a:60:44:3e:ec:ae:89:77:94:76:9b:5d:e8:dd:22: 13:df:86:d7:dd:52:19:23:12:41:51:b8:95:16:e6:45: 62:34:0d:78:97:d2:74:29:5a:0c:29:0b:45:34:7b:69: 6a:da:87:70:0d:bf:7f:e4:27:53:8f:47:7a:ca:92:87: 71:df:25:a2:2b:ee:d6:fe:14:6c:91:01:ec:80:31:9e: f2:8d:35:58:fe:5b:ae:4e:4f:e1:32:b8:11:38:52:81: 50:cf:99:23:29:a2:c6:d9:6b:39:42:94:ce:5d:08:eb: 0f:17:aa:e6:a1:4c:36:cd:59:b1:36:36:95:ef:e7:fd: 88:06:85:d8:41:b7:a9:6b:4b:9b:be:62:09:05:f9:f1: fb:2e:08:bf:c8:1b:a8:af:04:4a:ec:fd:ba:5c:ce:37: 2d:72:df:82:5e:37:3e:59:5d:af:a8:9b:56:7f:c2:8b Fingerprint (SHA-256): FD:F4:CA:DE:48:23:DA:63:02:EE:D4:77:6C:CF:3C:91:68:F4:E0:2D:55:6B:17:6A:DF:77:96:96:75:AD:76:54 Fingerprint (SHA1): 9D:39:DE:AC:C6:0C:C5:70:47:0C:BF:79:36:60:FE:38:FF:10:9E:A5 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #4220: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153495 (0x13bd0057) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:17:01 2017 Not After : Thu Mar 31 16:17:01 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fc:74:92:37:75:e2:13:d9:0f:92:92:94:cc:17:fb:ce: 36:41:b9:b1:00:08:fe:18:0b:97:a1:6a:47:00:fb:36: 9f:61:da:01:5d:7d:79:56:9b:a0:fd:66:51:8d:ec:0f: 48:1d:84:ad:7d:81:ed:c1:df:af:2e:78:86:a8:e2:a9: b8:a1:4a:c8:8e:eb:39:ab:88:4a:d3:f7:fa:58:d5:49: ed:7d:eb:c8:91:6b:ce:16:93:3b:75:4b:b9:ce:df:fe: c6:e6:d2:d2:c0:84:a2:df:c8:69:25:93:c5:53:64:ff: f0:34:57:d6:69:9e:cd:3f:f3:b6:ab:5b:bf:79:a6:d0: 4b:b7:92:cb:6f:4f:3c:43:0e:bc:e2:f3:e4:28:59:f8: c2:41:c7:3a:54:40:f7:07:19:ee:ed:b7:09:88:b9:f2: 16:51:b4:86:8a:a9:18:bc:d3:d3:23:bf:79:ff:59:1f: 42:b3:35:22:03:80:a1:37:10:87:85:30:a8:d9:b9:43: f5:2c:aa:ed:6e:0d:f8:62:bc:e8:f2:b8:ff:f5:6c:17: a0:39:32:88:46:f2:e9:49:11:22:4f:10:7e:a6:e9:4e: bd:13:94:90:5b:ad:ae:32:ad:aa:a9:12:2e:eb:26:49: 61:68:9e:45:39:c3:d9:97:a3:73:cb:75:80:36:1c:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e8:7d:ff:66:aa:32:31:f1:a2:05:04:a4:33:53:82:be: cf:95:a2:66:79:ce:0b:87:f5:2e:31:13:4a:06:27:04: d1:26:c7:fc:47:aa:c2:65:9a:f0:8e:af:bc:43:8e:25: 1e:09:da:67:6f:c3:5a:60:8d:01:36:f6:83:18:86:f4: 7c:da:69:2c:87:3e:bc:32:32:0e:6e:06:f6:b5:c9:d2: 4c:5a:60:44:3e:ec:ae:89:77:94:76:9b:5d:e8:dd:22: 13:df:86:d7:dd:52:19:23:12:41:51:b8:95:16:e6:45: 62:34:0d:78:97:d2:74:29:5a:0c:29:0b:45:34:7b:69: 6a:da:87:70:0d:bf:7f:e4:27:53:8f:47:7a:ca:92:87: 71:df:25:a2:2b:ee:d6:fe:14:6c:91:01:ec:80:31:9e: f2:8d:35:58:fe:5b:ae:4e:4f:e1:32:b8:11:38:52:81: 50:cf:99:23:29:a2:c6:d9:6b:39:42:94:ce:5d:08:eb: 0f:17:aa:e6:a1:4c:36:cd:59:b1:36:36:95:ef:e7:fd: 88:06:85:d8:41:b7:a9:6b:4b:9b:be:62:09:05:f9:f1: fb:2e:08:bf:c8:1b:a8:af:04:4a:ec:fd:ba:5c:ce:37: 2d:72:df:82:5e:37:3e:59:5d:af:a8:9b:56:7f:c2:8b Fingerprint (SHA-256): FD:F4:CA:DE:48:23:DA:63:02:EE:D4:77:6C:CF:3C:91:68:F4:E0:2D:55:6B:17:6A:DF:77:96:96:75:AD:76:54 Fingerprint (SHA1): 9D:39:DE:AC:C6:0C:C5:70:47:0C:BF:79:36:60:FE:38:FF:10:9E:A5 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #4221: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153495 (0x13bd0057) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:17:01 2017 Not After : Thu Mar 31 16:17:01 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fc:74:92:37:75:e2:13:d9:0f:92:92:94:cc:17:fb:ce: 36:41:b9:b1:00:08:fe:18:0b:97:a1:6a:47:00:fb:36: 9f:61:da:01:5d:7d:79:56:9b:a0:fd:66:51:8d:ec:0f: 48:1d:84:ad:7d:81:ed:c1:df:af:2e:78:86:a8:e2:a9: b8:a1:4a:c8:8e:eb:39:ab:88:4a:d3:f7:fa:58:d5:49: ed:7d:eb:c8:91:6b:ce:16:93:3b:75:4b:b9:ce:df:fe: c6:e6:d2:d2:c0:84:a2:df:c8:69:25:93:c5:53:64:ff: f0:34:57:d6:69:9e:cd:3f:f3:b6:ab:5b:bf:79:a6:d0: 4b:b7:92:cb:6f:4f:3c:43:0e:bc:e2:f3:e4:28:59:f8: c2:41:c7:3a:54:40:f7:07:19:ee:ed:b7:09:88:b9:f2: 16:51:b4:86:8a:a9:18:bc:d3:d3:23:bf:79:ff:59:1f: 42:b3:35:22:03:80:a1:37:10:87:85:30:a8:d9:b9:43: f5:2c:aa:ed:6e:0d:f8:62:bc:e8:f2:b8:ff:f5:6c:17: a0:39:32:88:46:f2:e9:49:11:22:4f:10:7e:a6:e9:4e: bd:13:94:90:5b:ad:ae:32:ad:aa:a9:12:2e:eb:26:49: 61:68:9e:45:39:c3:d9:97:a3:73:cb:75:80:36:1c:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e8:7d:ff:66:aa:32:31:f1:a2:05:04:a4:33:53:82:be: cf:95:a2:66:79:ce:0b:87:f5:2e:31:13:4a:06:27:04: d1:26:c7:fc:47:aa:c2:65:9a:f0:8e:af:bc:43:8e:25: 1e:09:da:67:6f:c3:5a:60:8d:01:36:f6:83:18:86:f4: 7c:da:69:2c:87:3e:bc:32:32:0e:6e:06:f6:b5:c9:d2: 4c:5a:60:44:3e:ec:ae:89:77:94:76:9b:5d:e8:dd:22: 13:df:86:d7:dd:52:19:23:12:41:51:b8:95:16:e6:45: 62:34:0d:78:97:d2:74:29:5a:0c:29:0b:45:34:7b:69: 6a:da:87:70:0d:bf:7f:e4:27:53:8f:47:7a:ca:92:87: 71:df:25:a2:2b:ee:d6:fe:14:6c:91:01:ec:80:31:9e: f2:8d:35:58:fe:5b:ae:4e:4f:e1:32:b8:11:38:52:81: 50:cf:99:23:29:a2:c6:d9:6b:39:42:94:ce:5d:08:eb: 0f:17:aa:e6:a1:4c:36:cd:59:b1:36:36:95:ef:e7:fd: 88:06:85:d8:41:b7:a9:6b:4b:9b:be:62:09:05:f9:f1: fb:2e:08:bf:c8:1b:a8:af:04:4a:ec:fd:ba:5c:ce:37: 2d:72:df:82:5e:37:3e:59:5d:af:a8:9b:56:7f:c2:8b Fingerprint (SHA-256): FD:F4:CA:DE:48:23:DA:63:02:EE:D4:77:6C:CF:3C:91:68:F4:E0:2D:55:6B:17:6A:DF:77:96:96:75:AD:76:54 Fingerprint (SHA1): 9D:39:DE:AC:C6:0C:C5:70:47:0C:BF:79:36:60:FE:38:FF:10:9E:A5 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #4222: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153495 (0x13bd0057) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:17:01 2017 Not After : Thu Mar 31 16:17:01 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fc:74:92:37:75:e2:13:d9:0f:92:92:94:cc:17:fb:ce: 36:41:b9:b1:00:08:fe:18:0b:97:a1:6a:47:00:fb:36: 9f:61:da:01:5d:7d:79:56:9b:a0:fd:66:51:8d:ec:0f: 48:1d:84:ad:7d:81:ed:c1:df:af:2e:78:86:a8:e2:a9: b8:a1:4a:c8:8e:eb:39:ab:88:4a:d3:f7:fa:58:d5:49: ed:7d:eb:c8:91:6b:ce:16:93:3b:75:4b:b9:ce:df:fe: c6:e6:d2:d2:c0:84:a2:df:c8:69:25:93:c5:53:64:ff: f0:34:57:d6:69:9e:cd:3f:f3:b6:ab:5b:bf:79:a6:d0: 4b:b7:92:cb:6f:4f:3c:43:0e:bc:e2:f3:e4:28:59:f8: c2:41:c7:3a:54:40:f7:07:19:ee:ed:b7:09:88:b9:f2: 16:51:b4:86:8a:a9:18:bc:d3:d3:23:bf:79:ff:59:1f: 42:b3:35:22:03:80:a1:37:10:87:85:30:a8:d9:b9:43: f5:2c:aa:ed:6e:0d:f8:62:bc:e8:f2:b8:ff:f5:6c:17: a0:39:32:88:46:f2:e9:49:11:22:4f:10:7e:a6:e9:4e: bd:13:94:90:5b:ad:ae:32:ad:aa:a9:12:2e:eb:26:49: 61:68:9e:45:39:c3:d9:97:a3:73:cb:75:80:36:1c:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e8:7d:ff:66:aa:32:31:f1:a2:05:04:a4:33:53:82:be: cf:95:a2:66:79:ce:0b:87:f5:2e:31:13:4a:06:27:04: d1:26:c7:fc:47:aa:c2:65:9a:f0:8e:af:bc:43:8e:25: 1e:09:da:67:6f:c3:5a:60:8d:01:36:f6:83:18:86:f4: 7c:da:69:2c:87:3e:bc:32:32:0e:6e:06:f6:b5:c9:d2: 4c:5a:60:44:3e:ec:ae:89:77:94:76:9b:5d:e8:dd:22: 13:df:86:d7:dd:52:19:23:12:41:51:b8:95:16:e6:45: 62:34:0d:78:97:d2:74:29:5a:0c:29:0b:45:34:7b:69: 6a:da:87:70:0d:bf:7f:e4:27:53:8f:47:7a:ca:92:87: 71:df:25:a2:2b:ee:d6:fe:14:6c:91:01:ec:80:31:9e: f2:8d:35:58:fe:5b:ae:4e:4f:e1:32:b8:11:38:52:81: 50:cf:99:23:29:a2:c6:d9:6b:39:42:94:ce:5d:08:eb: 0f:17:aa:e6:a1:4c:36:cd:59:b1:36:36:95:ef:e7:fd: 88:06:85:d8:41:b7:a9:6b:4b:9b:be:62:09:05:f9:f1: fb:2e:08:bf:c8:1b:a8:af:04:4a:ec:fd:ba:5c:ce:37: 2d:72:df:82:5e:37:3e:59:5d:af:a8:9b:56:7f:c2:8b Fingerprint (SHA-256): FD:F4:CA:DE:48:23:DA:63:02:EE:D4:77:6C:CF:3C:91:68:F4:E0:2D:55:6B:17:6A:DF:77:96:96:75:AD:76:54 Fingerprint (SHA1): 9D:39:DE:AC:C6:0C:C5:70:47:0C:BF:79:36:60:FE:38:FF:10:9E:A5 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #4223: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4224: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4225: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153525 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4226: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4227: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #4228: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4229: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 331153526 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4230: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4231: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #4232: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4233: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 331153527 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4234: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4235: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #4236: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4237: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 331153528 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4238: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4239: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #4240: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4241: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 331153529 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4242: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4243: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #4244: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4245: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 331153530 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4246: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4247: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #4248: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4249: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 331153531 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4250: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4251: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4252: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153525 (0x13bd0075) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:23:41 2017 Not After : Thu Mar 31 16:23:41 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:15:2b:51:32:bf:b8:24:a2:a8:3a:11:85:8a:1a:7a: b8:90:67:b2:01:12:e3:9d:ed:e1:75:b0:2f:3c:65:b6: bd:1b:4c:ea:de:3f:d1:7c:fa:f7:35:6a:77:db:30:a8: 0c:95:5d:00:c3:b8:ab:61:cb:7b:8f:c2:d9:18:a9:6e: 55:93:dd:a7:02:dd:c9:b5:87:22:bd:23:84:3c:7c:54: 5a:67:31:2c:78:fb:8e:fe:bb:d3:e4:a6:85:ca:bf:99: e5:41:45:ca:02:c0:29:1a:20:22:cd:dc:8a:9b:0f:27: 9d:f8:bf:9b:68:d3:05:b3:95:89:35:37:7d:df:62:8d: 6a:ec:25:4b:ca:80:b5:ea:e8:21:2d:72:42:7c:43:84: d8:30:f2:bd:bb:7f:8c:64:53:ba:24:dd:32:84:d7:04: 52:a4:fb:1c:a5:f8:53:8c:d2:87:fe:c8:be:7f:f1:9b: cf:ff:34:30:4f:aa:ad:04:f2:5e:6e:ba:13:e3:50:18: 36:28:55:2f:e9:ab:e3:03:33:7f:df:42:f5:7a:b1:c4: 84:88:87:db:c3:5c:d4:f8:3e:df:7e:4e:e1:4a:d2:69: b3:7a:b1:e1:0b:53:e4:13:f7:6a:41:41:1f:63:0c:02: fa:d2:ba:8f:dd:fd:fe:08:b6:36:2d:72:9e:4c:d7:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:a9:b0:34:9d:8e:3f:6a:c7:90:0f:6d:ec:d1:de:7e: d4:fc:ff:ec:5a:ee:27:37:ba:6f:5b:6b:f5:67:a3:a7: ee:99:14:e6:c9:22:c8:cc:20:d5:7f:4a:23:38:7e:80: d2:60:18:08:11:73:bc:12:79:4c:06:c3:08:89:58:50: 6c:a7:90:41:fd:62:93:00:57:55:08:ad:d5:13:f7:3b: df:94:51:0b:63:6d:8e:7f:92:e2:54:75:2c:8c:af:25: 09:6f:9c:d2:2e:a1:b9:39:4e:d1:1e:2f:ad:d0:9a:de: 5c:af:10:b9:b9:cb:b5:12:d2:16:d2:5f:41:f2:09:85: 7a:02:83:7f:dd:4c:31:e1:33:8f:a1:b0:6d:33:b2:e1: 45:5a:b2:38:3e:0e:e4:48:36:e5:6c:93:3f:51:b3:03: a4:38:3c:f9:61:76:d1:8e:2e:da:3f:32:e0:51:75:13: 26:5f:77:c7:9c:6f:58:cd:54:ec:48:3e:c9:15:84:10: 23:fb:87:70:4b:b1:0e:4c:6a:45:98:67:9e:d3:65:c1: 91:20:38:c4:c2:57:26:57:b3:10:3b:f9:9e:5c:0f:0d: b6:84:be:30:82:07:55:47:38:27:62:6b:a9:ca:38:2f: 95:e8:1c:b1:51:a7:0a:84:57:fb:4b:3f:e3:db:ce:d0 Fingerprint (SHA-256): 17:87:0E:AE:75:DC:B3:02:2B:DB:D4:D4:51:79:A2:B0:CF:BE:03:2A:A7:82:09:E5:7A:59:CE:47:F9:9D:D3:CA Fingerprint (SHA1): D0:5F:7B:7D:09:0A:AD:A8:F6:0E:65:9B:90:1E:F6:8E:5B:BF:32:AF Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #4253: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4254: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4255: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #4256: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153525 (0x13bd0075) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:23:41 2017 Not After : Thu Mar 31 16:23:41 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:15:2b:51:32:bf:b8:24:a2:a8:3a:11:85:8a:1a:7a: b8:90:67:b2:01:12:e3:9d:ed:e1:75:b0:2f:3c:65:b6: bd:1b:4c:ea:de:3f:d1:7c:fa:f7:35:6a:77:db:30:a8: 0c:95:5d:00:c3:b8:ab:61:cb:7b:8f:c2:d9:18:a9:6e: 55:93:dd:a7:02:dd:c9:b5:87:22:bd:23:84:3c:7c:54: 5a:67:31:2c:78:fb:8e:fe:bb:d3:e4:a6:85:ca:bf:99: e5:41:45:ca:02:c0:29:1a:20:22:cd:dc:8a:9b:0f:27: 9d:f8:bf:9b:68:d3:05:b3:95:89:35:37:7d:df:62:8d: 6a:ec:25:4b:ca:80:b5:ea:e8:21:2d:72:42:7c:43:84: d8:30:f2:bd:bb:7f:8c:64:53:ba:24:dd:32:84:d7:04: 52:a4:fb:1c:a5:f8:53:8c:d2:87:fe:c8:be:7f:f1:9b: cf:ff:34:30:4f:aa:ad:04:f2:5e:6e:ba:13:e3:50:18: 36:28:55:2f:e9:ab:e3:03:33:7f:df:42:f5:7a:b1:c4: 84:88:87:db:c3:5c:d4:f8:3e:df:7e:4e:e1:4a:d2:69: b3:7a:b1:e1:0b:53:e4:13:f7:6a:41:41:1f:63:0c:02: fa:d2:ba:8f:dd:fd:fe:08:b6:36:2d:72:9e:4c:d7:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:a9:b0:34:9d:8e:3f:6a:c7:90:0f:6d:ec:d1:de:7e: d4:fc:ff:ec:5a:ee:27:37:ba:6f:5b:6b:f5:67:a3:a7: ee:99:14:e6:c9:22:c8:cc:20:d5:7f:4a:23:38:7e:80: d2:60:18:08:11:73:bc:12:79:4c:06:c3:08:89:58:50: 6c:a7:90:41:fd:62:93:00:57:55:08:ad:d5:13:f7:3b: df:94:51:0b:63:6d:8e:7f:92:e2:54:75:2c:8c:af:25: 09:6f:9c:d2:2e:a1:b9:39:4e:d1:1e:2f:ad:d0:9a:de: 5c:af:10:b9:b9:cb:b5:12:d2:16:d2:5f:41:f2:09:85: 7a:02:83:7f:dd:4c:31:e1:33:8f:a1:b0:6d:33:b2:e1: 45:5a:b2:38:3e:0e:e4:48:36:e5:6c:93:3f:51:b3:03: a4:38:3c:f9:61:76:d1:8e:2e:da:3f:32:e0:51:75:13: 26:5f:77:c7:9c:6f:58:cd:54:ec:48:3e:c9:15:84:10: 23:fb:87:70:4b:b1:0e:4c:6a:45:98:67:9e:d3:65:c1: 91:20:38:c4:c2:57:26:57:b3:10:3b:f9:9e:5c:0f:0d: b6:84:be:30:82:07:55:47:38:27:62:6b:a9:ca:38:2f: 95:e8:1c:b1:51:a7:0a:84:57:fb:4b:3f:e3:db:ce:d0 Fingerprint (SHA-256): 17:87:0E:AE:75:DC:B3:02:2B:DB:D4:D4:51:79:A2:B0:CF:BE:03:2A:A7:82:09:E5:7A:59:CE:47:F9:9D:D3:CA Fingerprint (SHA1): D0:5F:7B:7D:09:0A:AD:A8:F6:0E:65:9B:90:1E:F6:8E:5B:BF:32:AF Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #4257: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4258: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4259: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4260: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153532 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4261: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4262: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4263: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4264: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331153533 --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #4265: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4266: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4267: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4268: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331153534 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4269: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4270: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #4271: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4272: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 331153535 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4273: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4274: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4275: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #4276: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #4277: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #4278: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153532 (0x13bd007c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:25:04 2017 Not After : Thu Mar 31 16:25:04 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:a6:9e:f6:27:0e:8f:14:4f:b5:ee:66:6c:a9:1c:4b: c4:1c:0c:d4:89:b6:00:e5:7b:4a:53:90:a0:91:bf:58: f5:7a:8b:ba:a7:f3:75:ac:d3:72:f0:fd:e5:57:cb:c5: df:79:f1:b4:19:20:59:9e:78:f5:63:fa:ff:aa:1c:e3: b5:d2:9a:1c:72:d6:5a:80:72:d3:ba:a9:ce:f1:70:78: c1:e6:59:e3:7a:5d:2f:90:ee:67:4d:2d:5a:de:ec:fe: 74:7c:17:67:c5:0b:6d:6b:9f:e3:16:2d:ef:67:04:c5: f3:c2:2c:ab:30:ed:a9:e9:fc:81:65:a7:a2:c8:89:b7: 6d:39:38:a2:e3:81:0d:1a:cc:de:4d:e7:bb:91:a9:29: ad:5a:c0:be:5f:58:d3:e2:79:5e:d8:16:0f:ef:13:7f: 9c:e4:a7:cb:69:0e:ef:2f:f2:c3:43:73:05:bd:06:b1: e3:9a:a2:fe:65:92:ff:27:66:70:10:b5:da:8a:13:2f: d4:20:f7:04:6a:6f:21:f1:35:cc:bf:d0:c1:50:0e:89: 54:b2:99:42:f3:d7:32:ac:c3:06:0f:70:0b:83:3a:45: ee:38:e3:30:82:b3:58:93:d8:b3:c1:9e:36:21:db:f8: 50:bc:c9:ae:20:04:3d:01:01:53:d8:f2:ee:40:2e:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:ce:b9:4a:1c:32:f7:8f:55:75:80:14:0f:47:e6:d2: 49:cd:ec:6c:c4:91:67:c5:f1:16:69:46:f1:07:34:35: 72:3f:36:60:b4:51:32:f8:32:3c:fb:cd:5d:31:63:14: 27:48:f8:50:72:1a:78:cc:a1:d4:ea:a3:76:e7:e4:32: 31:20:ff:a0:69:cd:bd:c8:fe:e3:7e:55:df:23:9b:61: 17:9b:f4:7a:3d:0b:b9:7c:c3:29:64:dd:af:c8:0e:a6: 86:ba:46:6b:f1:a4:f6:2a:73:89:11:b8:63:d7:a8:88: ea:37:a2:a1:8f:a0:8e:1b:39:63:88:b8:22:f4:bf:61: e5:22:eb:19:f1:ec:b2:86:02:32:c7:c3:e6:c7:c5:e7: 92:d4:69:2d:72:14:26:9e:45:93:f8:35:09:b1:08:3c: 06:43:8a:9d:08:c4:aa:59:6a:1d:80:65:67:92:8c:16: 7c:7d:b3:76:d2:1c:dc:7c:be:38:97:5a:e4:6c:7e:b2: 04:7d:7d:a8:74:2f:54:a3:f3:c0:ee:8a:d2:3d:b9:b4: cd:4c:67:76:0d:8e:67:25:74:18:96:04:5c:1f:88:9e: 8f:b9:79:8b:39:83:88:e1:7a:36:0c:63:b8:c0:b0:b6: 4b:b9:a2:8f:a5:59:72:90:0a:c3:66:83:3a:66:f7:7d Fingerprint (SHA-256): 3E:8C:C5:2B:A8:7B:DB:7B:23:83:0D:C1:78:F7:F8:62:D3:12:A0:B3:C3:B2:2B:91:7E:93:1F:58:53:9A:2E:29 Fingerprint (SHA1): 3C:E6:0A:0F:9E:C0:15:2E:1C:2E:A0:CE:1E:C3:C4:07:BD:FA:4B:88 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4279: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4280: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4281: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153533 (0x13bd007d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:25:10 2017 Not After : Thu Mar 31 16:25:10 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:17:64:0a:b9:5c:31:6b:c9:f9:3e:91:cf:f3:a0:a1: 30:b9:03:09:1a:de:1e:76:be:b9:4c:34:f4:11:63:8c: b4:d7:f6:b6:51:e1:c4:ea:33:a0:d8:6c:f8:1c:9a:fd: 64:5c:c3:a5:d9:e5:40:4a:53:8d:b3:3d:a4:c4:0a:4f: 51:38:83:6a:c9:26:04:d5:b7:7c:ac:d6:b4:35:38:46: 2e:6f:20:4c:2a:53:b6:71:e8:00:c9:89:4d:d8:01:c9: bd:ac:6e:bf:db:34:8b:ee:e6:34:4b:ca:6b:e7:b5:92: 31:cd:75:e0:6b:d3:bd:22:16:76:bd:08:70:04:f1:1b: 02:b2:46:f3:9f:11:25:67:6d:fb:ea:09:9f:e7:94:56: 96:0d:13:ba:77:c4:3e:6b:64:a8:23:67:65:59:d1:5a: c5:88:76:16:07:0d:13:1e:2b:18:66:c2:5b:1e:d6:0e: e4:d9:6e:b0:01:e8:82:b9:b5:15:13:43:43:69:33:4f: f7:a5:55:14:ee:ef:1e:9e:7a:24:a6:e9:67:9a:1d:08: 9e:49:41:e1:8c:11:55:7c:b6:97:01:a5:aa:51:e1:5c: 57:09:f6:ab:9b:d0:2e:08:b1:fc:2f:b5:c4:14:30:87: 3e:0e:0e:72:57:9e:ef:7c:4e:be:d5:63:31:a7:02:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 02:54:7d:05:66:6d:95:da:bc:29:6f:48:23:c2:05:0c: 52:0d:89:af:a0:cd:37:10:46:3f:a5:de:b3:96:9b:d5: 6e:d0:4c:0b:76:f9:56:f4:e6:1c:9b:f2:c1:d1:e0:2c: 8e:06:8c:0a:30:1e:fc:ea:d9:cd:f4:a7:a3:6b:50:f4: 16:e7:32:67:e5:3e:b1:6a:86:14:6e:72:8b:13:ec:f3: 90:9e:85:ce:9a:76:89:0f:c6:c0:c1:a9:c7:e3:72:88: b1:cf:7c:1e:11:0d:83:fb:fa:19:66:7b:6b:bd:5c:5e: 43:ec:8c:d7:d8:4d:68:c3:3c:f2:36:3b:7b:4d:eb:a5: 57:28:4c:dd:e1:f3:1f:de:5d:21:b9:86:bb:7b:32:7d: dd:1f:39:c6:5f:56:e3:98:89:bf:c5:9a:16:af:8f:5b: 47:9c:7b:d2:21:6e:63:ec:7f:45:48:25:63:07:7f:c5: 92:0f:57:56:38:6c:25:36:5b:74:66:a1:56:ee:d4:1b: 9e:19:c1:f3:17:0a:73:48:a1:06:cd:b0:4b:4b:a6:10: 0e:a8:1e:eb:8d:52:e8:8a:75:b0:2b:40:27:cf:92:78: ea:ea:a0:65:14:31:28:54:d4:85:4f:b4:cc:b9:54:4b: 82:b7:1b:ac:4c:83:7d:63:1e:3a:b1:b2:5c:b7:39:c1 Fingerprint (SHA-256): 7A:E2:82:F0:B3:9A:74:22:D4:F9:AA:BB:A3:67:E9:88:3B:42:EC:61:BA:4F:64:7D:83:01:4E:8D:02:97:B8:5E Fingerprint (SHA1): E1:60:E7:9B:5C:E5:A1:48:A2:C5:3F:9E:0E:0C:C3:D7:53:FB:8B:C7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4282: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4283: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153534 (0x13bd007e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 16:25:25 2017 Not After : Thu Mar 31 16:25:25 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:b4:3b:86:d6:e3:d0:97:cc:15:a4:7f:05:87:c7:ec: 83:e1:b6:f9:8a:d1:15:3e:83:38:f7:96:60:2d:e0:94: 6d:80:93:68:e1:de:be:64:40:c3:a4:1c:3a:30:ff:ac: 98:5b:07:bd:25:41:cd:bb:07:b1:12:87:de:23:69:25: 48:35:d2:56:a0:36:5d:04:c2:60:a4:ba:e2:1a:05:06: 57:ec:dc:19:0d:e1:02:db:1b:ab:29:97:e1:1b:9f:35: 59:1d:b8:6d:f9:06:bb:8c:b2:47:23:15:89:a2:42:2d: 1d:ef:b4:09:fd:7b:ae:c6:70:e2:94:37:28:83:d4:db: aa:10:8e:72:04:15:4c:23:ee:5c:94:0c:ff:55:37:fa: bb:11:39:2a:8d:92:6c:dc:5a:4c:f9:a3:12:79:c9:e7: ee:aa:b3:fe:b2:3d:9f:58:ad:96:96:55:9e:fd:01:7a: 48:0f:c7:69:e4:98:54:bc:10:99:f5:86:7e:5b:d2:9b: 03:8b:69:b7:92:07:a4:b6:32:8b:42:99:4d:72:34:46: 8e:86:d0:70:70:33:44:18:d4:8a:d0:f1:1d:05:f5:ba: 37:27:fb:f8:9d:e7:d4:8b:c6:45:40:6c:13:e9:02:69: 4c:c0:91:22:f0:e1:91:c3:6c:1a:ef:1b:2a:af:17:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:d0:b8:6b:31:9e:2c:ab:ef:95:ce:25:a3:bd:26:d4: aa:c3:ab:eb:08:28:55:f2:0d:81:24:eb:b4:1f:8e:e7: 10:37:bb:d5:0d:bc:49:49:6f:e0:b1:e8:9e:87:55:73: 17:ce:93:0a:e8:93:02:c3:65:d1:19:42:98:4c:a8:71: 3b:08:0c:49:15:42:06:bb:41:ca:8b:38:99:9b:3b:45: dd:f7:db:51:c5:01:73:7f:ed:c1:cc:cf:07:8a:98:0e: 8f:aa:d5:3b:80:66:4e:50:04:78:63:22:51:95:12:2c: 26:0e:da:72:2c:9a:d3:17:dd:e0:14:3b:37:32:d8:75: 87:fd:82:ca:cd:87:10:d6:9c:0b:d5:d2:f7:95:11:43: 37:51:06:79:dd:d6:49:e0:70:d9:a7:4e:66:55:ba:09: d3:13:1f:7e:92:fd:97:cd:c9:af:7a:00:15:0a:f5:c7: 2f:65:8d:62:72:51:e9:16:b2:65:c9:44:b0:a5:ef:e5: d5:0b:62:68:ee:83:13:b1:95:ac:65:3b:5d:a7:44:52: 18:13:4d:4e:34:01:b4:7f:e6:19:6b:c0:f9:76:f7:3a: d7:d9:aa:4a:64:b1:96:f9:c0:d5:7c:7c:dc:54:c2:08: e3:6b:19:eb:80:f2:ef:3f:6a:be:08:74:36:f1:db:fa Fingerprint (SHA-256): 41:77:67:C2:BC:3B:9F:50:2D:69:D0:8B:4D:36:E7:9F:0D:B4:45:4B:E6:AC:8A:92:38:EA:11:D1:73:75:C0:94 Fingerprint (SHA1): DE:0B:A7:9C:0F:1A:26:78:CA:58:81:0C:5B:38:46:EF:43:25:7D:4D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #4284: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4285: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153536 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4286: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4287: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4288: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4289: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331153537 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4290: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4291: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4292: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4293: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331153538 --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #4294: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4295: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #4296: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4297: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 331153539 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4298: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4299: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #4300: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4301: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 331153540 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4302: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4303: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4304: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #4305: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #4306: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #4307: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #4308: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153536 (0x13bd0080) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:26:11 2017 Not After : Thu Mar 31 16:26:11 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:8a:a2:46:5b:15:f0:1b:a7:6d:58:8a:55:5d:bb:d7: 57:e1:b6:ab:46:fa:b1:ca:07:2e:d9:f7:28:07:bc:35: a9:27:de:6a:d9:09:22:37:ae:12:15:95:76:5a:28:14: a5:2a:b3:29:ff:ef:f5:f9:aa:33:82:ce:29:c8:10:a3: 21:f6:55:47:21:1f:46:04:3c:1e:16:9f:8e:92:e7:1e: 24:e8:ba:fc:f2:05:41:d9:40:65:8e:c2:58:1f:3c:d4: 7c:29:49:44:31:3c:9d:4e:44:dd:d6:8e:c2:26:d6:01: e9:14:76:19:9f:de:c4:05:7d:92:a1:e4:73:68:d3:e4: e6:c7:e1:25:f1:33:b2:ec:fc:d7:e6:5a:6f:1a:92:f4: 6f:1c:10:49:60:13:46:7e:0f:61:d7:59:39:ee:f2:a2: 38:7d:6f:b6:0d:a4:ab:d0:1b:23:ae:d3:78:30:2f:a7: fa:cc:f6:7e:16:9c:ae:01:46:34:e4:fb:c9:99:71:f6: a5:0d:c8:cd:d7:c5:7a:a8:29:a2:7b:fb:a6:6b:23:2d: d3:36:b5:bd:a0:c5:a9:1c:cd:65:df:f6:04:12:c3:fd: 5e:61:5f:18:35:15:94:ed:a8:9b:54:9f:af:f1:f8:9b: 0f:b7:51:84:43:88:a0:e6:a0:d1:ae:e9:b1:f1:59:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:6e:a4:4a:5b:d6:7e:d1:f8:4e:c1:58:71:f1:fd:f4: 76:c0:a7:3f:48:eb:43:1b:58:ca:0a:1f:d1:5d:58:16: fc:75:a3:69:44:75:a7:14:ca:1b:2d:b7:87:9a:20:99: 67:d7:f9:e7:01:1f:9e:24:9e:e3:95:fe:45:7c:5e:e2: 4a:64:be:27:fc:62:1d:fa:54:ab:2a:78:1d:7d:18:6c: df:f4:4f:6a:4c:e7:61:c5:03:b4:a8:41:65:46:7b:b4: e3:23:e0:f9:5a:41:fe:5c:03:06:c0:d2:29:47:48:61: 0e:e2:3b:de:19:88:79:9e:9c:fb:be:df:7b:9d:1d:6d: 3c:82:0d:53:77:59:d0:03:36:44:aa:b6:c3:b9:a3:8f: 9b:13:91:be:db:75:aa:a8:7f:fd:51:e1:d1:3f:ed:56: 9f:16:af:38:de:75:cc:a4:ce:82:ed:10:34:29:d5:6e: 00:48:9d:4e:cb:86:ee:89:fa:38:9d:7e:07:dd:c4:2c: a8:1a:80:2a:0f:57:82:42:65:29:68:b3:55:af:25:f8: c8:1e:93:ca:ab:6b:e7:63:13:7f:ee:c3:dd:32:12:ce: d7:83:e4:4e:5b:80:81:96:92:ee:73:25:ee:82:f9:44: 5a:19:8a:3a:f8:a7:84:ef:e0:66:40:61:73:c6:0e:e0 Fingerprint (SHA-256): 22:E4:7A:3A:55:21:39:B2:62:8D:58:CA:51:A5:8F:65:6D:E9:B7:11:38:94:47:F9:B4:93:B6:F0:45:0E:DA:03 Fingerprint (SHA1): 49:93:E4:99:0C:88:1D:AB:7B:10:CB:98:A6:02:7E:BE:5C:75:67:34 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4309: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4310: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153537 (0x13bd0081) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:26:22 2017 Not After : Thu Mar 31 16:26:22 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:4f:21:0e:57:0d:2f:9c:d1:91:88:6c:85:24:57:99: 83:fa:23:60:ad:5c:21:0f:ad:4d:c4:b9:06:f2:25:8b: d2:c8:54:67:45:8a:fc:c1:2c:85:0d:26:de:1f:34:d2: ae:f2:a1:9e:ce:92:6c:53:fe:c8:dd:57:46:bd:c4:88: ed:38:11:4e:31:af:f0:3f:1e:b6:62:5f:51:ac:1e:bc: 3b:55:a0:de:c4:2e:fd:67:b1:ba:07:2b:d3:57:f7:08: b5:86:8b:46:fa:72:6a:b5:2c:6a:1a:2b:e3:d0:2e:4e: 90:23:b9:77:be:1a:a4:7d:28:cf:83:90:64:6d:5d:42: 59:30:49:02:ca:54:06:ef:91:ab:77:8a:49:ff:2b:48: 8d:8c:a1:c3:96:6b:a5:08:ba:a4:9d:f2:7e:e8:43:4f: be:fc:d9:bd:ce:bc:25:e3:47:52:3d:ff:af:3e:40:01: 9c:51:45:f0:a2:67:56:4e:1d:2e:00:f8:46:ad:b6:13: bd:f2:ac:a1:77:67:d3:ae:4f:79:6f:c4:2e:c2:87:b1: f4:04:5c:5c:89:63:4b:b1:ca:aa:a9:cb:96:1f:2b:5d: 68:ce:9b:47:97:39:cd:47:91:ed:a0:e1:8c:d0:bc:f3: bf:e0:62:67:28:0a:4d:e9:90:a4:c1:d3:1c:b9:96:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:14:ac:03:27:fc:7b:6a:0c:6c:aa:38:f7:da:71:3a: a3:75:c5:c7:88:74:4b:10:89:9c:73:31:59:78:65:45: 3b:de:7b:6c:c2:de:90:8a:50:7c:d3:27:90:e1:0e:66: 35:5b:36:94:49:be:4e:4e:fe:30:4b:0b:80:2e:53:45: e6:65:1b:6f:b6:65:97:cc:c7:74:79:27:d2:f4:b1:5f: d5:25:43:b2:f2:0c:9a:37:c1:f3:12:4f:c3:64:7a:e9: 73:82:e9:f8:ee:90:bc:5d:3a:aa:40:af:4f:ba:b3:b0: c0:bb:df:78:b4:f2:37:36:69:7e:95:10:c5:97:df:90: 68:b1:4c:b5:92:bf:28:b9:7c:64:6a:79:c8:81:a6:11: 3a:15:a5:5f:b8:52:cb:78:4b:c7:cb:d4:7c:0b:0c:5f: 0e:73:a5:9d:f9:f3:dc:f6:49:85:af:e9:6b:e7:67:0a: 67:ce:21:3e:8c:a3:d3:b5:6d:a7:60:e6:30:eb:c8:bc: 3b:2b:e8:b9:ab:e4:31:cf:10:f5:f4:85:84:01:32:c3: de:b9:4b:32:e3:d5:0e:74:af:70:b9:86:3a:75:fc:55: 8c:5a:78:2a:f6:4d:2e:16:7e:e7:aa:f6:42:50:62:c7: 5d:d2:30:3f:e8:19:16:f6:8f:80:1d:3f:1a:3a:d7:38 Fingerprint (SHA-256): 7B:CC:BE:EA:6F:BA:B3:86:77:8B:82:23:A7:6D:C6:7F:8E:E8:7A:F3:CB:2E:B7:AE:5F:63:98:E6:12:1E:96:D6 Fingerprint (SHA1): 26:13:98:EB:5C:F2:ED:80:61:9F:73:13:DC:5F:3F:9C:4D:35:E2:3B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4311: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4312: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4313: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153538 (0x13bd0082) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 16:26:28 2017 Not After : Thu Mar 31 16:26:28 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:8c:49:24:0e:84:0c:34:8e:63:b2:e7:6d:2d:3b:09: b8:99:20:4a:af:d9:a6:1f:79:1b:88:24:6f:b6:48:9e: d5:f2:90:76:da:a5:2c:a0:a6:b3:4d:96:83:2e:c7:5f: c8:c5:e4:01:66:97:ed:64:de:37:7c:1f:4b:64:db:5b: 0b:2c:2f:56:cf:94:54:b5:f0:91:62:4f:4e:42:20:47: 8b:9e:a1:9e:71:bf:f7:b8:ea:fc:84:8a:95:81:af:d3: 55:79:48:da:00:1c:ea:9b:04:40:4c:2c:c7:ef:9e:ef: a8:66:b5:84:2e:e6:9c:47:fe:33:ca:36:9e:87:f1:62: c8:78:ae:0d:6f:d7:69:b2:95:94:82:76:90:e0:03:4d: 06:7c:64:6c:b1:17:e5:da:91:db:18:7f:f2:f9:1b:47: 36:01:01:c0:dc:ab:23:1b:32:9b:cc:7e:4f:76:82:ee: 73:97:c2:88:cd:6b:44:2c:20:68:c4:b4:13:d0:16:bf: 87:3a:4e:bb:dc:93:68:ca:cb:2f:3a:4c:c2:3a:5f:bd: 49:28:3c:1a:fa:cc:44:85:2d:69:1f:0e:ce:f8:ef:07: 42:a7:e2:15:98:86:70:f7:55:c0:40:63:0c:c6:ee:63: f6:b1:3b:5d:e0:40:0a:98:ba:bc:e4:0a:6f:2c:a7:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:02:b6:0d:c9:99:43:9e:d7:ad:2b:01:65:27:41:7b: 40:ba:aa:7d:0b:14:61:d1:16:14:2d:e3:45:c7:e0:b7: 43:48:70:f4:d5:28:e3:ef:5a:64:97:52:3b:f3:61:56: fa:ae:84:a1:7a:e0:e7:0f:34:02:c8:ae:24:73:13:38: 43:24:9e:8c:3d:91:2e:86:86:e5:0f:f5:df:2c:2e:4d: 81:61:a0:94:0a:b5:6e:9b:c7:14:14:8a:fd:07:e5:9d: 64:41:25:15:b1:bf:2b:50:58:60:03:f3:7c:6a:c6:51: a9:d0:58:94:7b:3e:5a:22:6e:6c:ef:26:17:82:63:b8: 15:c9:e1:86:08:07:8d:39:6b:f3:fc:48:75:61:3e:e1: af:2f:d9:71:fa:0b:87:25:d3:56:63:09:82:fc:44:c6: 55:5c:c0:b3:90:6e:9a:43:10:56:be:b7:c4:9a:fd:94: 00:6f:11:eb:87:8f:85:23:8e:ad:22:74:fe:da:52:52: 3a:33:ca:3f:d8:6f:38:80:d0:69:04:ac:2a:89:88:42: 9d:e5:19:aa:14:fe:fa:77:a4:45:a9:a7:8f:46:0a:f3: 41:72:eb:53:b9:55:23:28:6c:91:97:53:19:59:5d:8e: 5e:6a:50:e8:4e:2a:4e:7c:d4:0d:8c:51:87:ad:12:95 Fingerprint (SHA-256): 1C:D5:F4:04:27:67:4A:99:0D:E3:AF:EA:84:19:25:47:BA:4F:03:0A:5D:CF:42:68:54:18:87:C5:25:07:C3:1C Fingerprint (SHA1): 13:D7:A7:2A:A5:8B:02:48:67:59:15:81:79:07:9E:AB:55:84:92:05 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #4314: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4315: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153541 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4316: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4317: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4318: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4319: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331153542 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4320: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4321: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4322: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4323: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331153543 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA1Root-331153320.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4324: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4325: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #4326: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4327: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 331153544 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4328: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4329: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #4330: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153541 (0x13bd0085) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:27:14 2017 Not After : Thu Mar 31 16:27:14 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:ff:c8:c8:f1:55:69:cb:93:b2:54:f1:de:e7:16:36: a7:88:17:c1:63:06:96:52:12:9b:57:13:c3:fc:47:02: 76:81:2e:8d:f6:1f:36:6d:36:87:4d:3e:a5:14:a6:24: d0:0d:94:19:b0:ea:86:ea:27:66:10:dc:ce:8e:6a:75: c7:57:27:2d:c5:1a:a8:36:42:20:ec:36:22:37:22:3a: 4e:d6:e5:aa:02:0b:e3:c8:c4:38:62:b2:ff:80:0c:7d: 04:6f:46:1f:17:cb:63:ae:bc:9f:40:70:cb:5c:bd:69: 95:ae:a0:cb:ea:a1:ac:6c:ce:47:16:87:0b:1b:8c:d7: b3:d6:2a:77:dc:7c:e6:7e:01:fd:38:9a:7d:f9:75:c3: 0c:cf:bd:4f:e5:3e:da:5c:7e:2e:73:42:a6:45:35:4e: e6:09:66:a3:f2:5b:aa:e9:7b:f6:8d:d0:91:7a:16:e7: 17:d6:1d:b8:4d:b3:67:60:e7:e2:63:da:f5:26:6b:c3: da:19:2c:2f:9c:6a:15:bf:12:22:79:d4:7a:b4:79:73: 86:95:b2:94:bd:65:db:1e:be:b4:1d:ea:d1:08:95:09: b5:af:7d:4f:8a:b3:8a:cf:b8:93:50:36:d3:78:f8:09: 94:98:60:a6:3d:48:96:f4:c2:ff:8a:38:80:b2:de:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:0b:13:51:49:be:4c:84:6e:6c:0a:bc:40:5a:c1:8b: f7:ef:7c:81:98:1b:2d:be:c2:91:6a:5d:68:23:52:20: 02:52:50:60:0f:d2:7d:3c:2b:7b:c3:b2:8d:6a:73:8b: 3f:f5:78:aa:58:5f:40:4b:8a:9c:5d:29:9e:0f:20:2c: 0f:e2:dd:f9:a1:a4:c0:84:84:ce:4e:92:47:d9:28:7e: 98:8c:93:6f:18:fa:b8:31:e9:9b:74:10:26:b5:9e:69: 0f:ed:c6:83:9f:05:27:fc:04:4d:ac:c2:a9:39:a2:78: ab:61:4b:36:a4:9e:eb:17:cd:fc:86:eb:cb:1c:cd:f3: 0b:cf:b5:d9:9d:49:6c:45:32:e0:cc:d0:57:a8:40:bd: 62:51:9f:2a:37:e5:a4:bc:df:1c:ab:80:3c:a0:2f:ee: 8d:aa:bc:c4:dc:95:b1:f2:20:03:0f:de:0f:af:3a:e7: b6:05:00:79:b5:3c:b7:c8:22:e8:37:51:36:79:49:51: d7:1c:4c:9c:c9:e5:b6:e5:3c:2b:41:4d:45:57:33:b8: 6f:3a:9d:3f:80:37:bb:ce:83:64:01:06:de:64:42:5e: 72:da:dc:de:40:3a:3b:f1:8b:63:4a:3a:e6:64:3a:10: 8d:36:00:d0:97:8e:94:54:6e:80:ab:6b:52:75:89:a8 Fingerprint (SHA-256): E0:07:6D:91:35:F5:3D:D9:BE:06:06:43:C8:05:A9:B2:3A:56:33:71:86:36:20:8F:BD:60:50:5B:45:E0:9F:86 Fingerprint (SHA1): CC:01:6B:7F:D1:A2:DD:12:F5:B2:B0:49:30:91:CA:4C:EF:F6:FA:3B Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4331: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #4332: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153545 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4333: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #4334: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #4335: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153546 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4336: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #4337: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #4338: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4339: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 331153547 -7 Bridge@Army < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4340: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4341: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 331153548 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4342: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4343: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #4344: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4345: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4346: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 331153549 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-Bridge-331153321.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4347: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4348: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4349: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4350: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331153550 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4351: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4352: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #4353: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #4354: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153546 (0x13bd008a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 16:28:13 2017 Not After : Thu Mar 31 16:28:13 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:2f:0e:c4:b1:6d:65:cd:60:14:fa:e9:bc:82:c8:fc: d8:97:c4:82:9e:18:70:8e:3f:e2:22:bd:82:4c:f6:da: 88:43:b5:69:2e:71:8f:1e:fa:50:3d:2e:d2:16:51:ce: f3:f5:35:c6:f2:f8:37:31:47:30:ef:7f:ee:5c:8f:76: eb:f3:29:94:16:c4:9e:65:14:13:60:57:64:e6:fe:b5: 76:17:ac:83:02:d8:db:02:3e:1b:3c:22:6e:21:0a:70: 18:5d:11:a1:35:0f:8b:e0:68:a9:08:be:53:da:e1:73: c1:67:12:f0:70:d2:25:59:87:fc:63:e0:f9:37:dd:2c: a4:92:ad:2b:a5:d1:c0:6c:11:1a:68:67:d6:e8:3e:05: 4f:13:fb:5f:ca:69:fe:f4:70:63:d0:c2:9b:e1:f1:6c: 0b:4f:e9:d8:6f:2d:fe:ab:bc:8f:73:39:75:07:63:e1: a2:54:3f:82:ed:dc:49:9e:a6:f7:c2:4d:9f:cc:ff:d1: 25:08:14:46:b8:31:d8:6b:70:d0:2f:21:23:f9:e3:0f: fb:0a:fb:20:2c:b5:2a:19:b0:cb:83:ad:3a:1f:cc:40: 79:11:2d:90:b9:a0:a5:ff:bb:c1:bd:d8:a9:69:0b:bb: 64:1f:2f:52:5f:32:c0:17:be:78:9d:48:3f:29:b1:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:b6:83:32:52:bf:4c:98:1b:ec:c4:e1:e1:a2:4c:42: 29:61:6b:06:f5:74:1c:5f:e5:8b:80:cc:0a:dc:5e:bc: be:19:34:f6:6e:74:7f:e4:cd:75:d7:7b:d5:ee:8f:0e: f5:17:ba:5d:35:ce:9f:b1:78:e4:98:aa:d7:4e:27:ac: 37:bf:88:fb:a0:c2:27:88:7e:f6:88:4a:3e:75:39:c5: 4b:fb:6f:69:3c:10:64:1b:8b:68:09:d2:f8:3f:bc:9a: 0e:e5:8f:10:44:a0:dd:a3:70:04:23:54:94:5f:2d:12: 7e:84:f2:4c:79:f0:16:3d:e7:35:2f:73:72:be:16:c2: ba:13:f1:20:bb:78:e8:97:8c:bd:50:c9:26:df:83:63: 69:6c:ea:f2:ca:69:21:4d:c9:d4:d0:36:d2:46:c5:61: 81:da:71:c0:d9:9e:a5:09:98:f1:e2:f8:81:c3:15:d9: 45:81:17:5a:ea:69:f5:52:6e:68:2e:97:be:b0:91:86: b5:d1:b4:d9:e4:a3:32:b1:50:6c:8a:70:a6:a1:e7:0a: 6b:56:a1:14:5f:74:4d:8b:9d:37:7c:a5:17:2c:79:46: f4:94:72:4b:aa:46:63:23:8b:04:3a:6b:bd:2b:30:5d: c8:49:32:67:a0:27:b3:01:f0:19:bd:f1:79:48:1d:89 Fingerprint (SHA-256): EA:2D:17:B3:AD:14:FA:06:AC:72:CC:AB:13:B6:02:FC:D8:1C:08:09:F3:F4:38:67:A0:DA:4B:52:3A:74:5A:3B Fingerprint (SHA1): 85:F5:38:EF:DE:D9:E2:A6:DE:5E:9B:8A:1B:C0:90:A1:76:E8:00:29 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4355: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153546 (0x13bd008a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 16:28:13 2017 Not After : Thu Mar 31 16:28:13 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:2f:0e:c4:b1:6d:65:cd:60:14:fa:e9:bc:82:c8:fc: d8:97:c4:82:9e:18:70:8e:3f:e2:22:bd:82:4c:f6:da: 88:43:b5:69:2e:71:8f:1e:fa:50:3d:2e:d2:16:51:ce: f3:f5:35:c6:f2:f8:37:31:47:30:ef:7f:ee:5c:8f:76: eb:f3:29:94:16:c4:9e:65:14:13:60:57:64:e6:fe:b5: 76:17:ac:83:02:d8:db:02:3e:1b:3c:22:6e:21:0a:70: 18:5d:11:a1:35:0f:8b:e0:68:a9:08:be:53:da:e1:73: c1:67:12:f0:70:d2:25:59:87:fc:63:e0:f9:37:dd:2c: a4:92:ad:2b:a5:d1:c0:6c:11:1a:68:67:d6:e8:3e:05: 4f:13:fb:5f:ca:69:fe:f4:70:63:d0:c2:9b:e1:f1:6c: 0b:4f:e9:d8:6f:2d:fe:ab:bc:8f:73:39:75:07:63:e1: a2:54:3f:82:ed:dc:49:9e:a6:f7:c2:4d:9f:cc:ff:d1: 25:08:14:46:b8:31:d8:6b:70:d0:2f:21:23:f9:e3:0f: fb:0a:fb:20:2c:b5:2a:19:b0:cb:83:ad:3a:1f:cc:40: 79:11:2d:90:b9:a0:a5:ff:bb:c1:bd:d8:a9:69:0b:bb: 64:1f:2f:52:5f:32:c0:17:be:78:9d:48:3f:29:b1:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:b6:83:32:52:bf:4c:98:1b:ec:c4:e1:e1:a2:4c:42: 29:61:6b:06:f5:74:1c:5f:e5:8b:80:cc:0a:dc:5e:bc: be:19:34:f6:6e:74:7f:e4:cd:75:d7:7b:d5:ee:8f:0e: f5:17:ba:5d:35:ce:9f:b1:78:e4:98:aa:d7:4e:27:ac: 37:bf:88:fb:a0:c2:27:88:7e:f6:88:4a:3e:75:39:c5: 4b:fb:6f:69:3c:10:64:1b:8b:68:09:d2:f8:3f:bc:9a: 0e:e5:8f:10:44:a0:dd:a3:70:04:23:54:94:5f:2d:12: 7e:84:f2:4c:79:f0:16:3d:e7:35:2f:73:72:be:16:c2: ba:13:f1:20:bb:78:e8:97:8c:bd:50:c9:26:df:83:63: 69:6c:ea:f2:ca:69:21:4d:c9:d4:d0:36:d2:46:c5:61: 81:da:71:c0:d9:9e:a5:09:98:f1:e2:f8:81:c3:15:d9: 45:81:17:5a:ea:69:f5:52:6e:68:2e:97:be:b0:91:86: b5:d1:b4:d9:e4:a3:32:b1:50:6c:8a:70:a6:a1:e7:0a: 6b:56:a1:14:5f:74:4d:8b:9d:37:7c:a5:17:2c:79:46: f4:94:72:4b:aa:46:63:23:8b:04:3a:6b:bd:2b:30:5d: c8:49:32:67:a0:27:b3:01:f0:19:bd:f1:79:48:1d:89 Fingerprint (SHA-256): EA:2D:17:B3:AD:14:FA:06:AC:72:CC:AB:13:B6:02:FC:D8:1C:08:09:F3:F4:38:67:A0:DA:4B:52:3A:74:5A:3B Fingerprint (SHA1): 85:F5:38:EF:DE:D9:E2:A6:DE:5E:9B:8A:1B:C0:90:A1:76:E8:00:29 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4356: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #4357: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153551 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4358: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #4359: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #4360: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153552 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4361: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #4362: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #4363: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4364: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 331153553 -7 Bridge@Army < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4365: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4366: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 331153554 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4367: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4368: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #4369: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4370: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4371: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 331153555 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-Bridge-331153322.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4372: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4373: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4374: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4375: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331153556 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4376: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4377: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4378: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4379: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 331153557 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-BridgeNavy-331153323.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4380: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4381: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4382: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4383: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 331153558 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4384: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4385: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #4386: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #4387: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153552 (0x13bd0090) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 16:29:14 2017 Not After : Thu Mar 31 16:29:14 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:0d:39:da:6a:8d:31:70:d2:23:81:ea:e1:af:da:31: fc:37:21:9a:c2:2d:26:4f:a6:93:05:14:91:79:b8:13: c3:17:1d:64:17:93:dc:2d:23:4c:6d:70:ee:75:06:ed: be:a2:aa:61:e4:0d:4a:67:be:79:64:fb:e2:f9:6b:59: 1e:1b:b1:30:03:06:8c:a5:58:e5:ba:11:04:25:d7:ff: c4:8b:87:35:94:78:2e:6b:71:08:05:6c:9d:f8:31:73: b4:50:10:3e:0c:38:80:60:e0:f1:53:5f:e7:d8:84:de: f6:75:78:a0:20:94:10:bb:06:8e:6a:82:0b:59:46:07: 58:c1:7b:6d:84:5e:da:43:d5:f4:ec:d2:5a:72:5c:37: 75:1b:6a:19:af:e2:13:7e:e5:50:71:f5:52:18:c3:60: 7b:d9:74:33:ce:3c:76:9a:55:30:85:6f:00:0c:83:28: 35:ae:34:d1:96:e9:e1:ae:23:0a:23:9f:51:15:8a:f0: bd:f9:08:91:17:cd:4d:1a:1f:88:20:50:a3:cd:8c:c6: 92:4b:b5:91:67:5b:7a:37:b1:b9:e4:9e:f9:e3:38:d4: 43:4e:ac:75:67:b9:90:45:08:71:0d:38:0b:2f:fd:f5: 7e:53:76:21:8a:b9:08:21:c5:e7:f9:5a:3b:ff:50:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:6f:0e:1d:72:b6:0a:f1:33:b7:65:34:34:bc:f2:c0: 23:65:53:76:e1:e7:3d:01:a2:f9:ae:34:6f:18:12:39: c7:80:18:e5:e6:b5:ac:d9:cc:df:f6:af:df:10:ff:d1: d6:c2:7d:b6:16:44:64:f3:a3:c2:2a:13:06:9c:eb:53: 7c:cb:56:59:e8:b1:d7:35:dc:07:e0:aa:39:18:47:19: 2c:34:b6:8a:60:ec:a7:49:4b:6e:59:d4:26:8a:69:cd: 1f:c0:13:6e:6e:17:4a:4d:4f:26:b3:77:9c:d5:1b:0d: 79:bf:bf:b4:91:1e:ce:72:30:31:94:46:e3:d3:36:33: df:56:06:4b:53:f2:bc:c9:84:3c:06:32:32:fd:db:15: cb:14:97:73:43:67:df:9d:b0:70:be:60:d2:07:54:1f: 07:e6:16:98:80:25:b9:8d:53:9f:f3:bc:57:e4:a6:47: 52:77:90:34:17:81:38:65:e7:00:9c:93:64:2d:60:25: 44:c7:5c:1c:e0:8b:09:72:b5:60:cb:55:86:e2:2b:63: c4:05:ee:d0:a2:52:8c:0d:e1:73:7f:84:ba:7f:16:12: 87:6a:af:8e:dd:42:48:79:eb:45:50:0d:dc:a4:b5:aa: 5f:a2:30:76:5c:ff:97:ea:ec:6e:be:a9:56:6c:f1:6c Fingerprint (SHA-256): 6C:6F:7A:4F:14:E8:04:CE:F7:38:0F:F0:E8:A5:97:51:D8:7C:95:67:6D:37:B3:7B:20:A6:C8:3F:57:EB:B5:AE Fingerprint (SHA1): 97:72:80:DB:AA:00:C8:86:8B:A1:FE:23:0E:D5:4F:9A:46:6F:72:7F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4388: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153552 (0x13bd0090) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 16:29:14 2017 Not After : Thu Mar 31 16:29:14 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:0d:39:da:6a:8d:31:70:d2:23:81:ea:e1:af:da:31: fc:37:21:9a:c2:2d:26:4f:a6:93:05:14:91:79:b8:13: c3:17:1d:64:17:93:dc:2d:23:4c:6d:70:ee:75:06:ed: be:a2:aa:61:e4:0d:4a:67:be:79:64:fb:e2:f9:6b:59: 1e:1b:b1:30:03:06:8c:a5:58:e5:ba:11:04:25:d7:ff: c4:8b:87:35:94:78:2e:6b:71:08:05:6c:9d:f8:31:73: b4:50:10:3e:0c:38:80:60:e0:f1:53:5f:e7:d8:84:de: f6:75:78:a0:20:94:10:bb:06:8e:6a:82:0b:59:46:07: 58:c1:7b:6d:84:5e:da:43:d5:f4:ec:d2:5a:72:5c:37: 75:1b:6a:19:af:e2:13:7e:e5:50:71:f5:52:18:c3:60: 7b:d9:74:33:ce:3c:76:9a:55:30:85:6f:00:0c:83:28: 35:ae:34:d1:96:e9:e1:ae:23:0a:23:9f:51:15:8a:f0: bd:f9:08:91:17:cd:4d:1a:1f:88:20:50:a3:cd:8c:c6: 92:4b:b5:91:67:5b:7a:37:b1:b9:e4:9e:f9:e3:38:d4: 43:4e:ac:75:67:b9:90:45:08:71:0d:38:0b:2f:fd:f5: 7e:53:76:21:8a:b9:08:21:c5:e7:f9:5a:3b:ff:50:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:6f:0e:1d:72:b6:0a:f1:33:b7:65:34:34:bc:f2:c0: 23:65:53:76:e1:e7:3d:01:a2:f9:ae:34:6f:18:12:39: c7:80:18:e5:e6:b5:ac:d9:cc:df:f6:af:df:10:ff:d1: d6:c2:7d:b6:16:44:64:f3:a3:c2:2a:13:06:9c:eb:53: 7c:cb:56:59:e8:b1:d7:35:dc:07:e0:aa:39:18:47:19: 2c:34:b6:8a:60:ec:a7:49:4b:6e:59:d4:26:8a:69:cd: 1f:c0:13:6e:6e:17:4a:4d:4f:26:b3:77:9c:d5:1b:0d: 79:bf:bf:b4:91:1e:ce:72:30:31:94:46:e3:d3:36:33: df:56:06:4b:53:f2:bc:c9:84:3c:06:32:32:fd:db:15: cb:14:97:73:43:67:df:9d:b0:70:be:60:d2:07:54:1f: 07:e6:16:98:80:25:b9:8d:53:9f:f3:bc:57:e4:a6:47: 52:77:90:34:17:81:38:65:e7:00:9c:93:64:2d:60:25: 44:c7:5c:1c:e0:8b:09:72:b5:60:cb:55:86:e2:2b:63: c4:05:ee:d0:a2:52:8c:0d:e1:73:7f:84:ba:7f:16:12: 87:6a:af:8e:dd:42:48:79:eb:45:50:0d:dc:a4:b5:aa: 5f:a2:30:76:5c:ff:97:ea:ec:6e:be:a9:56:6c:f1:6c Fingerprint (SHA-256): 6C:6F:7A:4F:14:E8:04:CE:F7:38:0F:F0:E8:A5:97:51:D8:7C:95:67:6D:37:B3:7B:20:A6:C8:3F:57:EB:B5:AE Fingerprint (SHA1): 97:72:80:DB:AA:00:C8:86:8B:A1:FE:23:0E:D5:4F:9A:46:6F:72:7F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4389: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #4390: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153551 (0x13bd008f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 16:28:50 2017 Not After : Thu Mar 31 16:28:50 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:fe:8c:53:ab:d1:0d:96:0c:7b:4e:84:70:fa:6d:cc: f2:5c:2e:f1:da:2b:eb:51:12:1c:74:20:eb:ed:22:e7: f0:54:84:0f:66:f5:17:cc:4b:64:6e:ef:ee:0f:67:c6: eb:47:98:a6:b1:6d:a3:19:85:71:64:fa:82:6a:3a:da: 1e:04:9a:3d:97:13:2a:7a:c2:09:f6:6d:f1:5a:d7:d5: 64:f4:00:b6:e9:74:39:b6:dd:cf:88:0b:dc:8b:75:52: 46:fe:98:c2:8f:59:20:0a:6f:92:4b:ad:29:84:71:b1: 61:e1:5b:17:02:c9:bc:c2:33:7b:12:c9:4f:d9:d9:d8: 7d:36:f1:d7:07:8b:f9:d1:f5:cd:fb:03:05:f0:a6:dc: 06:b8:bd:45:0c:4f:39:72:ea:7d:be:d7:31:a3:6d:e6: af:05:94:af:a9:a9:a6:3f:c4:0c:50:32:1f:5e:0a:23: 0d:dc:8a:4d:18:ec:e1:17:44:0d:b1:09:cf:3e:5d:fc: c4:31:7d:0f:41:f7:59:90:5e:d9:92:21:1a:4e:d5:23: bc:8b:95:f0:5c:fe:54:66:e3:71:59:86:ab:ef:44:83: 01:08:b4:a0:1d:1d:88:7a:03:b7:58:4e:67:7a:9e:fd: 1e:01:44:22:b1:67:cc:3d:47:fc:3a:01:a0:18:08:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:2a:19:40:e4:d3:32:b6:9c:b4:be:a7:2a:8f:2a:c4: 93:98:b7:49:f4:ba:8c:d1:a2:98:b1:f3:f4:b1:fe:eb: 62:38:07:c1:39:e9:06:4d:df:46:75:b8:c0:4d:7e:5f: 5d:96:ea:af:3d:11:97:5d:bd:e5:89:15:c8:56:1b:ef: e5:d9:a5:c2:d5:4d:06:1f:e7:ca:c2:d0:a7:e1:37:45: a3:3a:cc:1b:48:b5:1d:9d:6f:3e:d7:16:0b:bb:ca:d5: 61:5b:ca:84:a5:77:64:42:7e:b3:9b:af:6c:65:4e:d7: c7:68:6c:f4:b2:bd:5d:ef:ee:63:cb:e1:48:09:06:c5: ad:ed:91:b5:3f:3b:b6:4b:2b:17:8e:53:17:51:49:fc: 4d:1b:8a:ab:54:b6:dd:bf:4c:ba:db:17:66:ae:55:8e: a4:15:fc:dc:f3:03:0c:5b:bd:4f:d7:2c:e8:03:97:2f: 4f:6f:ad:ab:38:b1:03:fe:24:e3:5c:43:e1:97:54:d5: 5f:6d:0f:9b:8a:ce:75:87:9c:0d:81:7c:02:bc:d7:2e: 54:b5:d5:d1:16:e7:36:10:57:a0:ab:51:ba:99:88:89: 28:ea:62:94:a8:3b:87:38:9b:d9:3e:92:11:3e:fd:68: e6:a0:89:d6:1c:83:d1:8e:4c:cc:ba:fe:0a:56:45:0d Fingerprint (SHA-256): 4F:17:BA:D9:F8:12:68:81:A6:29:B9:95:A6:DA:83:11:92:D4:22:60:F4:48:32:23:DE:63:18:42:2F:98:EF:B6 Fingerprint (SHA1): EA:91:3A:0C:62:74:AB:5B:82:D0:AE:11:23:51:BE:23:10:5B:80:1F Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4391: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153552 (0x13bd0090) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 16:29:14 2017 Not After : Thu Mar 31 16:29:14 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:0d:39:da:6a:8d:31:70:d2:23:81:ea:e1:af:da:31: fc:37:21:9a:c2:2d:26:4f:a6:93:05:14:91:79:b8:13: c3:17:1d:64:17:93:dc:2d:23:4c:6d:70:ee:75:06:ed: be:a2:aa:61:e4:0d:4a:67:be:79:64:fb:e2:f9:6b:59: 1e:1b:b1:30:03:06:8c:a5:58:e5:ba:11:04:25:d7:ff: c4:8b:87:35:94:78:2e:6b:71:08:05:6c:9d:f8:31:73: b4:50:10:3e:0c:38:80:60:e0:f1:53:5f:e7:d8:84:de: f6:75:78:a0:20:94:10:bb:06:8e:6a:82:0b:59:46:07: 58:c1:7b:6d:84:5e:da:43:d5:f4:ec:d2:5a:72:5c:37: 75:1b:6a:19:af:e2:13:7e:e5:50:71:f5:52:18:c3:60: 7b:d9:74:33:ce:3c:76:9a:55:30:85:6f:00:0c:83:28: 35:ae:34:d1:96:e9:e1:ae:23:0a:23:9f:51:15:8a:f0: bd:f9:08:91:17:cd:4d:1a:1f:88:20:50:a3:cd:8c:c6: 92:4b:b5:91:67:5b:7a:37:b1:b9:e4:9e:f9:e3:38:d4: 43:4e:ac:75:67:b9:90:45:08:71:0d:38:0b:2f:fd:f5: 7e:53:76:21:8a:b9:08:21:c5:e7:f9:5a:3b:ff:50:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:6f:0e:1d:72:b6:0a:f1:33:b7:65:34:34:bc:f2:c0: 23:65:53:76:e1:e7:3d:01:a2:f9:ae:34:6f:18:12:39: c7:80:18:e5:e6:b5:ac:d9:cc:df:f6:af:df:10:ff:d1: d6:c2:7d:b6:16:44:64:f3:a3:c2:2a:13:06:9c:eb:53: 7c:cb:56:59:e8:b1:d7:35:dc:07:e0:aa:39:18:47:19: 2c:34:b6:8a:60:ec:a7:49:4b:6e:59:d4:26:8a:69:cd: 1f:c0:13:6e:6e:17:4a:4d:4f:26:b3:77:9c:d5:1b:0d: 79:bf:bf:b4:91:1e:ce:72:30:31:94:46:e3:d3:36:33: df:56:06:4b:53:f2:bc:c9:84:3c:06:32:32:fd:db:15: cb:14:97:73:43:67:df:9d:b0:70:be:60:d2:07:54:1f: 07:e6:16:98:80:25:b9:8d:53:9f:f3:bc:57:e4:a6:47: 52:77:90:34:17:81:38:65:e7:00:9c:93:64:2d:60:25: 44:c7:5c:1c:e0:8b:09:72:b5:60:cb:55:86:e2:2b:63: c4:05:ee:d0:a2:52:8c:0d:e1:73:7f:84:ba:7f:16:12: 87:6a:af:8e:dd:42:48:79:eb:45:50:0d:dc:a4:b5:aa: 5f:a2:30:76:5c:ff:97:ea:ec:6e:be:a9:56:6c:f1:6c Fingerprint (SHA-256): 6C:6F:7A:4F:14:E8:04:CE:F7:38:0F:F0:E8:A5:97:51:D8:7C:95:67:6D:37:B3:7B:20:A6:C8:3F:57:EB:B5:AE Fingerprint (SHA1): 97:72:80:DB:AA:00:C8:86:8B:A1:FE:23:0E:D5:4F:9A:46:6F:72:7F Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4392: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153552 (0x13bd0090) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 16:29:14 2017 Not After : Thu Mar 31 16:29:14 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:0d:39:da:6a:8d:31:70:d2:23:81:ea:e1:af:da:31: fc:37:21:9a:c2:2d:26:4f:a6:93:05:14:91:79:b8:13: c3:17:1d:64:17:93:dc:2d:23:4c:6d:70:ee:75:06:ed: be:a2:aa:61:e4:0d:4a:67:be:79:64:fb:e2:f9:6b:59: 1e:1b:b1:30:03:06:8c:a5:58:e5:ba:11:04:25:d7:ff: c4:8b:87:35:94:78:2e:6b:71:08:05:6c:9d:f8:31:73: b4:50:10:3e:0c:38:80:60:e0:f1:53:5f:e7:d8:84:de: f6:75:78:a0:20:94:10:bb:06:8e:6a:82:0b:59:46:07: 58:c1:7b:6d:84:5e:da:43:d5:f4:ec:d2:5a:72:5c:37: 75:1b:6a:19:af:e2:13:7e:e5:50:71:f5:52:18:c3:60: 7b:d9:74:33:ce:3c:76:9a:55:30:85:6f:00:0c:83:28: 35:ae:34:d1:96:e9:e1:ae:23:0a:23:9f:51:15:8a:f0: bd:f9:08:91:17:cd:4d:1a:1f:88:20:50:a3:cd:8c:c6: 92:4b:b5:91:67:5b:7a:37:b1:b9:e4:9e:f9:e3:38:d4: 43:4e:ac:75:67:b9:90:45:08:71:0d:38:0b:2f:fd:f5: 7e:53:76:21:8a:b9:08:21:c5:e7:f9:5a:3b:ff:50:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:6f:0e:1d:72:b6:0a:f1:33:b7:65:34:34:bc:f2:c0: 23:65:53:76:e1:e7:3d:01:a2:f9:ae:34:6f:18:12:39: c7:80:18:e5:e6:b5:ac:d9:cc:df:f6:af:df:10:ff:d1: d6:c2:7d:b6:16:44:64:f3:a3:c2:2a:13:06:9c:eb:53: 7c:cb:56:59:e8:b1:d7:35:dc:07:e0:aa:39:18:47:19: 2c:34:b6:8a:60:ec:a7:49:4b:6e:59:d4:26:8a:69:cd: 1f:c0:13:6e:6e:17:4a:4d:4f:26:b3:77:9c:d5:1b:0d: 79:bf:bf:b4:91:1e:ce:72:30:31:94:46:e3:d3:36:33: df:56:06:4b:53:f2:bc:c9:84:3c:06:32:32:fd:db:15: cb:14:97:73:43:67:df:9d:b0:70:be:60:d2:07:54:1f: 07:e6:16:98:80:25:b9:8d:53:9f:f3:bc:57:e4:a6:47: 52:77:90:34:17:81:38:65:e7:00:9c:93:64:2d:60:25: 44:c7:5c:1c:e0:8b:09:72:b5:60:cb:55:86:e2:2b:63: c4:05:ee:d0:a2:52:8c:0d:e1:73:7f:84:ba:7f:16:12: 87:6a:af:8e:dd:42:48:79:eb:45:50:0d:dc:a4:b5:aa: 5f:a2:30:76:5c:ff:97:ea:ec:6e:be:a9:56:6c:f1:6c Fingerprint (SHA-256): 6C:6F:7A:4F:14:E8:04:CE:F7:38:0F:F0:E8:A5:97:51:D8:7C:95:67:6D:37:B3:7B:20:A6:C8:3F:57:EB:B5:AE Fingerprint (SHA1): 97:72:80:DB:AA:00:C8:86:8B:A1:FE:23:0E:D5:4F:9A:46:6F:72:7F Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4393: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #4394: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153559 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4395: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #4396: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #4397: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153560 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4398: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #4399: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #4400: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4401: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 331153561 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4402: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4403: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #4404: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4405: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 331153562 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4406: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4407: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #4408: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4409: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 331153563 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #4410: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4411: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 331153564 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #4412: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4413: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #4414: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4415: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4416: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 331153565 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4417: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4418: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4419: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4420: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 331153566 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4421: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4422: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4423: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4424: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331153567 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4425: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4426: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4427: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4428: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 331153568 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4429: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4430: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4431: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153559 (0x13bd0097) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 16:30:32 2017 Not After : Thu Mar 31 16:30:32 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:fe:c6:8c:89:01:fa:66:45:9f:d4:5d:1f:74:23:74: 32:e8:00:21:b2:a4:76:7f:b8:54:05:26:af:d2:25:11: 88:7f:93:27:cf:fe:14:8b:8f:5c:3a:c4:06:24:d7:e9: f2:71:c1:8b:ae:68:58:38:3b:a8:5e:a2:b7:a4:3a:09: 70:e0:24:ea:a6:f1:8d:52:f2:4c:d0:24:d7:35:83:5f: 6c:17:65:5f:99:cb:01:f0:44:d0:71:4d:02:cd:1c:ee: 71:d4:08:dc:4f:6b:dc:0a:e1:eb:06:cd:90:6c:7b:e0: 84:00:04:5e:b4:17:f3:38:23:30:87:21:52:18:78:f5: b5:d0:a1:d2:c4:27:33:d7:f0:1d:fe:c9:9c:90:87:4f: 28:16:90:c1:52:ed:9e:42:41:c2:d6:fc:d4:a7:b5:1c: 1f:2e:22:87:07:47:69:ff:56:29:9a:3d:dc:ff:ef:16: ea:d2:c1:f9:09:47:8c:2b:40:86:39:93:34:03:52:22: a4:9a:47:f0:35:38:23:3e:10:0e:58:a5:77:c9:b9:08: 6a:38:e1:f7:c2:a1:5d:3d:a1:fd:50:0e:49:48:f2:f8: 66:87:f5:b2:0a:e2:ca:a8:dd:5d:2b:cc:25:e0:c7:3c: 4e:ce:e9:4e:2b:7d:b1:23:6c:85:00:c5:c5:d4:9f:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:a4:c7:fc:b1:14:9e:b3:c3:97:88:38:3f:c6:6b:b2: 40:2e:a8:9e:c5:51:31:0a:0a:76:a4:32:1f:f0:f7:ee: 1c:59:19:e3:9d:45:b1:94:73:95:65:62:6c:4f:40:84: ba:91:8d:4f:ee:c5:00:25:a6:2e:2d:2b:65:3d:4d:66: 66:70:d2:67:8b:ed:bd:29:d9:d4:d7:3c:85:f6:6c:a5: 4d:cb:57:bb:6e:c3:28:38:6f:02:80:e7:99:92:1a:02: c1:b2:33:55:33:10:43:dd:9d:41:3b:7e:54:ff:3b:13: 5f:21:fa:c0:aa:98:84:ef:a5:b5:8c:19:23:2d:49:8e: 24:ca:48:56:2e:48:67:db:6d:07:bd:f4:aa:8f:19:00: 52:44:09:13:bc:02:2b:03:be:7e:d2:ac:52:8b:fc:fd: be:da:01:62:c8:bf:be:99:9b:17:f3:18:4d:e8:9c:1e: 59:3a:7e:58:0e:b8:4b:57:8d:5c:75:49:a5:f7:2d:58: 1a:e9:37:89:77:76:27:f8:e0:ae:7a:d4:c1:9a:6b:ae: 37:df:69:3e:9a:15:d7:a3:f9:1b:c4:5f:cb:0e:1b:d5: 9f:08:fe:07:f8:e7:fb:61:88:ee:a0:ad:ed:e6:12:77: 0b:cc:d3:95:c4:72:53:34:33:e6:ba:3b:bd:ff:e0:08 Fingerprint (SHA-256): 6D:AE:BD:FC:D2:DB:C1:50:2F:55:9C:11:CA:B2:0D:F8:47:CC:2E:59:C6:0E:7F:25:D5:CC:A9:2E:2B:EF:AE:F8 Fingerprint (SHA1): CA:5F:58:F5:F8:DE:69:8F:DC:B4:04:E1:94:5A:B4:9D:E6:47:08:6F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #4432: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4433: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4434: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4435: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4436: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4437: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4438: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4439: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4440: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153560 (0x13bd0098) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 16:30:41 2017 Not After : Thu Mar 31 16:30:41 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:9e:6e:d3:0f:c9:78:d1:c2:ce:b2:cf:0c:dd:6b:1b: b3:78:79:99:c4:6d:8e:76:f4:b9:db:97:e4:6f:f8:8f: 15:95:b4:11:02:d6:78:b2:85:b0:82:88:fa:8b:b3:6b: f5:62:9c:a6:5c:12:8b:bd:ad:44:2d:2c:2e:99:68:b0: 0e:e7:17:cc:1f:82:33:c5:cc:e2:2c:92:ee:a9:4c:21: b6:d0:41:7b:e6:ac:82:94:e8:d5:0f:74:4d:fe:95:8a: 42:ed:58:e2:ce:9a:58:8a:05:0c:7a:21:38:96:09:a3: bc:e8:29:40:17:4e:4e:77:5c:47:ab:0a:2c:49:a4:10: 76:3e:13:fe:25:ac:22:f4:dc:4c:62:49:58:0c:f9:e9: 69:18:53:fd:22:39:b8:42:13:0a:69:1c:bd:bf:41:92: b1:1b:5a:27:bf:a7:7c:32:e8:21:dd:14:a8:38:82:ba: 68:19:ee:57:ff:6d:93:ba:96:91:7e:d0:9d:09:5e:bc: 37:9c:7c:83:62:35:3a:e4:5d:2a:17:8e:bd:b2:4e:c8: 96:3d:45:81:63:49:16:b4:87:6c:af:d3:b7:01:3a:aa: a2:99:51:75:86:8d:ba:8c:5b:03:80:a5:78:8c:64:cf: c1:b8:f5:88:62:36:8b:e1:68:19:44:0e:23:5e:a2:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:52:a5:85:75:13:ac:d7:ea:c8:71:62:a5:23:4b:f4: 3a:29:56:51:a6:2e:d0:0f:52:97:04:da:9d:d8:e1:cb: 37:f2:7c:fc:3d:5d:8b:49:9c:04:9b:11:5c:45:72:cf: e7:79:10:2a:45:33:59:12:9b:40:80:a2:3b:74:90:33: dd:92:ca:b5:d0:75:1c:e7:fb:19:5f:fa:24:c7:cc:55: a8:c9:04:3e:cc:b4:6b:23:62:e1:30:94:f6:6d:82:a0: f9:64:a3:6d:65:6b:e3:c3:78:a1:b2:41:fc:f3:0f:63: 43:f2:7a:35:76:0d:08:bb:63:48:b2:8a:57:eb:16:58: e7:86:13:04:00:0a:fa:b0:a5:b4:83:c0:ba:b9:5b:f3: 2f:ab:15:ac:df:7c:f3:43:a1:f3:26:c3:11:a5:a9:ae: 96:31:8b:b4:6a:3a:24:53:b5:0f:19:84:3e:dc:67:60: b1:fa:9c:13:5d:67:8b:4e:bf:7c:ac:90:34:da:c2:b8: 96:72:b8:fe:1c:ba:c1:e1:3b:25:b8:8f:e5:05:f0:d1: ab:8b:7e:60:df:b4:20:76:b2:0c:ac:62:41:d9:ea:7f: f1:1f:af:39:3c:97:bf:4a:62:29:bc:c2:58:49:48:37: 70:01:dd:b7:29:aa:12:29:41:ff:00:70:d0:06:b4:82 Fingerprint (SHA-256): E7:06:B2:AC:39:28:4A:2A:2B:D6:AA:12:AA:6A:6E:08:A1:44:88:63:CF:3E:93:BB:0E:EA:A6:10:A4:BD:72:1D Fingerprint (SHA1): 04:9B:04:F8:B3:F5:84:1A:47:CC:80:99:95:E7:35:F8:43:8E:29:AD Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #4441: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4442: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4443: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4444: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4445: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4446: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4447: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #4448: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #4449: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #4450: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #4451: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #4452: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #4453: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #4454: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #4455: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #4456: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #4457: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #4458: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4459: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153569 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4460: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4461: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4462: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4463: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331153570 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4464: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4465: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4466: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4467: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331153571 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4468: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4469: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4470: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4471: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 331153572 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4472: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4473: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4474: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4475: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 331153573 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4476: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4477: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #4478: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4479: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 331153574 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4480: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4481: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #4482: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4483: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 331153575 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4484: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4485: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #4486: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4487: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 331153576 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4488: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4489: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #4490: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4491: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 331153577 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4492: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4493: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4494: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153569 (0x13bd00a1) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:32:28 2017 Not After : Thu Mar 31 16:32:28 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 79:6e:ac:ae:55:e0:9a:ec:0b:d0:56:c9:0e:25:b8:d4: 35:5f:e5:d6:99:7b:cb:58:1b:71:4f:b8:1a:8f:0a:76: e7:78:f5:17:26:75:ed:d7:ae:5f:3a:d9:81:1e:c3:8a: fc:db:a1:e2:b7:0a:94:bb:8d:fb:33:ac:1e:94:5d:0b: 99:43:24:1e:27:2a:a7:41:38:59:b6:5b:35:88:d7:fc: 43:8c:f5:9c:b9:69:1f:18:21:0a:d5:d9:48:d1:da:1f: 41:2f:b8:3d:c9:5f:d2:aa:23:8a:c4:69:9b:38:d0:1c: e2:12:12:c6:d2:38:25:34:1f:2a:d3:95:ae:dd:95:b8: bd:22:2e:3d:08:c2:e4:5b:a3:58:44:8b:16:e1:85:0d: 80:12:47:16:9f:21:41:72:a2:01:20:89:51:db:6d:9c: d4:0a:78:0d:01:e3:17:79:ae:b2:bf:72:fd:fd:9e:3a: d3:90:ff:bb:60:e7:1c:7d:49:70:a8:de:32:ce:31:7c: 38:f0:18:4f:10:14:7c:9a:ca:41:99:55:e6:4d:90:cd: c4:1b:e6:0a:77:39:df:4e:9e:10:ac:9c:e7:a3:a2:e8: 7f:e2:a9:42:80:18:06:bb:9d:5e:39:5d:50:e0:f6:ca: 77:28:b8:5e:33:38:cb:20:29:87:05:1d:ba:d5:3b:59 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:1e:43:d5:68:56:a5:fa:a8:84:1e:d1:68: 4e:d1:ca:47:ec:97:b2:73:bf:95:e3:05:92:be:bf:b2: 02:1d:00:8f:b0:53:6f:5a:37:3e:2b:c5:5f:39:d1:76: 6c:58:f9:33:d7:14:1e:eb:91:5d:e0:03:9a:de:7e Fingerprint (SHA-256): E5:96:E5:87:FB:07:B5:D0:E5:DE:E2:27:BA:FD:D0:BE:64:F3:7F:E7:47:8D:F5:FE:2C:E2:0E:FD:34:ED:8D:36 Fingerprint (SHA1): F6:BE:7B:91:BF:BB:7C:8F:64:E7:5E:40:ED:A2:C1:DD:63:BC:43:D6 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4495: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153569 (0x13bd00a1) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:32:28 2017 Not After : Thu Mar 31 16:32:28 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 79:6e:ac:ae:55:e0:9a:ec:0b:d0:56:c9:0e:25:b8:d4: 35:5f:e5:d6:99:7b:cb:58:1b:71:4f:b8:1a:8f:0a:76: e7:78:f5:17:26:75:ed:d7:ae:5f:3a:d9:81:1e:c3:8a: fc:db:a1:e2:b7:0a:94:bb:8d:fb:33:ac:1e:94:5d:0b: 99:43:24:1e:27:2a:a7:41:38:59:b6:5b:35:88:d7:fc: 43:8c:f5:9c:b9:69:1f:18:21:0a:d5:d9:48:d1:da:1f: 41:2f:b8:3d:c9:5f:d2:aa:23:8a:c4:69:9b:38:d0:1c: e2:12:12:c6:d2:38:25:34:1f:2a:d3:95:ae:dd:95:b8: bd:22:2e:3d:08:c2:e4:5b:a3:58:44:8b:16:e1:85:0d: 80:12:47:16:9f:21:41:72:a2:01:20:89:51:db:6d:9c: d4:0a:78:0d:01:e3:17:79:ae:b2:bf:72:fd:fd:9e:3a: d3:90:ff:bb:60:e7:1c:7d:49:70:a8:de:32:ce:31:7c: 38:f0:18:4f:10:14:7c:9a:ca:41:99:55:e6:4d:90:cd: c4:1b:e6:0a:77:39:df:4e:9e:10:ac:9c:e7:a3:a2:e8: 7f:e2:a9:42:80:18:06:bb:9d:5e:39:5d:50:e0:f6:ca: 77:28:b8:5e:33:38:cb:20:29:87:05:1d:ba:d5:3b:59 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:1e:43:d5:68:56:a5:fa:a8:84:1e:d1:68: 4e:d1:ca:47:ec:97:b2:73:bf:95:e3:05:92:be:bf:b2: 02:1d:00:8f:b0:53:6f:5a:37:3e:2b:c5:5f:39:d1:76: 6c:58:f9:33:d7:14:1e:eb:91:5d:e0:03:9a:de:7e Fingerprint (SHA-256): E5:96:E5:87:FB:07:B5:D0:E5:DE:E2:27:BA:FD:D0:BE:64:F3:7F:E7:47:8D:F5:FE:2C:E2:0E:FD:34:ED:8D:36 Fingerprint (SHA1): F6:BE:7B:91:BF:BB:7C:8F:64:E7:5E:40:ED:A2:C1:DD:63:BC:43:D6 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4496: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153569 (0x13bd00a1) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:32:28 2017 Not After : Thu Mar 31 16:32:28 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 79:6e:ac:ae:55:e0:9a:ec:0b:d0:56:c9:0e:25:b8:d4: 35:5f:e5:d6:99:7b:cb:58:1b:71:4f:b8:1a:8f:0a:76: e7:78:f5:17:26:75:ed:d7:ae:5f:3a:d9:81:1e:c3:8a: fc:db:a1:e2:b7:0a:94:bb:8d:fb:33:ac:1e:94:5d:0b: 99:43:24:1e:27:2a:a7:41:38:59:b6:5b:35:88:d7:fc: 43:8c:f5:9c:b9:69:1f:18:21:0a:d5:d9:48:d1:da:1f: 41:2f:b8:3d:c9:5f:d2:aa:23:8a:c4:69:9b:38:d0:1c: e2:12:12:c6:d2:38:25:34:1f:2a:d3:95:ae:dd:95:b8: bd:22:2e:3d:08:c2:e4:5b:a3:58:44:8b:16:e1:85:0d: 80:12:47:16:9f:21:41:72:a2:01:20:89:51:db:6d:9c: d4:0a:78:0d:01:e3:17:79:ae:b2:bf:72:fd:fd:9e:3a: d3:90:ff:bb:60:e7:1c:7d:49:70:a8:de:32:ce:31:7c: 38:f0:18:4f:10:14:7c:9a:ca:41:99:55:e6:4d:90:cd: c4:1b:e6:0a:77:39:df:4e:9e:10:ac:9c:e7:a3:a2:e8: 7f:e2:a9:42:80:18:06:bb:9d:5e:39:5d:50:e0:f6:ca: 77:28:b8:5e:33:38:cb:20:29:87:05:1d:ba:d5:3b:59 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:1e:43:d5:68:56:a5:fa:a8:84:1e:d1:68: 4e:d1:ca:47:ec:97:b2:73:bf:95:e3:05:92:be:bf:b2: 02:1d:00:8f:b0:53:6f:5a:37:3e:2b:c5:5f:39:d1:76: 6c:58:f9:33:d7:14:1e:eb:91:5d:e0:03:9a:de:7e Fingerprint (SHA-256): E5:96:E5:87:FB:07:B5:D0:E5:DE:E2:27:BA:FD:D0:BE:64:F3:7F:E7:47:8D:F5:FE:2C:E2:0E:FD:34:ED:8D:36 Fingerprint (SHA1): F6:BE:7B:91:BF:BB:7C:8F:64:E7:5E:40:ED:A2:C1:DD:63:BC:43:D6 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #4497: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153569 (0x13bd00a1) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:32:28 2017 Not After : Thu Mar 31 16:32:28 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 79:6e:ac:ae:55:e0:9a:ec:0b:d0:56:c9:0e:25:b8:d4: 35:5f:e5:d6:99:7b:cb:58:1b:71:4f:b8:1a:8f:0a:76: e7:78:f5:17:26:75:ed:d7:ae:5f:3a:d9:81:1e:c3:8a: fc:db:a1:e2:b7:0a:94:bb:8d:fb:33:ac:1e:94:5d:0b: 99:43:24:1e:27:2a:a7:41:38:59:b6:5b:35:88:d7:fc: 43:8c:f5:9c:b9:69:1f:18:21:0a:d5:d9:48:d1:da:1f: 41:2f:b8:3d:c9:5f:d2:aa:23:8a:c4:69:9b:38:d0:1c: e2:12:12:c6:d2:38:25:34:1f:2a:d3:95:ae:dd:95:b8: bd:22:2e:3d:08:c2:e4:5b:a3:58:44:8b:16:e1:85:0d: 80:12:47:16:9f:21:41:72:a2:01:20:89:51:db:6d:9c: d4:0a:78:0d:01:e3:17:79:ae:b2:bf:72:fd:fd:9e:3a: d3:90:ff:bb:60:e7:1c:7d:49:70:a8:de:32:ce:31:7c: 38:f0:18:4f:10:14:7c:9a:ca:41:99:55:e6:4d:90:cd: c4:1b:e6:0a:77:39:df:4e:9e:10:ac:9c:e7:a3:a2:e8: 7f:e2:a9:42:80:18:06:bb:9d:5e:39:5d:50:e0:f6:ca: 77:28:b8:5e:33:38:cb:20:29:87:05:1d:ba:d5:3b:59 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:1e:43:d5:68:56:a5:fa:a8:84:1e:d1:68: 4e:d1:ca:47:ec:97:b2:73:bf:95:e3:05:92:be:bf:b2: 02:1d:00:8f:b0:53:6f:5a:37:3e:2b:c5:5f:39:d1:76: 6c:58:f9:33:d7:14:1e:eb:91:5d:e0:03:9a:de:7e Fingerprint (SHA-256): E5:96:E5:87:FB:07:B5:D0:E5:DE:E2:27:BA:FD:D0:BE:64:F3:7F:E7:47:8D:F5:FE:2C:E2:0E:FD:34:ED:8D:36 Fingerprint (SHA1): F6:BE:7B:91:BF:BB:7C:8F:64:E7:5E:40:ED:A2:C1:DD:63:BC:43:D6 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #4498: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4499: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4500: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4501: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #4502: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4503: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4504: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4505: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4506: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4507: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4508: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4509: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #4510: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4511: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4512: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4513: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #4514: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4515: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4516: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4517: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4518: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4519: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4520: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4521: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #4522: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4523: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4524: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4525: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170331163420Z nextupdate=20180331163420Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Mar 31 16:34:20 2017 Next Update: Sat Mar 31 16:34:20 2018 CRL Extensions: chains.sh: #4526: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331163420Z nextupdate=20180331163420Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 16:34:20 2017 Next Update: Sat Mar 31 16:34:20 2018 CRL Extensions: chains.sh: #4527: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170331163421Z nextupdate=20180331163421Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Mar 31 16:34:21 2017 Next Update: Sat Mar 31 16:34:21 2018 CRL Extensions: chains.sh: #4528: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170331163422Z nextupdate=20180331163422Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Mar 31 16:34:22 2017 Next Update: Sat Mar 31 16:34:22 2018 CRL Extensions: chains.sh: #4529: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170331163423Z addcert 14 20170331163423Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Mar 31 16:34:23 2017 Next Update: Sat Mar 31 16:34:21 2018 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Mar 31 16:34:23 2017 CRL Extensions: chains.sh: #4530: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331163424Z addcert 15 20170331163424Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 16:34:24 2017 Next Update: Sat Mar 31 16:34:20 2018 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Mar 31 16:34:24 2017 CRL Extensions: chains.sh: #4531: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4532: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4533: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #4534: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #4535: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #4536: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #4537: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #4538: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #4539: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #4540: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:33:21 2017 Not After : Thu Mar 31 16:33:21 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:f5:a0:41:46:0b:2b:a7:ab:43:11:74:41:08:32:08: fa:c4:87:5b:17:ff:c6:4e:e8:d5:38:79:bd:32:05:87: 0b:87:29:3d:1e:fe:b9:67:0b:ad:85:c8:03:42:06:c1: 0f:96:fc:38:6b:58:60:7e:4b:22:f8:33:8d:30:37:39: 92:7e:5f:ca:70:1a:81:5b:97:fd:4f:3d:06:ba:a9:7a: 80:88:15:52:38:fb:6e:d7:8c:55:dd:e7:cc:2b:8e:6b: 60:4f:8c:da:47:c7:00:b7:8c:4c:51:29:fa:4f:9b:08: f4:db:79:27:e9:37:bb:00:4e:05:d4:c9:85:f5:16:47: 0c:ea:6f:fc:57:e4:b6:13:c5:c4:21:5d:51:9a:52:36: 2c:45:24:14:39:2a:eb:4d:18:70:58:46:f8:5f:9d:10: 97:00:d0:1b:c0:68:fd:69:43:ac:11:59:c6:48:95:20: 71:52:60:3d:dd:c9:e8:6c:f3:a7:26:34:14:2f:80:28: 0e:bf:db:7e:3c:05:69:75:6d:de:a1:59:78:81:f2:5f: 7e:9a:ca:54:af:48:9b:7d:1f:c5:06:7c:b4:55:33:a4: 6d:cd:70:02:5d:d1:21:22:cb:ed:36:d0:5f:72:63:63: 40:a3:d3:5e:c4:08:3f:ad:ae:e0:2a:49:16:89:e7:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:6f:9e:9e:79:b5:c5:33:a0:ed:46:0e:78:11:98:07: 75:64:d1:da:28:b2:46:5c:bf:b7:1b:92:2d:d2:22:f1: 01:27:32:0b:4a:59:9b:0e:b5:61:7f:8d:6a:ed:7c:26: 85:c9:d2:52:f0:5b:84:00:e1:be:39:f5:bd:03:eb:96: a1:b8:90:d1:e0:bb:46:34:44:bb:76:ec:1f:d7:32:9d: 58:fc:e9:4e:b5:70:ac:3d:36:d7:0e:74:e2:3c:65:b1: 20:ca:6b:ed:38:89:35:a6:2f:eb:82:d8:39:eb:dc:55: 40:11:00:bb:29:67:fa:28:60:a7:e9:06:bd:f4:e2:92: c8:f9:a8:4e:d4:0e:56:a7:fa:f0:32:c8:45:de:6e:fc: 3b:29:c4:36:6c:5d:24:38:08:a5:2c:46:ec:ad:fa:99: 5b:17:53:81:2d:ca:3a:30:31:d8:7a:27:cf:ac:ad:26: f4:12:72:5b:90:9f:ff:20:c0:8f:31:75:8f:81:73:38: 99:0f:6e:29:eb:dc:9a:5a:7a:ee:57:de:ba:6e:eb:bd: 64:90:65:d9:1f:47:bc:88:49:46:60:8b:0b:13:61:96: d8:29:ea:d1:ca:b0:e3:e7:68:6a:51:85:b2:b1:be:17: 77:75:76:7b:24:49:7e:44:40:72:9f:3c:65:78:ad:65 Fingerprint (SHA-256): 6F:5B:54:DC:1C:07:26:A7:F2:4F:1B:1C:C6:37:00:7D:07:42:84:AB:1E:C9:C3:CF:78:C0:20:FE:9B:54:BE:05 Fingerprint (SHA1): D2:61:75:E1:69:FC:E4:11:94:12:91:F6:47:6E:E3:14:71:B1:F0:7D Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #4541: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #4542: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:33:21 2017 Not After : Thu Mar 31 16:33:21 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:f5:a0:41:46:0b:2b:a7:ab:43:11:74:41:08:32:08: fa:c4:87:5b:17:ff:c6:4e:e8:d5:38:79:bd:32:05:87: 0b:87:29:3d:1e:fe:b9:67:0b:ad:85:c8:03:42:06:c1: 0f:96:fc:38:6b:58:60:7e:4b:22:f8:33:8d:30:37:39: 92:7e:5f:ca:70:1a:81:5b:97:fd:4f:3d:06:ba:a9:7a: 80:88:15:52:38:fb:6e:d7:8c:55:dd:e7:cc:2b:8e:6b: 60:4f:8c:da:47:c7:00:b7:8c:4c:51:29:fa:4f:9b:08: f4:db:79:27:e9:37:bb:00:4e:05:d4:c9:85:f5:16:47: 0c:ea:6f:fc:57:e4:b6:13:c5:c4:21:5d:51:9a:52:36: 2c:45:24:14:39:2a:eb:4d:18:70:58:46:f8:5f:9d:10: 97:00:d0:1b:c0:68:fd:69:43:ac:11:59:c6:48:95:20: 71:52:60:3d:dd:c9:e8:6c:f3:a7:26:34:14:2f:80:28: 0e:bf:db:7e:3c:05:69:75:6d:de:a1:59:78:81:f2:5f: 7e:9a:ca:54:af:48:9b:7d:1f:c5:06:7c:b4:55:33:a4: 6d:cd:70:02:5d:d1:21:22:cb:ed:36:d0:5f:72:63:63: 40:a3:d3:5e:c4:08:3f:ad:ae:e0:2a:49:16:89:e7:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:6f:9e:9e:79:b5:c5:33:a0:ed:46:0e:78:11:98:07: 75:64:d1:da:28:b2:46:5c:bf:b7:1b:92:2d:d2:22:f1: 01:27:32:0b:4a:59:9b:0e:b5:61:7f:8d:6a:ed:7c:26: 85:c9:d2:52:f0:5b:84:00:e1:be:39:f5:bd:03:eb:96: a1:b8:90:d1:e0:bb:46:34:44:bb:76:ec:1f:d7:32:9d: 58:fc:e9:4e:b5:70:ac:3d:36:d7:0e:74:e2:3c:65:b1: 20:ca:6b:ed:38:89:35:a6:2f:eb:82:d8:39:eb:dc:55: 40:11:00:bb:29:67:fa:28:60:a7:e9:06:bd:f4:e2:92: c8:f9:a8:4e:d4:0e:56:a7:fa:f0:32:c8:45:de:6e:fc: 3b:29:c4:36:6c:5d:24:38:08:a5:2c:46:ec:ad:fa:99: 5b:17:53:81:2d:ca:3a:30:31:d8:7a:27:cf:ac:ad:26: f4:12:72:5b:90:9f:ff:20:c0:8f:31:75:8f:81:73:38: 99:0f:6e:29:eb:dc:9a:5a:7a:ee:57:de:ba:6e:eb:bd: 64:90:65:d9:1f:47:bc:88:49:46:60:8b:0b:13:61:96: d8:29:ea:d1:ca:b0:e3:e7:68:6a:51:85:b2:b1:be:17: 77:75:76:7b:24:49:7e:44:40:72:9f:3c:65:78:ad:65 Fingerprint (SHA-256): 6F:5B:54:DC:1C:07:26:A7:F2:4F:1B:1C:C6:37:00:7D:07:42:84:AB:1E:C9:C3:CF:78:C0:20:FE:9B:54:BE:05 Fingerprint (SHA1): D2:61:75:E1:69:FC:E4:11:94:12:91:F6:47:6E:E3:14:71:B1:F0:7D Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #4543: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #4544: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4545: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153578 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4546: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4547: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #4548: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4549: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 331153579 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4550: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4551: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4552: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331153350.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #4553: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331153324.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4554: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4555: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #4556: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331153350.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #4557: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 331153580 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4558: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4559: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4560: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331153350.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #4561: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331153325.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4562: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4563: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #4564: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4565: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 331153581 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4566: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4567: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4568: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331153350.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #4569: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331153326.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4570: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4571: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4572: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331153350.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #4573: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331153327.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4574: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4575: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170331163550Z nextupdate=20180331163550Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Mar 31 16:35:50 2017 Next Update: Sat Mar 31 16:35:50 2018 CRL Extensions: chains.sh: #4576: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331163551Z nextupdate=20180331163551Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 16:35:51 2017 Next Update: Sat Mar 31 16:35:51 2018 CRL Extensions: chains.sh: #4577: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170331163552Z nextupdate=20180331163552Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Mar 31 16:35:52 2017 Next Update: Sat Mar 31 16:35:52 2018 CRL Extensions: chains.sh: #4578: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170331163553Z nextupdate=20180331163553Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Mar 31 16:35:53 2017 Next Update: Sat Mar 31 16:35:53 2018 CRL Extensions: chains.sh: #4579: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331163554Z addcert 20 20170331163554Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 16:35:54 2017 Next Update: Sat Mar 31 16:35:51 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Mar 31 16:35:54 2017 CRL Extensions: chains.sh: #4580: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331163555Z addcert 40 20170331163555Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 16:35:55 2017 Next Update: Sat Mar 31 16:35:51 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Mar 31 16:35:54 2017 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Mar 31 16:35:55 2017 CRL Extensions: chains.sh: #4581: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4582: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4583: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #4584: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153578 (0x13bd00aa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:34:37 2017 Not After : Thu Mar 31 16:34:37 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:1b:fc:b4:59:71:e3:d0:b8:c7:e0:05:74:17:da:b4: 04:f5:3b:ef:20:cb:8b:1a:57:c3:e2:09:5e:a1:c7:19: b6:72:7b:fc:d2:8a:64:60:21:a6:60:41:c4:b7:79:12: a0:19:d2:d7:5f:00:74:c3:a6:76:25:e0:51:3d:02:55: de:2d:6a:62:d4:cd:85:f4:27:29:01:5d:70:18:db:54: 3e:fb:73:0f:73:98:d3:54:25:36:25:5e:e6:20:0f:e9: 92:b8:e1:d2:4e:22:52:74:a6:33:6b:dd:09:00:a8:31: 3d:3e:06:2c:6b:24:bd:3f:76:30:dd:ca:67:aa:bf:ec: 26:5d:07:e8:c2:23:46:84:53:19:02:77:db:9f:4a:bc: fa:17:a6:b1:98:ae:26:ed:01:84:3a:7e:92:8c:dd:51: 7d:20:a7:84:4e:47:8a:68:b2:5a:62:ee:2e:30:99:19: e6:3e:8e:96:67:1d:f9:e9:78:fc:a3:8e:eb:93:c7:9f: 64:4a:bb:00:d2:fc:be:db:0a:72:79:73:4e:52:d3:d9: ae:a5:9a:1b:91:9d:23:9c:7b:cc:b2:7e:43:b5:5a:a8: 14:58:a8:88:ce:40:37:0b:cf:b1:25:52:80:a8:c5:a5: 5b:a3:60:cc:a1:43:27:81:54:85:d1:2b:73:5e:ac:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: af:2d:6c:db:6e:28:71:19:74:60:9d:ed:9c:98:2a:9d: f4:c9:32:ab:55:be:b5:d8:b0:83:56:d8:56:2b:30:58: 7d:3b:ed:ce:0e:54:ce:c3:57:f2:86:ac:6d:06:04:6b: 49:44:b5:cc:c7:d9:73:93:32:a5:11:9b:71:ba:76:40: 4f:3d:2a:b6:80:9d:15:72:8a:96:6a:25:16:18:cb:7a: 53:85:0e:87:cf:b2:6d:5a:c1:a7:6a:57:ca:37:c1:2f: 51:5d:9a:2b:e6:3f:55:82:22:5f:44:d6:b5:fa:3a:63: 05:72:53:b8:09:6c:d9:f0:3f:b8:8e:2a:00:18:ba:cf: b2:d0:22:d1:ea:62:49:65:67:7f:4f:7c:0c:9b:7f:de: ef:83:f4:1c:b9:ef:f2:0d:eb:9f:03:ca:db:08:9e:92: 92:9a:63:19:bb:c6:cd:c1:97:94:fc:16:f6:97:90:16: 40:3c:81:b6:9b:d4:56:36:da:de:e3:9a:c0:85:b5:66: fa:32:79:97:fb:2f:40:7e:c5:9d:a6:e5:58:d0:4e:07: 31:eb:dd:af:9d:bd:db:03:6e:ea:6e:63:4d:4c:7d:33: 53:97:a4:e8:83:bf:18:60:ac:cd:3c:0b:81:1e:c4:73: aa:44:6b:93:89:36:94:e1:7d:03:ad:85:13:a7:2d:46 Fingerprint (SHA-256): 92:93:5F:87:E8:13:8C:DB:DB:8A:E0:41:0C:A1:C0:C1:31:34:A7:6E:21:0E:79:F5:37:80:5D:90:DC:1B:16:E1 Fingerprint (SHA1): A8:EA:7C:77:1C:83:C3:62:DE:E8:9C:68:D1:26:A4:55:1E:A9:71:13 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #4585: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #4586: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153578 (0x13bd00aa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 16:34:37 2017 Not After : Thu Mar 31 16:34:37 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:1b:fc:b4:59:71:e3:d0:b8:c7:e0:05:74:17:da:b4: 04:f5:3b:ef:20:cb:8b:1a:57:c3:e2:09:5e:a1:c7:19: b6:72:7b:fc:d2:8a:64:60:21:a6:60:41:c4:b7:79:12: a0:19:d2:d7:5f:00:74:c3:a6:76:25:e0:51:3d:02:55: de:2d:6a:62:d4:cd:85:f4:27:29:01:5d:70:18:db:54: 3e:fb:73:0f:73:98:d3:54:25:36:25:5e:e6:20:0f:e9: 92:b8:e1:d2:4e:22:52:74:a6:33:6b:dd:09:00:a8:31: 3d:3e:06:2c:6b:24:bd:3f:76:30:dd:ca:67:aa:bf:ec: 26:5d:07:e8:c2:23:46:84:53:19:02:77:db:9f:4a:bc: fa:17:a6:b1:98:ae:26:ed:01:84:3a:7e:92:8c:dd:51: 7d:20:a7:84:4e:47:8a:68:b2:5a:62:ee:2e:30:99:19: e6:3e:8e:96:67:1d:f9:e9:78:fc:a3:8e:eb:93:c7:9f: 64:4a:bb:00:d2:fc:be:db:0a:72:79:73:4e:52:d3:d9: ae:a5:9a:1b:91:9d:23:9c:7b:cc:b2:7e:43:b5:5a:a8: 14:58:a8:88:ce:40:37:0b:cf:b1:25:52:80:a8:c5:a5: 5b:a3:60:cc:a1:43:27:81:54:85:d1:2b:73:5e:ac:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: af:2d:6c:db:6e:28:71:19:74:60:9d:ed:9c:98:2a:9d: f4:c9:32:ab:55:be:b5:d8:b0:83:56:d8:56:2b:30:58: 7d:3b:ed:ce:0e:54:ce:c3:57:f2:86:ac:6d:06:04:6b: 49:44:b5:cc:c7:d9:73:93:32:a5:11:9b:71:ba:76:40: 4f:3d:2a:b6:80:9d:15:72:8a:96:6a:25:16:18:cb:7a: 53:85:0e:87:cf:b2:6d:5a:c1:a7:6a:57:ca:37:c1:2f: 51:5d:9a:2b:e6:3f:55:82:22:5f:44:d6:b5:fa:3a:63: 05:72:53:b8:09:6c:d9:f0:3f:b8:8e:2a:00:18:ba:cf: b2:d0:22:d1:ea:62:49:65:67:7f:4f:7c:0c:9b:7f:de: ef:83:f4:1c:b9:ef:f2:0d:eb:9f:03:ca:db:08:9e:92: 92:9a:63:19:bb:c6:cd:c1:97:94:fc:16:f6:97:90:16: 40:3c:81:b6:9b:d4:56:36:da:de:e3:9a:c0:85:b5:66: fa:32:79:97:fb:2f:40:7e:c5:9d:a6:e5:58:d0:4e:07: 31:eb:dd:af:9d:bd:db:03:6e:ea:6e:63:4d:4c:7d:33: 53:97:a4:e8:83:bf:18:60:ac:cd:3c:0b:81:1e:c4:73: aa:44:6b:93:89:36:94:e1:7d:03:ad:85:13:a7:2d:46 Fingerprint (SHA-256): 92:93:5F:87:E8:13:8C:DB:DB:8A:E0:41:0C:A1:C0:C1:31:34:A7:6E:21:0E:79:F5:37:80:5D:90:DC:1B:16:E1 Fingerprint (SHA1): A8:EA:7C:77:1C:83:C3:62:DE:E8:9C:68:D1:26:A4:55:1E:A9:71:13 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #4587: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #4588: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #4589: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153582 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4590: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #4591: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4592: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4593: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 331153583 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4594: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4595: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4596: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4597: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331153584 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4598: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4599: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4600: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4601: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 331153585 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4602: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4603: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #4604: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -m 331153586 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4605: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #4606: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #4607: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4608: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 331153587 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4609: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4610: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4611: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4612: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 331153588 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4613: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4614: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #4615: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #4616: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #4617: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153582 (0x13bd00ae) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:36:10 2017 Not After : Thu Mar 31 16:36:10 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:23:95:1d:0f:46:33:9a:ad:d7:99:b2:57:35:7b:b9: 4e:a0:19:fe:03:93:74:10:bc:fa:20:c0:64:dd:bd:91: 47:1d:7e:47:de:d1:8e:90:51:1b:e3:50:3e:f8:72:5d: 25:93:77:70:e6:17:fb:48:a6:dd:f2:8f:da:b3:20:83: ca:0d:ae:95:6f:b7:00:38:f0:4a:b8:86:77:0c:d2:2e: e5:2d:f7:1f:09:fb:6f:c7:1d:e4:89:94:2f:f1:ed:cd: 36:60:75:1a:60:43:40:57:1c:9a:9d:92:c1:de:42:77: ca:b3:ef:08:b0:d6:c3:6a:fd:32:9d:ee:0f:42:37:e6: 10:b3:69:de:b6:2c:48:2e:25:2c:fe:8c:f1:ad:49:1d: dc:f5:4e:7f:04:30:48:06:2a:c3:1a:3b:d6:20:0f:71: 9c:40:df:14:c0:bb:ea:20:ba:e0:11:87:fb:a8:e8:56: 25:51:2f:55:e0:2b:13:16:c7:35:13:b3:bf:00:32:3f: e8:5a:63:c9:a8:10:15:78:9c:0b:57:07:67:8e:e3:42: db:84:1b:e7:32:f0:38:31:a8:3b:39:a3:7a:7b:3b:63: 9f:14:dc:9f:cf:bf:32:79:d4:01:b1:90:95:9c:ad:26: a1:9e:6d:30:e1:21:d4:a8:67:b8:57:9f:c0:57:93:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:f1:b4:65:13:c7:cb:70:09:88:29:19:3e:7a:cc:eb: fe:b9:d7:f7:d6:9f:11:4c:30:59:a9:08:e4:06:1c:bd: e5:19:0e:82:a0:86:5b:02:07:3a:e0:b3:4f:72:16:2a: 04:6e:35:c8:e7:71:86:92:2e:32:59:f1:1f:d3:21:95: 8e:7c:84:64:44:06:d8:c1:e2:aa:10:ee:25:87:e7:da: 38:c6:cd:3c:aa:28:06:16:e7:a7:c1:7c:d2:5d:29:c4: 9c:50:d9:16:18:58:72:49:6f:ca:ea:9c:9a:af:31:95: 00:e6:e2:b6:d6:28:61:0c:3f:1d:bc:5d:44:16:c1:34: 95:54:38:c7:d3:36:c9:9a:a1:7d:6b:0d:b3:23:d9:2c: fc:70:55:a5:a4:9a:c9:8f:cc:99:77:6a:8b:db:1d:0a: c4:ef:c3:15:16:4b:96:91:0e:b4:c8:11:64:0a:c0:b2: 90:29:41:8e:60:94:43:c9:42:6e:48:43:13:71:92:b3: 20:c2:ac:50:44:45:1e:01:8e:c1:e3:70:1e:b8:4d:2e: f9:8a:38:ad:ce:4a:8c:03:36:9c:7d:00:41:82:9e:57: 46:88:96:16:d4:fd:82:5e:16:2f:f6:4a:4a:1d:93:05: c2:23:27:33:c0:5b:5b:5d:2f:be:65:ee:01:59:7c:6a Fingerprint (SHA-256): C3:77:CF:68:A7:12:FD:CD:0F:1B:3C:15:2F:EB:38:33:37:D9:B2:09:38:33:EE:55:A6:24:F2:33:A6:C4:68:FE Fingerprint (SHA1): F1:C7:32:10:F3:4A:59:84:D0:A7:CD:D3:9A:F4:37:4B:37:39:27:C4 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4618: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153584 (0x13bd00b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 16:36:33 2017 Not After : Thu Mar 31 16:36:33 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:4e:87:4f:69:f1:2a:20:5a:fa:9c:33:ba:b4:20:ab: 10:72:55:d4:07:ae:80:64:1d:22:19:95:77:d6:b6:8f: 25:3e:cc:63:c1:87:7e:20:88:22:38:43:4b:3f:e3:c0: 5d:e3:3f:b7:61:58:b2:6c:05:fd:02:43:0d:54:f0:06: bf:6c:92:51:fd:2e:c8:39:e2:b0:03:9e:bd:8e:fa:cb: 1c:5e:cf:53:bd:75:b2:31:a7:d6:23:ea:dc:7c:46:65: b6:ca:06:bf:33:0e:2c:13:a0:51:08:7e:8f:61:b0:94: a7:57:11:97:9c:20:07:9a:ed:d8:7b:9c:06:6f:35:a6: 93:26:7b:84:e8:5f:31:e2:95:45:41:0d:26:a9:f9:4f: a1:7f:84:c8:08:bd:12:14:a3:a7:d4:fb:bb:fd:ea:d5: 99:a0:e8:22:8c:72:d4:3b:e6:d5:11:aa:c0:bb:b2:e4: ce:0b:d9:01:c3:e4:2c:63:90:17:fa:96:d5:2c:57:e9: ce:96:ea:75:9f:00:34:ea:78:c3:2f:c2:67:a3:f9:91: 76:5c:d9:31:8c:67:85:cd:52:48:cb:cd:53:4a:f0:8f: d7:2c:8e:9b:aa:94:fa:33:53:9c:e8:3d:1c:2f:fd:3a: 9f:c1:72:21:32:b5:d5:ac:70:b9:fc:f8:61:1d:39:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:c9:17:b4:72:0c:a9:cd:1a:77:00:f7:dd:61:bb:45: ab:09:cf:96:bc:1f:58:24:1b:ab:40:e8:2b:8c:0a:bd: 3e:ac:47:17:fd:8d:23:3a:f0:69:a7:38:6e:3e:ca:1f: 30:35:1c:04:82:e5:f5:b9:3c:61:0f:68:36:56:95:c5: da:8d:78:17:80:2f:df:24:cd:a8:70:be:64:f0:16:ff: a7:15:7f:76:ce:41:42:d7:4e:61:74:4f:9f:58:dc:5e: 5c:c4:3a:04:eb:40:0b:c5:d2:97:33:fd:54:87:4f:f3: 8c:6c:13:a8:31:a6:52:59:2e:0d:0e:85:2b:35:7c:e3: 65:99:eb:eb:fe:03:1d:a8:30:80:07:5d:14:eb:58:2c: 2d:b1:88:e4:bb:b8:d3:41:ee:84:4a:d0:28:9a:b0:b2: 25:83:39:42:27:d3:ac:1e:8f:3d:2c:72:b2:b1:25:bc: e8:f2:fd:78:68:c4:84:ca:d0:40:72:18:ec:8f:f4:dc: ee:69:ca:41:90:97:0b:74:b8:1b:6f:28:87:35:48:a0: 07:9e:1a:e1:f5:15:c2:f7:77:31:49:b7:c2:fa:a9:07: 1d:c0:db:9f:38:ba:5e:79:37:f6:bd:ba:7b:66:93:a4: c1:10:27:1d:a8:cd:a0:4e:d3:7d:12:f6:3f:de:96:0b Fingerprint (SHA-256): 22:CE:C2:D3:C5:BE:DB:00:DC:B8:E3:6E:CA:FE:EA:1D:D5:34:86:92:64:8D:E1:6E:7B:00:D9:9A:57:96:CB:F0 Fingerprint (SHA1): B4:FB:AA:E5:61:24:2A:64:6F:A5:A3:8E:18:8F:7B:AB:60:4D:90:76 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #4619: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153582 (0x13bd00ae) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:36:10 2017 Not After : Thu Mar 31 16:36:10 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:23:95:1d:0f:46:33:9a:ad:d7:99:b2:57:35:7b:b9: 4e:a0:19:fe:03:93:74:10:bc:fa:20:c0:64:dd:bd:91: 47:1d:7e:47:de:d1:8e:90:51:1b:e3:50:3e:f8:72:5d: 25:93:77:70:e6:17:fb:48:a6:dd:f2:8f:da:b3:20:83: ca:0d:ae:95:6f:b7:00:38:f0:4a:b8:86:77:0c:d2:2e: e5:2d:f7:1f:09:fb:6f:c7:1d:e4:89:94:2f:f1:ed:cd: 36:60:75:1a:60:43:40:57:1c:9a:9d:92:c1:de:42:77: ca:b3:ef:08:b0:d6:c3:6a:fd:32:9d:ee:0f:42:37:e6: 10:b3:69:de:b6:2c:48:2e:25:2c:fe:8c:f1:ad:49:1d: dc:f5:4e:7f:04:30:48:06:2a:c3:1a:3b:d6:20:0f:71: 9c:40:df:14:c0:bb:ea:20:ba:e0:11:87:fb:a8:e8:56: 25:51:2f:55:e0:2b:13:16:c7:35:13:b3:bf:00:32:3f: e8:5a:63:c9:a8:10:15:78:9c:0b:57:07:67:8e:e3:42: db:84:1b:e7:32:f0:38:31:a8:3b:39:a3:7a:7b:3b:63: 9f:14:dc:9f:cf:bf:32:79:d4:01:b1:90:95:9c:ad:26: a1:9e:6d:30:e1:21:d4:a8:67:b8:57:9f:c0:57:93:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:f1:b4:65:13:c7:cb:70:09:88:29:19:3e:7a:cc:eb: fe:b9:d7:f7:d6:9f:11:4c:30:59:a9:08:e4:06:1c:bd: e5:19:0e:82:a0:86:5b:02:07:3a:e0:b3:4f:72:16:2a: 04:6e:35:c8:e7:71:86:92:2e:32:59:f1:1f:d3:21:95: 8e:7c:84:64:44:06:d8:c1:e2:aa:10:ee:25:87:e7:da: 38:c6:cd:3c:aa:28:06:16:e7:a7:c1:7c:d2:5d:29:c4: 9c:50:d9:16:18:58:72:49:6f:ca:ea:9c:9a:af:31:95: 00:e6:e2:b6:d6:28:61:0c:3f:1d:bc:5d:44:16:c1:34: 95:54:38:c7:d3:36:c9:9a:a1:7d:6b:0d:b3:23:d9:2c: fc:70:55:a5:a4:9a:c9:8f:cc:99:77:6a:8b:db:1d:0a: c4:ef:c3:15:16:4b:96:91:0e:b4:c8:11:64:0a:c0:b2: 90:29:41:8e:60:94:43:c9:42:6e:48:43:13:71:92:b3: 20:c2:ac:50:44:45:1e:01:8e:c1:e3:70:1e:b8:4d:2e: f9:8a:38:ad:ce:4a:8c:03:36:9c:7d:00:41:82:9e:57: 46:88:96:16:d4:fd:82:5e:16:2f:f6:4a:4a:1d:93:05: c2:23:27:33:c0:5b:5b:5d:2f:be:65:ee:01:59:7c:6a Fingerprint (SHA-256): C3:77:CF:68:A7:12:FD:CD:0F:1B:3C:15:2F:EB:38:33:37:D9:B2:09:38:33:EE:55:A6:24:F2:33:A6:C4:68:FE Fingerprint (SHA1): F1:C7:32:10:F3:4A:59:84:D0:A7:CD:D3:9A:F4:37:4B:37:39:27:C4 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4620: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #4621: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153582 (0x13bd00ae) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:36:10 2017 Not After : Thu Mar 31 16:36:10 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:23:95:1d:0f:46:33:9a:ad:d7:99:b2:57:35:7b:b9: 4e:a0:19:fe:03:93:74:10:bc:fa:20:c0:64:dd:bd:91: 47:1d:7e:47:de:d1:8e:90:51:1b:e3:50:3e:f8:72:5d: 25:93:77:70:e6:17:fb:48:a6:dd:f2:8f:da:b3:20:83: ca:0d:ae:95:6f:b7:00:38:f0:4a:b8:86:77:0c:d2:2e: e5:2d:f7:1f:09:fb:6f:c7:1d:e4:89:94:2f:f1:ed:cd: 36:60:75:1a:60:43:40:57:1c:9a:9d:92:c1:de:42:77: ca:b3:ef:08:b0:d6:c3:6a:fd:32:9d:ee:0f:42:37:e6: 10:b3:69:de:b6:2c:48:2e:25:2c:fe:8c:f1:ad:49:1d: dc:f5:4e:7f:04:30:48:06:2a:c3:1a:3b:d6:20:0f:71: 9c:40:df:14:c0:bb:ea:20:ba:e0:11:87:fb:a8:e8:56: 25:51:2f:55:e0:2b:13:16:c7:35:13:b3:bf:00:32:3f: e8:5a:63:c9:a8:10:15:78:9c:0b:57:07:67:8e:e3:42: db:84:1b:e7:32:f0:38:31:a8:3b:39:a3:7a:7b:3b:63: 9f:14:dc:9f:cf:bf:32:79:d4:01:b1:90:95:9c:ad:26: a1:9e:6d:30:e1:21:d4:a8:67:b8:57:9f:c0:57:93:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:f1:b4:65:13:c7:cb:70:09:88:29:19:3e:7a:cc:eb: fe:b9:d7:f7:d6:9f:11:4c:30:59:a9:08:e4:06:1c:bd: e5:19:0e:82:a0:86:5b:02:07:3a:e0:b3:4f:72:16:2a: 04:6e:35:c8:e7:71:86:92:2e:32:59:f1:1f:d3:21:95: 8e:7c:84:64:44:06:d8:c1:e2:aa:10:ee:25:87:e7:da: 38:c6:cd:3c:aa:28:06:16:e7:a7:c1:7c:d2:5d:29:c4: 9c:50:d9:16:18:58:72:49:6f:ca:ea:9c:9a:af:31:95: 00:e6:e2:b6:d6:28:61:0c:3f:1d:bc:5d:44:16:c1:34: 95:54:38:c7:d3:36:c9:9a:a1:7d:6b:0d:b3:23:d9:2c: fc:70:55:a5:a4:9a:c9:8f:cc:99:77:6a:8b:db:1d:0a: c4:ef:c3:15:16:4b:96:91:0e:b4:c8:11:64:0a:c0:b2: 90:29:41:8e:60:94:43:c9:42:6e:48:43:13:71:92:b3: 20:c2:ac:50:44:45:1e:01:8e:c1:e3:70:1e:b8:4d:2e: f9:8a:38:ad:ce:4a:8c:03:36:9c:7d:00:41:82:9e:57: 46:88:96:16:d4:fd:82:5e:16:2f:f6:4a:4a:1d:93:05: c2:23:27:33:c0:5b:5b:5d:2f:be:65:ee:01:59:7c:6a Fingerprint (SHA-256): C3:77:CF:68:A7:12:FD:CD:0F:1B:3C:15:2F:EB:38:33:37:D9:B2:09:38:33:EE:55:A6:24:F2:33:A6:C4:68:FE Fingerprint (SHA1): F1:C7:32:10:F3:4A:59:84:D0:A7:CD:D3:9A:F4:37:4B:37:39:27:C4 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4622: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153584 (0x13bd00b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 16:36:33 2017 Not After : Thu Mar 31 16:36:33 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:4e:87:4f:69:f1:2a:20:5a:fa:9c:33:ba:b4:20:ab: 10:72:55:d4:07:ae:80:64:1d:22:19:95:77:d6:b6:8f: 25:3e:cc:63:c1:87:7e:20:88:22:38:43:4b:3f:e3:c0: 5d:e3:3f:b7:61:58:b2:6c:05:fd:02:43:0d:54:f0:06: bf:6c:92:51:fd:2e:c8:39:e2:b0:03:9e:bd:8e:fa:cb: 1c:5e:cf:53:bd:75:b2:31:a7:d6:23:ea:dc:7c:46:65: b6:ca:06:bf:33:0e:2c:13:a0:51:08:7e:8f:61:b0:94: a7:57:11:97:9c:20:07:9a:ed:d8:7b:9c:06:6f:35:a6: 93:26:7b:84:e8:5f:31:e2:95:45:41:0d:26:a9:f9:4f: a1:7f:84:c8:08:bd:12:14:a3:a7:d4:fb:bb:fd:ea:d5: 99:a0:e8:22:8c:72:d4:3b:e6:d5:11:aa:c0:bb:b2:e4: ce:0b:d9:01:c3:e4:2c:63:90:17:fa:96:d5:2c:57:e9: ce:96:ea:75:9f:00:34:ea:78:c3:2f:c2:67:a3:f9:91: 76:5c:d9:31:8c:67:85:cd:52:48:cb:cd:53:4a:f0:8f: d7:2c:8e:9b:aa:94:fa:33:53:9c:e8:3d:1c:2f:fd:3a: 9f:c1:72:21:32:b5:d5:ac:70:b9:fc:f8:61:1d:39:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:c9:17:b4:72:0c:a9:cd:1a:77:00:f7:dd:61:bb:45: ab:09:cf:96:bc:1f:58:24:1b:ab:40:e8:2b:8c:0a:bd: 3e:ac:47:17:fd:8d:23:3a:f0:69:a7:38:6e:3e:ca:1f: 30:35:1c:04:82:e5:f5:b9:3c:61:0f:68:36:56:95:c5: da:8d:78:17:80:2f:df:24:cd:a8:70:be:64:f0:16:ff: a7:15:7f:76:ce:41:42:d7:4e:61:74:4f:9f:58:dc:5e: 5c:c4:3a:04:eb:40:0b:c5:d2:97:33:fd:54:87:4f:f3: 8c:6c:13:a8:31:a6:52:59:2e:0d:0e:85:2b:35:7c:e3: 65:99:eb:eb:fe:03:1d:a8:30:80:07:5d:14:eb:58:2c: 2d:b1:88:e4:bb:b8:d3:41:ee:84:4a:d0:28:9a:b0:b2: 25:83:39:42:27:d3:ac:1e:8f:3d:2c:72:b2:b1:25:bc: e8:f2:fd:78:68:c4:84:ca:d0:40:72:18:ec:8f:f4:dc: ee:69:ca:41:90:97:0b:74:b8:1b:6f:28:87:35:48:a0: 07:9e:1a:e1:f5:15:c2:f7:77:31:49:b7:c2:fa:a9:07: 1d:c0:db:9f:38:ba:5e:79:37:f6:bd:ba:7b:66:93:a4: c1:10:27:1d:a8:cd:a0:4e:d3:7d:12:f6:3f:de:96:0b Fingerprint (SHA-256): 22:CE:C2:D3:C5:BE:DB:00:DC:B8:E3:6E:CA:FE:EA:1D:D5:34:86:92:64:8D:E1:6E:7B:00:D9:9A:57:96:CB:F0 Fingerprint (SHA1): B4:FB:AA:E5:61:24:2A:64:6F:A5:A3:8E:18:8F:7B:AB:60:4D:90:76 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #4623: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #4624: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #4625: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #4626: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153582 (0x13bd00ae) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:36:10 2017 Not After : Thu Mar 31 16:36:10 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:23:95:1d:0f:46:33:9a:ad:d7:99:b2:57:35:7b:b9: 4e:a0:19:fe:03:93:74:10:bc:fa:20:c0:64:dd:bd:91: 47:1d:7e:47:de:d1:8e:90:51:1b:e3:50:3e:f8:72:5d: 25:93:77:70:e6:17:fb:48:a6:dd:f2:8f:da:b3:20:83: ca:0d:ae:95:6f:b7:00:38:f0:4a:b8:86:77:0c:d2:2e: e5:2d:f7:1f:09:fb:6f:c7:1d:e4:89:94:2f:f1:ed:cd: 36:60:75:1a:60:43:40:57:1c:9a:9d:92:c1:de:42:77: ca:b3:ef:08:b0:d6:c3:6a:fd:32:9d:ee:0f:42:37:e6: 10:b3:69:de:b6:2c:48:2e:25:2c:fe:8c:f1:ad:49:1d: dc:f5:4e:7f:04:30:48:06:2a:c3:1a:3b:d6:20:0f:71: 9c:40:df:14:c0:bb:ea:20:ba:e0:11:87:fb:a8:e8:56: 25:51:2f:55:e0:2b:13:16:c7:35:13:b3:bf:00:32:3f: e8:5a:63:c9:a8:10:15:78:9c:0b:57:07:67:8e:e3:42: db:84:1b:e7:32:f0:38:31:a8:3b:39:a3:7a:7b:3b:63: 9f:14:dc:9f:cf:bf:32:79:d4:01:b1:90:95:9c:ad:26: a1:9e:6d:30:e1:21:d4:a8:67:b8:57:9f:c0:57:93:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:f1:b4:65:13:c7:cb:70:09:88:29:19:3e:7a:cc:eb: fe:b9:d7:f7:d6:9f:11:4c:30:59:a9:08:e4:06:1c:bd: e5:19:0e:82:a0:86:5b:02:07:3a:e0:b3:4f:72:16:2a: 04:6e:35:c8:e7:71:86:92:2e:32:59:f1:1f:d3:21:95: 8e:7c:84:64:44:06:d8:c1:e2:aa:10:ee:25:87:e7:da: 38:c6:cd:3c:aa:28:06:16:e7:a7:c1:7c:d2:5d:29:c4: 9c:50:d9:16:18:58:72:49:6f:ca:ea:9c:9a:af:31:95: 00:e6:e2:b6:d6:28:61:0c:3f:1d:bc:5d:44:16:c1:34: 95:54:38:c7:d3:36:c9:9a:a1:7d:6b:0d:b3:23:d9:2c: fc:70:55:a5:a4:9a:c9:8f:cc:99:77:6a:8b:db:1d:0a: c4:ef:c3:15:16:4b:96:91:0e:b4:c8:11:64:0a:c0:b2: 90:29:41:8e:60:94:43:c9:42:6e:48:43:13:71:92:b3: 20:c2:ac:50:44:45:1e:01:8e:c1:e3:70:1e:b8:4d:2e: f9:8a:38:ad:ce:4a:8c:03:36:9c:7d:00:41:82:9e:57: 46:88:96:16:d4:fd:82:5e:16:2f:f6:4a:4a:1d:93:05: c2:23:27:33:c0:5b:5b:5d:2f:be:65:ee:01:59:7c:6a Fingerprint (SHA-256): C3:77:CF:68:A7:12:FD:CD:0F:1B:3C:15:2F:EB:38:33:37:D9:B2:09:38:33:EE:55:A6:24:F2:33:A6:C4:68:FE Fingerprint (SHA1): F1:C7:32:10:F3:4A:59:84:D0:A7:CD:D3:9A:F4:37:4B:37:39:27:C4 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4627: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153586 (0x13bd00b2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Mar 31 16:36:59 2017 Not After : Thu Mar 31 16:36:59 2067 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:91:40:a3:4e:8d:ea:a1:a8:bf:b9:52:a8:58:3b:e0: d3:7d:05:0b:e1:63:b9:24:22:f1:dc:25:16:b5:3f:4f: 12:1a:4e:d9:2f:41:58:73:63:60:13:7f:f7:49:eb:c4: 1d:4e:96:90:fc:79:f6:de:b2:83:07:52:fa:97:d5:dc: 13:38:18:5c:f5:c6:9d:76:fe:59:93:a3:81:21:b9:e1: 80:e1:76:03:cd:21:23:a7:de:7b:c3:f8:59:98:78:81: 0d:72:ed:3b:da:cc:38:b8:cb:89:48:ef:73:5f:00:ae: 3c:a6:95:34:a8:0d:c6:4a:6b:4e:fd:1d:0a:4c:72:63: 87:ec:c2:20:50:90:ad:bd:ed:44:f0:01:0c:0d:be:b2: 1e:5b:15:4d:20:1e:0c:92:d4:66:d3:43:2a:39:18:e3: 4f:49:4e:89:fd:6e:5e:bb:6d:dd:f8:93:7b:e1:31:82: 6c:18:c0:1c:9f:f8:e7:d7:64:0e:8d:19:1e:97:af:6d: 7c:07:ba:07:be:3f:9b:86:fc:e6:f9:3b:c2:3b:11:4a: 37:21:3a:39:d1:21:d3:85:5c:94:be:eb:0c:6d:8a:b1: c3:11:21:64:2d:18:a3:94:b0:a8:5d:9e:33:27:a2:68: 14:ba:88:3c:2c:69:fb:b5:6a:30:ed:96:5f:d0:76:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:a2:43:cd:65:cd:9e:f0:90:6f:30:2b:8a:3c:e3:93: f7:0c:81:ee:d0:f4:f0:39:6a:d4:8e:fd:8e:fa:8d:68: 64:eb:e2:73:a9:b7:13:a4:76:ed:39:83:66:ea:7a:8c: 91:e9:07:1d:15:0f:62:32:aa:d7:fc:c7:6c:3f:61:90: f6:cd:de:4d:6b:08:db:08:60:17:a9:73:13:8e:d9:3e: 16:5a:b2:e4:9f:94:47:89:c8:90:3c:84:3c:f3:67:53: 2e:eb:8e:35:ac:6c:c9:02:60:ce:d2:50:47:e5:98:f8: 73:36:56:0c:97:2b:10:9d:99:5c:a6:0c:09:ec:5b:5c: 13:45:67:9f:af:de:89:82:e1:c7:0f:5b:99:c9:48:61: 41:b4:ec:d0:7d:b7:b3:ee:f8:ea:17:c1:98:4c:18:09: 69:57:f3:98:23:ea:f3:fd:01:fa:8a:02:3b:2f:eb:d7: 38:72:70:cd:b8:27:d9:76:5b:08:04:73:4e:1c:20:6d: 2e:32:5b:74:ff:d7:97:d3:ba:67:db:47:ce:ed:b4:66: d5:a5:26:4c:09:51:e9:48:dd:47:c8:4f:b2:70:db:91: 3e:38:9e:3c:97:61:8a:25:cb:ab:6f:77:13:a4:6a:b1: 4c:94:2e:49:54:59:df:01:28:0a:17:35:9d:4e:d7:52 Fingerprint (SHA-256): 52:1F:C7:A1:04:56:7C:02:18:03:F4:5A:99:81:9F:E7:C2:AE:AF:F4:82:BC:1F:9C:2F:56:9A:F3:BA:DA:05:19 Fingerprint (SHA1): C9:F1:3D:72:94:30:39:BE:A0:9E:5F:C9:D5:69:7A:CC:9C:66:AF:C2 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #4628: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153582 (0x13bd00ae) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 16:36:10 2017 Not After : Thu Mar 31 16:36:10 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:23:95:1d:0f:46:33:9a:ad:d7:99:b2:57:35:7b:b9: 4e:a0:19:fe:03:93:74:10:bc:fa:20:c0:64:dd:bd:91: 47:1d:7e:47:de:d1:8e:90:51:1b:e3:50:3e:f8:72:5d: 25:93:77:70:e6:17:fb:48:a6:dd:f2:8f:da:b3:20:83: ca:0d:ae:95:6f:b7:00:38:f0:4a:b8:86:77:0c:d2:2e: e5:2d:f7:1f:09:fb:6f:c7:1d:e4:89:94:2f:f1:ed:cd: 36:60:75:1a:60:43:40:57:1c:9a:9d:92:c1:de:42:77: ca:b3:ef:08:b0:d6:c3:6a:fd:32:9d:ee:0f:42:37:e6: 10:b3:69:de:b6:2c:48:2e:25:2c:fe:8c:f1:ad:49:1d: dc:f5:4e:7f:04:30:48:06:2a:c3:1a:3b:d6:20:0f:71: 9c:40:df:14:c0:bb:ea:20:ba:e0:11:87:fb:a8:e8:56: 25:51:2f:55:e0:2b:13:16:c7:35:13:b3:bf:00:32:3f: e8:5a:63:c9:a8:10:15:78:9c:0b:57:07:67:8e:e3:42: db:84:1b:e7:32:f0:38:31:a8:3b:39:a3:7a:7b:3b:63: 9f:14:dc:9f:cf:bf:32:79:d4:01:b1:90:95:9c:ad:26: a1:9e:6d:30:e1:21:d4:a8:67:b8:57:9f:c0:57:93:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:f1:b4:65:13:c7:cb:70:09:88:29:19:3e:7a:cc:eb: fe:b9:d7:f7:d6:9f:11:4c:30:59:a9:08:e4:06:1c:bd: e5:19:0e:82:a0:86:5b:02:07:3a:e0:b3:4f:72:16:2a: 04:6e:35:c8:e7:71:86:92:2e:32:59:f1:1f:d3:21:95: 8e:7c:84:64:44:06:d8:c1:e2:aa:10:ee:25:87:e7:da: 38:c6:cd:3c:aa:28:06:16:e7:a7:c1:7c:d2:5d:29:c4: 9c:50:d9:16:18:58:72:49:6f:ca:ea:9c:9a:af:31:95: 00:e6:e2:b6:d6:28:61:0c:3f:1d:bc:5d:44:16:c1:34: 95:54:38:c7:d3:36:c9:9a:a1:7d:6b:0d:b3:23:d9:2c: fc:70:55:a5:a4:9a:c9:8f:cc:99:77:6a:8b:db:1d:0a: c4:ef:c3:15:16:4b:96:91:0e:b4:c8:11:64:0a:c0:b2: 90:29:41:8e:60:94:43:c9:42:6e:48:43:13:71:92:b3: 20:c2:ac:50:44:45:1e:01:8e:c1:e3:70:1e:b8:4d:2e: f9:8a:38:ad:ce:4a:8c:03:36:9c:7d:00:41:82:9e:57: 46:88:96:16:d4:fd:82:5e:16:2f:f6:4a:4a:1d:93:05: c2:23:27:33:c0:5b:5b:5d:2f:be:65:ee:01:59:7c:6a Fingerprint (SHA-256): C3:77:CF:68:A7:12:FD:CD:0F:1B:3C:15:2F:EB:38:33:37:D9:B2:09:38:33:EE:55:A6:24:F2:33:A6:C4:68:FE Fingerprint (SHA1): F1:C7:32:10:F3:4A:59:84:D0:A7:CD:D3:9A:F4:37:4B:37:39:27:C4 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4629: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #4630: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #4631: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #4632: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #4633: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #4634: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331153587 (0x13bd00b3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Mar 31 16:37:11 2017 Not After : Thu Mar 31 16:37:11 2022 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:d4:39:c4:b7:bd:d0:dd:3a:0d:3d:b9:c1:fe:63:d8: c8:8d:d8:d2:11:07:96:9e:0d:75:2a:b9:86:3a:8a:3f: 81:8f:4e:ef:ae:3c:25:8e:b5:0e:f1:46:bb:c6:fa:1f: bf:d7:0e:3f:be:9c:a2:52:c1:b8:50:67:b1:9d:92:b1: 73:bd:1e:83:f9:94:0d:65:be:78:d1:b5:38:a6:b0:73: 4f:81:c0:41:e1:ca:26:6f:18:06:77:de:8e:17:70:4b: 28:06:33:84:ff:1f:c0:b3:3f:8f:f0:1a:0e:77:f8:4b: 03:67:85:3a:58:7e:55:57:aa:a6:86:80:9f:b6:07:fd: 8b:a3:8c:5f:21:2c:05:ce:8d:3a:e8:f5:a5:76:71:dc: c1:77:68:82:dd:d6:63:2e:25:db:b1:24:88:ec:29:80: c1:43:d3:a5:2d:fe:34:c7:58:9a:2e:ba:7a:32:49:2b: 93:53:e0:61:43:eb:70:3d:e8:a8:36:59:1f:25:a4:b5: f4:c0:de:5d:68:e9:2c:8e:cc:d8:f8:11:f0:bb:b8:35: 6e:62:c2:d8:23:2e:90:5c:9a:52:93:69:74:d4:74:16: 95:c6:0e:57:5f:6e:ad:30:ff:8e:25:79:15:91:a5:98: a4:e7:24:72:40:0f:5c:13:58:7d:25:51:49:f0:ec:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:0a:b1:61:47:45:56:03:ea:67:35:14:50:28:e4:11: c1:00:d0:63:59:cf:22:33:a8:9e:df:a4:ae:bb:ef:ef: ce:94:4d:a9:49:2c:a3:40:59:a4:69:d7:f4:f0:6c:73: 37:db:7b:83:e8:53:6d:9c:70:36:b9:4c:a8:76:dd:56: a1:c1:82:f0:25:7a:1d:4c:9a:79:eb:cd:b8:51:88:0e: 97:d0:98:78:46:29:7a:67:9e:cf:bf:cb:71:fd:c6:0b: 39:bb:cb:22:02:26:88:40:ef:eb:55:0c:75:b4:d3:a8: 27:12:1b:90:79:f9:8a:ed:3f:37:e3:cd:a9:49:c7:f7: 2e:67:a6:95:46:55:af:2b:e5:03:9f:c4:1e:2f:ff:13: b3:57:72:35:6f:1c:73:7a:c7:2f:e7:80:8f:6c:2a:1b: f9:c9:3e:de:03:a5:d8:53:d9:6c:1b:18:96:cb:1b:68: ea:35:60:2d:bd:81:e5:cd:f0:b3:13:7f:df:6d:ca:92: d0:39:b7:07:0f:56:0f:49:49:19:d5:d8:82:07:5c:17: 21:51:d2:6e:f0:f6:e4:97:4f:ef:0d:f8:88:df:3b:a6: 28:c4:91:d8:e8:18:4f:11:4b:2a:94:9f:e7:1e:2f:c7: 4e:66:b6:bb:d5:40:ca:b9:84:50:7b:9e:35:4d:7d:02 Fingerprint (SHA-256): 8C:DB:78:AC:82:A2:E4:AC:9D:2A:E2:62:AA:22:31:8B:3C:2A:5B:61:8B:64:9A:97:1E:80:33:01:41:0C:52:F1 Fingerprint (SHA1): 35:F1:DA:B7:4A:58:46:0E:D1:EF:59:A9:E7:78:BA:AD:4D:F6:38:E4 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #4635: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #4636: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #4637: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #4638: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #4639: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #4640: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4641: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #4642: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #4643: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4644: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #4645: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #4646: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #4647: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #4648: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4649: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #4650: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4651: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #4652: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4653: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #4654: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4655: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #4656: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4657: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #4658: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 606 at Fri Mar 31 16:37:56 UTC 2017 kill -USR1 606 httpserv: normal termination httpserv -b -p 9636 2>/dev/null; httpserv with PID 606 killed at Fri Mar 31 16:37:56 UTC 2017 TIMESTAMP chains END: Fri Mar 31 16:37:56 UTC 2017 Running tests for ec TIMESTAMP ec BEGIN: Fri Mar 31 16:37:56 UTC 2017 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Fri Mar 31 16:37:56 UTC 2017 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #4659: ec(perf) test - PASSED TIMESTAMP ecperf END: Fri Mar 31 16:37:56 UTC 2017 Running ec tests for ectest TIMESTAMP ectest BEGIN: Fri Mar 31 16:37:56 UTC 2017 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4660: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4661: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4662: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #4663: ec test certutil keygen - secp521r1 - PASSED 32 256 generic 9cefbc4485ee5ce7d10aa89a81824966a332b1aa9056851759cafdba59d38926 okay (OID 208) - PK11 test 48 384 generic 5e0e1be38f0f7deddd867f95eb4b36502c88463cd10d8d42c3d651d9e36b6ac6a03ccb886ee2854dc77f009642d03a5c okay (OID 220) - PK11 test 66 528 generic 004a8d2bbeec44515e344f210cf79d6d955be978b0a1b3875fe204a4ff5ae8d19c313a43a8b192912c59302e9a9e269c02e0a9d9aa3727a7c696595ee143897b4170 okay (OID 221) - PK11 test ectest.sh: #4664: pk11 ec tests - PASSED TIMESTAMP ectest END: Fri Mar 31 16:38:00 UTC 2017 TIMESTAMP ec END: Fri Mar 31 16:38:00 UTC 2017 Running tests for gtests TIMESTAMP gtests BEGIN: Fri Mar 31 16:38:00 UTC 2017 gtests: der_gtest pk11_gtest gtests.sh: der_gtest =============================== executing der_gtest [==========] Running 16 tests from 2 test cases. [----------] Global test environment set-up. [----------] 13 tests from DERIntegerDecodingTest [ RUN ] DERIntegerDecodingTest.DecodeLongMinus126 [ OK ] DERIntegerDecodingTest.DecodeLongMinus126 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130 [ OK ] DERIntegerDecodingTest.DecodeLong130 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130Padded [ OK ] DERIntegerDecodingTest.DecodeLong130Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong0 [ OK ] DERIntegerDecodingTest.DecodeLong0 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong1 [ OK ] DERIntegerDecodingTest.DecodeLong1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1Padded [ OK ] DERIntegerDecodingTest.DecodeLongMinus1Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMax [ OK ] DERIntegerDecodingTest.DecodeLongMax (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMin [ OK ] DERIntegerDecodingTest.DecodeLongMin (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinPlus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxPlus1 (0 ms) [----------] 13 tests from DERIntegerDecodingTest (1 ms total) [----------] 3 tests from DERPrivateKeyImportTest [ RUN ] DERPrivateKeyImportTest.ImportPrivateRSAKey [ OK ] DERPrivateKeyImportTest.ImportPrivateRSAKey (1 ms) [ RUN ] DERPrivateKeyImportTest.ImportInvalidPrivateKey [ OK ] DERPrivateKeyImportTest.ImportInvalidPrivateKey (0 ms) [ RUN ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey [ OK ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey (0 ms) [----------] 3 tests from DERPrivateKeyImportTest (2 ms total) [----------] Global test environment tear-down [==========] 16 tests from 2 test cases ran. (3 ms total) [ PASSED ] 16 tests. gtests.sh: #4665: der_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/der_gtest/report.xml executing sed to parse the xml report processing the parsed report gtests.sh: #4666: 'DERIntegerDecodingTest: DecodeLongMinus126' - PASSED gtests.sh: #4667: 'DERIntegerDecodingTest: DecodeLong130' - PASSED gtests.sh: #4668: 'DERIntegerDecodingTest: DecodeLong130Padded' - PASSED gtests.sh: #4669: 'DERIntegerDecodingTest: DecodeLong0' - PASSED gtests.sh: #4670: 'DERIntegerDecodingTest: DecodeLong1' - PASSED gtests.sh: #4671: 'DERIntegerDecodingTest: DecodeLongMinus1' - PASSED gtests.sh: #4672: 'DERIntegerDecodingTest: DecodeLongMinus1Padded' - PASSED gtests.sh: #4673: 'DERIntegerDecodingTest: DecodeLongMax' - PASSED gtests.sh: #4674: 'DERIntegerDecodingTest: DecodeLongMin' - PASSED gtests.sh: #4675: 'DERIntegerDecodingTest: DecodeLongMaxMinus1' - PASSED gtests.sh: #4676: 'DERIntegerDecodingTest: DecodeLongMinPlus1' - PASSED gtests.sh: #4677: 'DERIntegerDecodingTest: DecodeLongMinMinus1' - PASSED gtests.sh: #4678: 'DERIntegerDecodingTest: DecodeLongMaxPlus1' - PASSED gtests.sh: #4679: 'DERPrivateKeyImportTest: ImportPrivateRSAKey' - PASSED gtests.sh: #4680: 'DERPrivateKeyImportTest: ImportInvalidPrivateKey' - PASSED gtests.sh: #4681: 'DERPrivateKeyImportTest: ImportZeroLengthPrivateKey' - PASSED gtests.sh: pk11_gtest =============================== executing pk11_gtest [==========] Running 11 tests from 5 test cases. [----------] Global test environment set-up. [----------] 6 tests from Pkcs11AESKeyWrapTest [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest1 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest1 (0 ms) [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest2 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest2 (0 ms) [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest3 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest3 (1 ms) [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest4 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest4 (0 ms) [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest5 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest5 (0 ms) [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest6 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest6 (1 ms) [----------] 6 tests from Pkcs11AESKeyWrapTest (3 ms total) [----------] 1 test from Pkcs11ExportTest [ RUN ] Pkcs11ExportTest.DeriveNonExport [ OK ] Pkcs11ExportTest.DeriveNonExport (0 ms) [----------] 1 test from Pkcs11ExportTest (0 ms total) [----------] 1 test from TlsPrfTest [ RUN ] TlsPrfTest.ExtendedMsParamErr [ OK ] TlsPrfTest.ExtendedMsParamErr (0 ms) [----------] 1 test from TlsPrfTest (0 ms total) [----------] 1 test from Pkcs11RsaPssTest [ RUN ] Pkcs11RsaPssTest.GenerateAndSignAndVerify [ OK ] Pkcs11RsaPssTest.GenerateAndSignAndVerify (948 ms) [----------] 1 test from Pkcs11RsaPssTest (948 ms total) [----------] 2 tests from Pkcs11RsaPssVectorTest [ RUN ] Pkcs11RsaPssVectorTest.VerifyKnownSignature1 [ OK ] Pkcs11RsaPssVectorTest.VerifyKnownSignature1 (1 ms) [ RUN ] Pkcs11RsaPssVectorTest.VerifyKnownSignature2 [ OK ] Pkcs11RsaPssVectorTest.VerifyKnownSignature2 (1 ms) [----------] 2 tests from Pkcs11RsaPssVectorTest (4 ms total) [----------] Global test environment tear-down [==========] 11 tests from 5 test cases ran. (956 ms total) [ PASSED ] 11 tests. gtests.sh: #4682: pk11_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pk11_gtest/report.xml executing sed to parse the xml report processing the parsed report gtests.sh: #4683: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest1' - PASSED gtests.sh: #4684: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest2' - PASSED gtests.sh: #4685: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest3' - PASSED gtests.sh: #4686: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest4' - PASSED gtests.sh: #4687: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest5' - PASSED gtests.sh: #4688: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest6' - PASSED gtests.sh: #4689: 'Pkcs11ExportTest: DeriveNonExport' - PASSED gtests.sh: #4690: 'TlsPrfTest: ExtendedMsParamErr' - PASSED gtests.sh: #4691: 'Pkcs11RsaPssTest: GenerateAndSignAndVerify' - PASSED gtests.sh: #4692: 'Pkcs11RsaPssVectorTest: VerifyKnownSignature1' - PASSED gtests.sh: #4693: 'Pkcs11RsaPssVectorTest: VerifyKnownSignature2' - PASSED TIMESTAMP gtests END: Fri Mar 31 16:38:03 UTC 2017 Running tests for ssl_gtests TIMESTAMP ssl_gtests BEGIN: Fri Mar 31 16:38:03 UTC 2017 ssl_gtest.sh: SSL Gtests =============================== ssl_gtest.sh: #4694: create ssl_gtest database - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4695: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4696: create certificate: sign kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4697: create certificate: sign kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4698: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4699: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4700: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4701: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4702: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4703: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4704: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4705: create certificate: ca - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4706: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4707: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4708: create certificate: sign - PASSED executing ssl_gtest [==========] Running 785 tests from 14 test cases. [----------] Global test environment set-up. [----------] 60 tests from CipherSuiteRC4/TlsCipherSuiteTest [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/0 (69 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/1 (55 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/2 (70 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/3 (59 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/4 (62 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/5 (42 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/6 (54 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/7 (62 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/8 (56 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/9 (62 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/10 (41 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/11 (53 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/12 (63 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/13 (58 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/14 (61 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/0 (95 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/1 (103 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/2 (113 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/3 (110 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/4 (119 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/5 (95 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/6 (103 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/7 (113 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/8 (110 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/9 (120 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/10 (95 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/11 (102 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/12 (112 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/13 (109 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/14 (119 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/0 (43 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/1 (56 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/2 (66 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/3 (61 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/4 (63 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/5 (43 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/6 (57 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/7 (66 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/8 (61 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/9 (64 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/10 (43 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/11 (56 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/12 (66 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/13 (60 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/14 (62 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/0 (41 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/1 (54 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/2 (62 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/3 (59 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/4 (61 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/5 (41 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/6 (55 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/7 (64 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/8 (59 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/9 (61 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/10 (41 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/11 (54 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/12 (64 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/13 (59 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/14 (61 ms) [----------] 60 tests from CipherSuiteRC4/TlsCipherSuiteTest (4212 ms total) [----------] 48 tests from CipherSuiteAEAD12/TlsCipherSuiteTest [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/0 (41 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/1 (42 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/2 (206 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/3 (206 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/4 (66 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/5 (62 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/6 (42 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/7 (42 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/8 (205 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/9 (206 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/10 (66 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/11 (63 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/0 (94 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/1 (96 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/2 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/3 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/4 (116 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/5 (122 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/6 (95 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/7 (97 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/8 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/9 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/10 (117 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/11 (123 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/0 (43 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/1 (43 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/2 (205 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/3 (209 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/4 (68 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/5 (65 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/6 (43 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/7 (44 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/8 (209 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/9 (208 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/10 (67 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/11 (64 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/0 (41 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/1 (42 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/2 (206 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/3 (207 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/4 (66 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/5 (63 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/6 (41 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/7 (43 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/8 (203 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/9 (206 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/10 (66 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/11 (63 ms) [----------] 48 tests from CipherSuiteAEAD12/TlsCipherSuiteTest (4660 ms total) [----------] 48 tests from CipherSuiteAEAD/TlsCipherSuiteTest [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/0 (64 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/1 (65 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/2 (60 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/3 (61 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/4 (140 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/5 (141 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/6 (64 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/7 (66 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/8 (61 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/9 (62 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/10 (141 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/11 (142 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/0 (112 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/1 (110 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/2 (108 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/3 (110 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/4 (191 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/5 (199 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/6 (113 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/7 (114 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/8 (118 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/9 (119 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/10 (199 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/11 (200 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/0 (65 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/1 (66 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/2 (62 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/3 (63 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/4 (143 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/5 (144 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/6 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/6 (66 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/7 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/7 (66 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/8 (63 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/9 (64 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/10 (144 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/11 (145 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/0 (65 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/1 (65 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/2 (61 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/3 (61 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/4 (141 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/5 (142 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/6 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/6 (65 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/7 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/7 (66 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/8 (62 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/9 (62 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/10 (142 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/11 (143 ms) [----------] 48 tests from CipherSuiteAEAD/TlsCipherSuiteTest (4949 ms total) [----------] 64 tests from CipherSuiteCBC12/TlsCipherSuiteTest [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/0 (142 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/1 (42 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/2 (65 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/3 (62 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/4 (141 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/5 (42 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/6 (206 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/7 (204 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/8 (141 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/9 (42 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/10 (65 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/11 (62 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/12 (141 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/13 (41 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/14 (206 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/15 (208 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/0 (198 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/1 (95 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/2 (113 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/3 (119 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/4 (198 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/5 (95 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/6 (5 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/7 (5 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/8 (200 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/9 (97 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/10 (114 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/11 (120 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/12 (199 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/13 (96 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/14 (5 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/15 (5 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/0 (143 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/1 (44 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/2 (66 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/3 (63 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/4 (143 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/5 (44 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/6 (207 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/7 (206 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/8 (145 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/9 (44 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/10 (67 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/11 (61 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/12 (143 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/13 (44 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/14 (208 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/15 (208 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/0 (142 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/1 (42 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/2 (64 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/3 (61 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/4 (141 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/5 (42 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/6 (205 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/7 (206 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/8 (143 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/9 (42 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/10 (65 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/11 (61 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/12 (141 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/13 (42 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/14 (207 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/15 (205 ms) [----------] 64 tests from CipherSuiteCBC12/TlsCipherSuiteTest (7143 ms total) [----------] 192 tests from CipherSuiteCBCStream/TlsCipherSuiteTest [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/0 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/1 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/2 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/3 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/4 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/5 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/6 (66 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/7 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/8 (58 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/9 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/10 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/11 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/12 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/13 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/14 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/15 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/16 (53 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/17 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/18 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/19 (56 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/20 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/21 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/22 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/23 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/24 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/25 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/26 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/27 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/28 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/29 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/30 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/31 (63 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/32 (53 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/33 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/34 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/35 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/36 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/37 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/38 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/39 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/40 (58 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/41 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/42 (66 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/43 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/44 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/45 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/46 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/47 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/0 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/1 (103 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/2 (103 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/3 (104 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/4 (113 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/5 (114 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/6 (114 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/7 (112 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/8 (99 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/9 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/10 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/11 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/12 (108 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/13 (110 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/14 (111 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/15 (110 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/16 (92 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/17 (94 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/18 (94 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/19 (94 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/20 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/21 (105 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/22 (110 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/23 (114 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/24 (109 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/25 (111 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/26 (111 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/27 (110 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/28 (118 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/29 (120 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/30 (120 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/31 (120 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/32 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/33 (103 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/34 (103 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/35 (103 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/36 (110 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/37 (113 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/38 (113 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/39 (114 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/40 (108 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/41 (111 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/42 (110 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/43 (108 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/44 (117 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/45 (119 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/46 (110 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/47 (110 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/0 (49 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/1 (50 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/2 (50 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/3 (51 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/4 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/5 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/6 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/7 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/8 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/9 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/10 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/11 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/12 (56 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/13 (57 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/14 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/15 (57 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/16 (49 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/17 (50 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/18 (50 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/19 (50 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/20 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/21 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/22 (67 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/23 (66 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/24 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/25 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/26 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/27 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/28 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/29 (63 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/30 (57 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/31 (57 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/32 (48 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/33 (50 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/34 (49 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/35 (50 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/36 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/37 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/38 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/39 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/40 (53 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/41 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/42 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/43 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/44 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/45 (57 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/46 (57 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/47 (56 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/0 (48 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/1 (50 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/2 (50 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/3 (50 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/4 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/5 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/6 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/7 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/8 (53 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/9 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/10 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/11 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/12 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/13 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/14 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/15 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/16 (53 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/17 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/18 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/19 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/20 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/21 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/22 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/23 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/24 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/25 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/26 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/27 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/28 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/29 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/30 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/31 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/32 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/33 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/34 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/35 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/36 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/37 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/38 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/39 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/40 (58 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/41 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/42 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/43 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/44 (63 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/45 (67 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/46 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/47 (81 ms) [----------] 192 tests from CipherSuiteCBCStream/TlsCipherSuiteTest (13690 ms total) [----------] 96 tests from CipherSuiteCBCDatagram/TlsCipherSuiteTest [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/0 (62 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/1 (62 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/2 (62 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/3 (77 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/4 (67 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/5 (66 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/6 (60 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/7 (60 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/8 (60 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/9 (62 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/10 (62 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/11 (63 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/12 (55 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/13 (55 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/14 (54 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/15 (65 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/16 (65 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/17 (65 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/18 (60 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/19 (60 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/20 (60 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/21 (62 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/22 (62 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/23 (62 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/0 (105 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/1 (105 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/2 (105 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/3 (115 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/4 (115 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/5 (115 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/6 (112 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/7 (112 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/8 (111 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/9 (121 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/10 (121 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/11 (120 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/12 (103 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/13 (104 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/14 (103 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/15 (113 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/16 (113 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/17 (114 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/18 (110 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/19 (110 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/20 (111 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/21 (119 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/22 (119 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/23 (119 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/0 (57 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/1 (57 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/2 (57 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/3 (67 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/4 (67 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/5 (68 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/6 (62 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/7 (62 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/8 (62 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/9 (64 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/10 (64 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/11 (63 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/12 (56 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/13 (57 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/14 (57 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/15 (67 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/16 (63 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/17 (67 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/18 (61 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/19 (61 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/20 (61 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/21 (63 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/22 (64 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/23 (63 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/0 (50 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/1 (50 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/2 (50 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/3 (61 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/4 (60 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/5 (61 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/6 (55 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/7 (55 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/8 (55 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/9 (57 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/10 (56 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/11 (57 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/12 (49 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/13 (50 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/14 (49 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/15 (60 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/16 (60 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/17 (60 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/18 (55 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/19 (54 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/20 (54 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/21 (57 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/22 (61 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/23 (61 ms) [----------] 96 tests from CipherSuiteCBCDatagram/TlsCipherSuiteTest (7038 ms total) [----------] 7 tests from TestSecurityStatus/SecurityStatusTest [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/0 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/0 (61 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/1 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/1 (42 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/2 (62 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/3 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/3 (42 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/4 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/4 (42 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/5 (41 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/6 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/6 (42 ms) [----------] 7 tests from TestSecurityStatus/SecurityStatusTest (335 ms total) [----------] 72 tests from DamageYStream/TlsDamageDHYTest [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301279c6bc569729e78e54a5e914a78b2aae057c0a67bc52baa1198... record new: [1184] 020000510301279c6bc569729e78e54a5e914a78b2aae057c0a67bc52baa1198... server: Original packet: [1189] 16030104a0020000510301279c6bc569729e78e54a5e914a78b2aae057c0a67b... server: Filtered packet: [1189] 16030104a0020000510301279c6bc569729e78e54a5e914a78b2aae057c0a67b... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/0 (74 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/1 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103018d66117e5e0425d3ef900f8a75032d0c31c299836c7c87795707... record new: [1184] 0200005103018d66117e5e0425d3ef900f8a75032d0c31c299836c7c87795707... server: Original packet: [1189] 16030104a00200005103018d66117e5e0425d3ef900f8a75032d0c31c299836c... server: Filtered packet: [1189] 16030104a00200005103018d66117e5e0425d3ef900f8a75032d0c31c299836c... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/1 (72 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/2 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 02000051030131deb3251eb5ee85c8efb1340b5a2f0face71628d556defc9157... record new: [1184] 02000051030131deb3251eb5ee85c8efb1340b5a2f0face71628d556defc9157... server: Original packet: [1189] 16030104a002000051030131deb3251eb5ee85c8efb1340b5a2f0face71628d5... server: Filtered packet: [1189] 16030104a002000051030131deb3251eb5ee85c8efb1340b5a2f0face71628d5... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/2 (72 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301405edbc4b93180f789b147061b7f33837456829ef5fa9d1a0d66... record new: [1184] 020000510301405edbc4b93180f789b147061b7f33837456829ef5fa9d1a0d66... server: Original packet: [1189] 16030104a0020000510301405edbc4b93180f789b147061b7f33837456829ef5... server: Filtered packet: [1189] 16030104a0020000510301405edbc4b93180f789b147061b7f33837456829ef5... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/3 (58 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/4 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 02000051030159624d30273c423ea5e372a08c3f64ea6405d242d4814ddee99a... record new: [1184] 02000051030159624d30273c423ea5e372a08c3f64ea6405d242d4814ddee99a... server: Original packet: [1189] 16030104a002000051030159624d30273c423ea5e372a08c3f64ea6405d242d4... server: Filtered packet: [1189] 16030104a002000051030159624d30273c423ea5e372a08c3f64ea6405d242d4... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/4 (59 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/5 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301f07b19f20dc0123a9292655778a00e5df25d679fcb37ef070938... record new: [1184] 020000510301f07b19f20dc0123a9292655778a00e5df25d679fcb37ef070938... server: Original packet: [1189] 16030104a0020000510301f07b19f20dc0123a9292655778a00e5df25d679fcb... server: Filtered packet: [1189] 16030104a0020000510301f07b19f20dc0123a9292655778a00e5df25d679fcb... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/5 (59 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 02000051030103dc941020fb5ad9da31938c93637b28262db1641639589dc431... record new: [1184] 02000051030103dc941020fb5ad9da31938c93637b28262db1641639589dc431... server: Original packet: [1189] 16030104a002000051030103dc941020fb5ad9da31938c93637b28262db16416... server: Filtered packet: [1189] 16030104a002000051030103dc941020fb5ad9da31938c93637b28262db16416... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/6 (59 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103019d4673407750eb928ec197a5b5e949764979a7eeb1413bc90c2c... record new: [1184] 0200005103019d4673407750eb928ec197a5b5e949764979a7eeb1413bc90c2c... server: Original packet: [1189] 16030104a00200005103019d4673407750eb928ec197a5b5e949764979a7eeb1... server: Filtered packet: [1189] 16030104a00200005103019d4673407750eb928ec197a5b5e949764979a7eeb1... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/7 (59 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/8 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103012780a992c5c5effc44d04f0e119740ddb372412444ddf188e769... record new: [1185] 0200005103012780a992c5c5effc44d04f0e119740ddb372412444ddf188e769... server: Original packet: [1189] 16030104a00200005103012780a992c5c5effc44d04f0e119740ddb372412444... server: Filtered packet: [1190] 16030104a10200005103012780a992c5c5effc44d04f0e119740ddb372412444... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/8 (59 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/9 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301010767da65f6a3720cc5e7586093b084123054dd3f3fdd3702a5... record new: [1185] 020000510301010767da65f6a3720cc5e7586093b084123054dd3f3fdd3702a5... server: Original packet: [1189] 16030104a0020000510301010767da65f6a3720cc5e7586093b084123054dd3f... server: Filtered packet: [1190] 16030104a1020000510301010767da65f6a3720cc5e7586093b084123054dd3f... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/9 (59 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/10 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103019d0267dfd9f0cf26bde12d8781ad953de42661ab169a5abc03df... record new: [1185] 0200005103019d0267dfd9f0cf26bde12d8781ad953de42661ab169a5abc03df... server: Original packet: [1189] 16030104a00200005103019d0267dfd9f0cf26bde12d8781ad953de42661ab16... server: Filtered packet: [1190] 16030104a10200005103019d0267dfd9f0cf26bde12d8781ad953de42661ab16... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/10 (59 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/11 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301e6e8b82434472778079db2a961f7fb3326886a5e4a5b3a75460e... record new: [1185] 020000510301e6e8b82434472778079db2a961f7fb3326886a5e4a5b3a75460e... server: Original packet: [1189] 16030104a0020000510301e6e8b82434472778079db2a961f7fb3326886a5e4a... server: Filtered packet: [1190] 16030104a1020000510301e6e8b82434472778079db2a961f7fb3326886a5e4a... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/11 (60 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/12 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302a16241b440e010cb79bedcf295cc70a0fd2d6efae5a0c777c967... record new: [1184] 020000510302a16241b440e010cb79bedcf295cc70a0fd2d6efae5a0c777c967... server: Original packet: [1189] 16030204a0020000510302a16241b440e010cb79bedcf295cc70a0fd2d6efae5... server: Filtered packet: [1189] 16030204a0020000510302a16241b440e010cb79bedcf295cc70a0fd2d6efae5... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/12 (59 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/13 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103022414d9c9559906265fc0ef1b0557a4591533a844886f4f13814e... record new: [1184] 0200005103022414d9c9559906265fc0ef1b0557a4591533a844886f4f13814e... server: Original packet: [1189] 16030204a00200005103022414d9c9559906265fc0ef1b0557a4591533a84488... server: Filtered packet: [1189] 16030204a00200005103022414d9c9559906265fc0ef1b0557a4591533a84488... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/13 (59 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/14 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 02000051030261385b1515b2303d74731010616e4ea1f9a68b73e589812b0e6d... record new: [1184] 02000051030261385b1515b2303d74731010616e4ea1f9a68b73e589812b0e6d... server: Original packet: [1189] 16030204a002000051030261385b1515b2303d74731010616e4ea1f9a68b73e5... server: Filtered packet: [1189] 16030204a002000051030261385b1515b2303d74731010616e4ea1f9a68b73e5... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/14 (59 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/15 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103023f19eeabcf551039f83186572588d16ab6951a80e2e934afb27e... record new: [1184] 0200005103023f19eeabcf551039f83186572588d16ab6951a80e2e934afb27e... server: Original packet: [1189] 16030204a00200005103023f19eeabcf551039f83186572588d16ab6951a80e2... server: Filtered packet: [1189] 16030204a00200005103023f19eeabcf551039f83186572588d16ab6951a80e2... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/15 (59 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/16 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302ec4b26e690e4950e314a541828fb47b6654a7f5b96efa90344f9... record new: [1184] 020000510302ec4b26e690e4950e314a541828fb47b6654a7f5b96efa90344f9... server: Original packet: [1189] 16030204a0020000510302ec4b26e690e4950e314a541828fb47b6654a7f5b96... server: Filtered packet: [1189] 16030204a0020000510302ec4b26e690e4950e314a541828fb47b6654a7f5b96... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/16 (59 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/17 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103021a783cc6220993c4f3dec8e71fa061c52b883e5f30c82b7661e3... record new: [1184] 0200005103021a783cc6220993c4f3dec8e71fa061c52b883e5f30c82b7661e3... server: Original packet: [1189] 16030204a00200005103021a783cc6220993c4f3dec8e71fa061c52b883e5f30... server: Filtered packet: [1189] 16030204a00200005103021a783cc6220993c4f3dec8e71fa061c52b883e5f30... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/17 (58 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/18 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103023943a0682a06938c95853a67c080786606f23a690d5b33508d77... record new: [1184] 0200005103023943a0682a06938c95853a67c080786606f23a690d5b33508d77... server: Original packet: [1189] 16030204a00200005103023943a0682a06938c95853a67c080786606f23a690d... server: Filtered packet: [1189] 16030204a00200005103023943a0682a06938c95853a67c080786606f23a690d... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/18 (58 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/19 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302e51de6c604d20d6e9e23e7089b04a5d416d6c9114d558fbbe0dd... record new: [1184] 020000510302e51de6c604d20d6e9e23e7089b04a5d416d6c9114d558fbbe0dd... server: Original packet: [1189] 16030204a0020000510302e51de6c604d20d6e9e23e7089b04a5d416d6c9114d... server: Filtered packet: [1189] 16030204a0020000510302e51de6c604d20d6e9e23e7089b04a5d416d6c9114d... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/19 (59 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/20 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302d901a217cfaf9abe44088f6fc7239b35410e031fe9d5a623b8ad... record new: [1185] 020000510302d901a217cfaf9abe44088f6fc7239b35410e031fe9d5a623b8ad... server: Original packet: [1189] 16030204a0020000510302d901a217cfaf9abe44088f6fc7239b35410e031fe9... server: Filtered packet: [1190] 16030204a1020000510302d901a217cfaf9abe44088f6fc7239b35410e031fe9... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/20 (59 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/21 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302ebae036cbeb93e29635e6728d095f06bccfbcb1f0e1eae5473c0... record new: [1185] 020000510302ebae036cbeb93e29635e6728d095f06bccfbcb1f0e1eae5473c0... server: Original packet: [1189] 16030204a0020000510302ebae036cbeb93e29635e6728d095f06bccfbcb1f0e... server: Filtered packet: [1190] 16030204a1020000510302ebae036cbeb93e29635e6728d095f06bccfbcb1f0e... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/21 (59 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/22 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302b363c5f0db6e5caf03a38fb8d4c5539dbd487658c0d29909c145... record new: [1185] 020000510302b363c5f0db6e5caf03a38fb8d4c5539dbd487658c0d29909c145... server: Original packet: [1189] 16030204a0020000510302b363c5f0db6e5caf03a38fb8d4c5539dbd487658c0... server: Filtered packet: [1190] 16030204a1020000510302b363c5f0db6e5caf03a38fb8d4c5539dbd487658c0... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/22 (59 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/23 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302069d0414d346f5a87438f2eff61a1758d6ea37bb96145f540cd2... record new: [1185] 020000510302069d0414d346f5a87438f2eff61a1758d6ea37bb96145f540cd2... server: Original packet: [1189] 16030204a0020000510302069d0414d346f5a87438f2eff61a1758d6ea37bb96... server: Filtered packet: [1190] 16030204a1020000510302069d0414d346f5a87438f2eff61a1758d6ea37bb96... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/23 (60 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/24 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303c903defd605d64d45b688f8efa569690af9d720f00c89347abbf... record new: [1186] 020000510303c903defd605d64d45b688f8efa569690af9d720f00c89347abbf... server: Original packet: [1191] 16030304a2020000510303c903defd605d64d45b688f8efa569690af9d720f00... server: Filtered packet: [1191] 16030304a2020000510303c903defd605d64d45b688f8efa569690af9d720f00... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/24 (59 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/25 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303888579db2c397e4efa857d4833a5296621d1ece949a0eead6a9a... record new: [1186] 020000510303888579db2c397e4efa857d4833a5296621d1ece949a0eead6a9a... server: Original packet: [1191] 16030304a2020000510303888579db2c397e4efa857d4833a5296621d1ece949... server: Filtered packet: [1191] 16030304a2020000510303888579db2c397e4efa857d4833a5296621d1ece949... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/25 (61 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/26 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303f76d3decc7c89f0656f479db9e3ce4e4464cca31f6779566e821... record new: [1186] 020000510303f76d3decc7c89f0656f479db9e3ce4e4464cca31f6779566e821... server: Original packet: [1191] 16030304a2020000510303f76d3decc7c89f0656f479db9e3ce4e4464cca31f6... server: Filtered packet: [1191] 16030304a2020000510303f76d3decc7c89f0656f479db9e3ce4e4464cca31f6... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/26 (73 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/27 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 02000051030363f108c5cc60dd3759403476074c053def2309f4c8c4cf612002... record new: [1186] 02000051030363f108c5cc60dd3759403476074c053def2309f4c8c4cf612002... server: Original packet: [1191] 16030304a202000051030363f108c5cc60dd3759403476074c053def2309f4c8... server: Filtered packet: [1191] 16030304a202000051030363f108c5cc60dd3759403476074c053def2309f4c8... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/27 (62 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/28 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303db8cd14d5ff8adae8d04b9a3da1e42dc422fc0b61112d3da83b3... record new: [1186] 020000510303db8cd14d5ff8adae8d04b9a3da1e42dc422fc0b61112d3da83b3... server: Original packet: [1191] 16030304a2020000510303db8cd14d5ff8adae8d04b9a3da1e42dc422fc0b611... server: Filtered packet: [1191] 16030304a2020000510303db8cd14d5ff8adae8d04b9a3da1e42dc422fc0b611... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/28 (73 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/29 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303a3256205479012555bc125fa28b1a0cf898293ac1f9eae9c64e0... record new: [1186] 020000510303a3256205479012555bc125fa28b1a0cf898293ac1f9eae9c64e0... server: Original packet: [1191] 16030304a2020000510303a3256205479012555bc125fa28b1a0cf898293ac1f... server: Filtered packet: [1191] 16030304a2020000510303a3256205479012555bc125fa28b1a0cf898293ac1f... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/29 (73 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/30 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 02000051030349d19ffa0c2abd8d37e7ec7c251b27e04c7a42d04b0ac2631f8b... record new: [1186] 02000051030349d19ffa0c2abd8d37e7ec7c251b27e04c7a42d04b0ac2631f8b... server: Original packet: [1191] 16030304a202000051030349d19ffa0c2abd8d37e7ec7c251b27e04c7a42d04b... server: Filtered packet: [1191] 16030304a202000051030349d19ffa0c2abd8d37e7ec7c251b27e04c7a42d04b... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/30 (73 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/31 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303857144a7f6f4b0ff0839ac11842a9ba9d303021aa3c57ffa785d... record new: [1186] 020000510303857144a7f6f4b0ff0839ac11842a9ba9d303021aa3c57ffa785d... server: Original packet: [1191] 16030304a2020000510303857144a7f6f4b0ff0839ac11842a9ba9d303021aa3... server: Filtered packet: [1191] 16030304a2020000510303857144a7f6f4b0ff0839ac11842a9ba9d303021aa3... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/31 (73 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/32 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303ec37db1e36b5271528cc4f31acbfdd541c0beb18a15489aa1c22... record new: [1187] 020000510303ec37db1e36b5271528cc4f31acbfdd541c0beb18a15489aa1c22... server: Original packet: [1191] 16030304a2020000510303ec37db1e36b5271528cc4f31acbfdd541c0beb18a1... server: Filtered packet: [1192] 16030304a3020000510303ec37db1e36b5271528cc4f31acbfdd541c0beb18a1... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/32 (72 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/33 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303b9dd6ac3a3a434a334d69367e9e5e9850b4697344bc41020ac9d... record new: [1187] 020000510303b9dd6ac3a3a434a334d69367e9e5e9850b4697344bc41020ac9d... server: Original packet: [1191] 16030304a2020000510303b9dd6ac3a3a434a334d69367e9e5e9850b4697344b... server: Filtered packet: [1192] 16030304a3020000510303b9dd6ac3a3a434a334d69367e9e5e9850b4697344b... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/33 (61 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/34 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 0200005103033de91df915defc81dcb93738ad638da0b95fcf307b6437b5a356... record new: [1187] 0200005103033de91df915defc81dcb93738ad638da0b95fcf307b6437b5a356... server: Original packet: [1191] 16030304a20200005103033de91df915defc81dcb93738ad638da0b95fcf307b... server: Filtered packet: [1192] 16030304a30200005103033de91df915defc81dcb93738ad638da0b95fcf307b... client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/34 (73 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/35 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303fc35c67470595e7101475edba38e89c8bf4687202d715da58f76... record new: [1187] 020000510303fc35c67470595e7101475edba38e89c8bf4687202d715da58f76... server: Original packet: [1191] 16030304a2020000510303fc35c67470595e7101475edba38e89c8bf4687202d... server: Filtered packet: [1192] 16030304a3020000510303fc35c67470595e7101475edba38e89c8bf4687202d... client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/35 (73 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100bf075392634a9914af71501f06c109bbbd678aedd39c83b73965d1a739af... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100bf075392634a9914af71501f06c109bbbd678aedd39c83b73965... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [326] 1603010106100001020100bf075392634a9914af71501f06c109bbbd678aedd3... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/0 (124 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/1 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01000c181711f38e2bfbf37af719d1e05772d44bb2215e37c3712955de5dcd63... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201000c181711f38e2bfbf37af719d1e05772d44bb2215e37c3712955... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [326] 16030101061000010201000c181711f38e2bfbf37af719d1e05772d44bb2215e... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/1 (112 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/2 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100c8ca16915dd0e3927f9ab101884d5578a8a06159acbd4ac07fd66c9cbd6d... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100c8ca16915dd0e3927f9ab101884d5578a8a06159acbd4ac07fd6... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [326] 1603010106100001020100c8ca16915dd0e3927f9ab101884d5578a8a06159ac... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/2 (124 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d36ddbb3465e4e62222294ef48546cab0b16868c5e925d9dce6e4cb8f8dc... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100d36ddbb3465e4e62222294ef48546cab0b16868c5e925d9dce6e... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [326] 1603010106100001020100d36ddbb3465e4e62222294ef48546cab0b16868c5e... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/3 (123 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/4 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d56949cade17bf1142f92d4a23acaf5cbc47336e14fc142aeefc4a87211f... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100d56949cade17bf1142f92d4a23acaf5cbc47336e14fc142aeefc... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [326] 1603010106100001020100d56949cade17bf1142f92d4a23acaf5cbc47336e14... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/4 (113 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/5 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e204064f62ff585f588d80fce2e8123dc33b62a024213283090c58902177... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100e204064f62ff585f588d80fce2e8123dc33b62a024213283090c... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [326] 1603010106100001020100e204064f62ff585f588d80fce2e8123dc33b62a024... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/5 (124 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d1969a053b4835cf677f28e3635702497ecdf27c3605c565fd06b7d4c2a5... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100d1969a053b4835cf677f28e3635702497ecdf27c3605c565fd06... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [326] 1603010106100001020100d1969a053b4835cf677f28e3635702497ecdf27c36... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/6 (123 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010029e5ecad6c154cf8f3571868df3cc266837fcea8e67713984970deceeed8... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 10000102010029e5ecad6c154cf8f3571868df3cc266837fcea8e67713984970... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [326] 160301010610000102010029e5ecad6c154cf8f3571868df3cc266837fcea8e6... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/7 (109 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/8 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e86823759d2dc62334d249abe5a443f369c87076e14772e37ed391bac07e... handshake new: [259] 010101e86823759d2dc62334d249abe5a443f369c87076e14772e37ed391bac0... record old: [262] 100001020100e86823759d2dc62334d249abe5a443f369c87076e14772e37ed3... record new: [263] 10000103010101e86823759d2dc62334d249abe5a443f369c87076e14772e37e... client: Original packet: [326] 1603010106100001020100e86823759d2dc62334d249abe5a443f369c87076e1... client: Filtered packet: [327] 160301010710000103010101e86823759d2dc62334d249abe5a443f369c87076... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/8 (111 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/9 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100f5511ca3d3fff0c89a94d70a1e9720af17e64269f1087e62155b5c1f2da1... handshake new: [259] 010101f5511ca3d3fff0c89a94d70a1e9720af17e64269f1087e62155b5c1f2d... record old: [262] 100001020100f5511ca3d3fff0c89a94d70a1e9720af17e64269f1087e62155b... record new: [263] 10000103010101f5511ca3d3fff0c89a94d70a1e9720af17e64269f1087e6215... client: Original packet: [326] 1603010106100001020100f5511ca3d3fff0c89a94d70a1e9720af17e64269f1... client: Filtered packet: [327] 160301010710000103010101f5511ca3d3fff0c89a94d70a1e9720af17e64269... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/9 (110 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/10 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010024294fb0726eedb53f447aeeef1cbcbf51581a1ef9fae11f4a433c88b85b... handshake new: [259] 01010024294fb0726eedb53f447aeeef1cbcbf51581a1ef9fae11f4a433c88b8... record old: [262] 10000102010024294fb0726eedb53f447aeeef1cbcbf51581a1ef9fae11f4a43... record new: [263] 1000010301010024294fb0726eedb53f447aeeef1cbcbf51581a1ef9fae11f4a... client: Original packet: [326] 160301010610000102010024294fb0726eedb53f447aeeef1cbcbf51581a1ef9... client: Filtered packet: [327] 16030101071000010301010024294fb0726eedb53f447aeeef1cbcbf51581a1e... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/10 (136 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/11 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100700e3c19732883523d66a7eb23b9c24293c0936d79a0cacf5d9cde1b0ded... handshake new: [259] 010100700e3c19732883523d66a7eb23b9c24293c0936d79a0cacf5d9cde1b0d... record old: [262] 100001020100700e3c19732883523d66a7eb23b9c24293c0936d79a0cacf5d9c... record new: [263] 10000103010100700e3c19732883523d66a7eb23b9c24293c0936d79a0cacf5d... client: Original packet: [326] 1603010106100001020100700e3c19732883523d66a7eb23b9c24293c0936d79... client: Filtered packet: [327] 160301010710000103010100700e3c19732883523d66a7eb23b9c24293c0936d... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/11 (136 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/12 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100ad89cd3f1e76a46473dd1102dd7e58909ed4010f2708710ef9453847bc2c... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100ad89cd3f1e76a46473dd1102dd7e58909ed4010f2708710ef945... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [342] 1603020106100001020100ad89cd3f1e76a46473dd1102dd7e58909ed4010f27... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/12 (110 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/13 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100a66b934829829a7344147dadc48545df177dda9224470fb78ecd890b1812... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100a66b934829829a7344147dadc48545df177dda9224470fb78ecd... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [342] 1603020106100001020100a66b934829829a7344147dadc48545df177dda9224... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/13 (111 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/14 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100120b66ea8b1d29c09d698a7624b976848e84bd778b2c87409011395e650f... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100120b66ea8b1d29c09d698a7624b976848e84bd778b2c87409011... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [342] 1603020106100001020100120b66ea8b1d29c09d698a7624b976848e84bd778b... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/14 (111 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/15 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01002b293aafb6ac50561070bec9edbc74b37f968ce24e18d9e2bbabb300b5ac... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201002b293aafb6ac50561070bec9edbc74b37f968ce24e18d9e2bbab... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [342] 16030201061000010201002b293aafb6ac50561070bec9edbc74b37f968ce24e... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/15 (111 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/16 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010077a237c0b280acec7c1039309bace24235eeb1a15f688a9858d7a221ca33... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 10000102010077a237c0b280acec7c1039309bace24235eeb1a15f688a9858d7... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [342] 160302010610000102010077a237c0b280acec7c1039309bace24235eeb1a15f... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/16 (111 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/17 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01006d2f37415fda0738ff2eed6955b47f9a721f0d0e7e8d9b407e4994909d31... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 1000010201006d2f37415fda0738ff2eed6955b47f9a721f0d0e7e8d9b407e49... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [342] 16030201061000010201006d2f37415fda0738ff2eed6955b47f9a721f0d0e7e... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/17 (110 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/18 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004835c912b9e2548a0aa404530c129a609ee884dadc82c68db6aef3c5e99f... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 1000010201004835c912b9e2548a0aa404530c129a609ee884dadc82c68db6ae... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [342] 16030201061000010201004835c912b9e2548a0aa404530c129a609ee884dadc... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/18 (110 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/19 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100eec32ca1ab85f4dfb614fbef06edc2f88dd053b6022f15ea8624751c17d4... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100eec32ca1ab85f4dfb614fbef06edc2f88dd053b6022f15ea8624... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [342] 1603020106100001020100eec32ca1ab85f4dfb614fbef06edc2f88dd053b602... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/19 (110 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/20 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100307d18ec8e7a5a5d31dd969a69856169de76940b9557b19dcd70f182e17b... handshake new: [259] 010101307d18ec8e7a5a5d31dd969a69856169de76940b9557b19dcd70f182e1... record old: [262] 100001020100307d18ec8e7a5a5d31dd969a69856169de76940b9557b19dcd70... record new: [263] 10000103010101307d18ec8e7a5a5d31dd969a69856169de76940b9557b19dcd... client: Original packet: [342] 1603020106100001020100307d18ec8e7a5a5d31dd969a69856169de76940b95... client: Filtered packet: [343] 160302010710000103010101307d18ec8e7a5a5d31dd969a69856169de76940b... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/20 (113 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/21 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e21170981aec0dbbcd86ee97d4df1c9f784cc257e359839cc0903a99f542... handshake new: [259] 010101e21170981aec0dbbcd86ee97d4df1c9f784cc257e359839cc0903a99f5... record old: [262] 100001020100e21170981aec0dbbcd86ee97d4df1c9f784cc257e359839cc090... record new: [263] 10000103010101e21170981aec0dbbcd86ee97d4df1c9f784cc257e359839cc0... client: Original packet: [342] 1603020106100001020100e21170981aec0dbbcd86ee97d4df1c9f784cc257e3... client: Filtered packet: [343] 160302010710000103010101e21170981aec0dbbcd86ee97d4df1c9f784cc257... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/21 (125 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/22 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d1d0132e565e77e1f93886ce4b4fcda97487282f15f021eb69f374268d1b... handshake new: [259] 010100d1d0132e565e77e1f93886ce4b4fcda97487282f15f021eb69f374268d... record old: [262] 100001020100d1d0132e565e77e1f93886ce4b4fcda97487282f15f021eb69f3... record new: [263] 10000103010100d1d0132e565e77e1f93886ce4b4fcda97487282f15f021eb69... client: Original packet: [342] 1603020106100001020100d1d0132e565e77e1f93886ce4b4fcda97487282f15... client: Filtered packet: [343] 160302010710000103010100d1d0132e565e77e1f93886ce4b4fcda97487282f... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/22 (150 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/23 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01003f340090659ee2c1c18762dc776461277acbc7e23fe5db11508d43b6cdb9... handshake new: [259] 0101003f340090659ee2c1c18762dc776461277acbc7e23fe5db11508d43b6cd... record old: [262] 1000010201003f340090659ee2c1c18762dc776461277acbc7e23fe5db11508d... record new: [263] 100001030101003f340090659ee2c1c18762dc776461277acbc7e23fe5db1150... client: Original packet: [342] 16030201061000010201003f340090659ee2c1c18762dc776461277acbc7e23f... client: Filtered packet: [343] 1603020107100001030101003f340090659ee2c1c18762dc776461277acbc7e2... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/23 (150 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/24 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01003fa6fc383763327789b2dcaddcd21c012185b9cf3f99e951ca8fa3afef0c... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201003fa6fc383763327789b2dcaddcd21c012185b9cf3f99e951ca8f... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [318] 16030301061000010201003fa6fc383763327789b2dcaddcd21c012185b9cf3f... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/24 (125 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/25 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100f8ebc5853fce4813a6b4e078565f333920c4a3dded86b850300b1a54e272... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100f8ebc5853fce4813a6b4e078565f333920c4a3dded86b850300b... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [318] 1603030106100001020100f8ebc5853fce4813a6b4e078565f333920c4a3dded... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/25 (113 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/26 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100547c125e51f87d8c8d90e2d81c5aa6f0f66cb729c6b0d5708ae6694cdeb1... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100547c125e51f87d8c8d90e2d81c5aa6f0f66cb729c6b0d5708ae6... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [318] 1603030106100001020100547c125e51f87d8c8d90e2d81c5aa6f0f66cb729c6... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/26 (124 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/27 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010081cebd108e1ef123e62d98c0534540a2d24c5bff02243034dfc4d7646837... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 10000102010081cebd108e1ef123e62d98c0534540a2d24c5bff02243034dfc4... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [318] 160303010610000102010081cebd108e1ef123e62d98c0534540a2d24c5bff02... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/27 (113 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/28 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010060293ac4a5c66014b8ba6ffdf4f7efacb076a72a79412970aef6566c36ce... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 10000102010060293ac4a5c66014b8ba6ffdf4f7efacb076a72a79412970aef6... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [318] 160303010610000102010060293ac4a5c66014b8ba6ffdf4f7efacb076a72a79... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/28 (123 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/29 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100a370842e39617152ffe06b9d1a53035775b1438566129f547ef9cdcea453... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100a370842e39617152ffe06b9d1a53035775b1438566129f547ef9... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [318] 1603030106100001020100a370842e39617152ffe06b9d1a53035775b1438566... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/29 (124 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/30 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e1a6887ce2d82bd358f9325612f47aefb32f3720bfb544d0351326b924e9... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100e1a6887ce2d82bd358f9325612f47aefb32f3720bfb544d03513... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [318] 1603030106100001020100e1a6887ce2d82bd358f9325612f47aefb32f3720bf... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/30 (113 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/31 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01007a9334716a63a761e4a05a9d19a17da7043722051dd91053bf0ac711663a... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 1000010201007a9334716a63a761e4a05a9d19a17da7043722051dd91053bf0a... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [318] 16030301061000010201007a9334716a63a761e4a05a9d19a17da7043722051d... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/31 (124 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/32 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01000d74a62e80b14850cc65647a8647275a58b3fb12c77c5c5c97d81d3efbc4... handshake new: [259] 0101010d74a62e80b14850cc65647a8647275a58b3fb12c77c5c5c97d81d3efb... record old: [262] 1000010201000d74a62e80b14850cc65647a8647275a58b3fb12c77c5c5c97d8... record new: [263] 100001030101010d74a62e80b14850cc65647a8647275a58b3fb12c77c5c5c97... client: Original packet: [318] 16030301061000010201000d74a62e80b14850cc65647a8647275a58b3fb12c7... client: Filtered packet: [319] 1603030107100001030101010d74a62e80b14850cc65647a8647275a58b3fb12... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/32 (124 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/33 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010067ea93a32fe401372fddef9420249909efcb128a18bef64c6fe509f0b4b2... handshake new: [259] 01010167ea93a32fe401372fddef9420249909efcb128a18bef64c6fe509f0b4... record old: [262] 10000102010067ea93a32fe401372fddef9420249909efcb128a18bef64c6fe5... record new: [263] 1000010301010167ea93a32fe401372fddef9420249909efcb128a18bef64c6f... client: Original packet: [318] 160303010610000102010067ea93a32fe401372fddef9420249909efcb128a18... client: Filtered packet: [319] 16030301071000010301010167ea93a32fe401372fddef9420249909efcb128a... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/33 (112 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/34 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01002b5efe2e364c214ef6f17991b3dab937f085c9d46c1eec5a33ac3160a5cd... handshake new: [259] 0101002b5efe2e364c214ef6f17991b3dab937f085c9d46c1eec5a33ac3160a5... record old: [262] 1000010201002b5efe2e364c214ef6f17991b3dab937f085c9d46c1eec5a33ac... record new: [263] 100001030101002b5efe2e364c214ef6f17991b3dab937f085c9d46c1eec5a33... client: Original packet: [318] 16030301061000010201002b5efe2e364c214ef6f17991b3dab937f085c9d46c... client: Filtered packet: [319] 1603030107100001030101002b5efe2e364c214ef6f17991b3dab937f085c9d4... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/34 (152 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/35 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b8599447fd6a1c6c8bf8f0067c2accf4d1b0015570d45b0a9e7113d36aea... handshake new: [259] 010100b8599447fd6a1c6c8bf8f0067c2accf4d1b0015570d45b0a9e7113d36a... record old: [262] 100001020100b8599447fd6a1c6c8bf8f0067c2accf4d1b0015570d45b0a9e71... record new: [263] 10000103010100b8599447fd6a1c6c8bf8f0067c2accf4d1b0015570d45b0a9e... client: Original packet: [318] 1603030106100001020100b8599447fd6a1c6c8bf8f0067c2accf4d1b0015570... client: Filtered packet: [319] 160303010710000103010100b8599447fd6a1c6c8bf8f0067c2accf4d1b00155... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/35 (150 ms) [----------] 72 tests from DamageYStream/TlsDamageDHYTest (6655 ms total) [----------] 48 tests from DamageYDatagram/TlsDamageDHYTest [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff75d93ae3b2... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff75d93ae3b2... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/0 (73 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/1 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff12ca383f76... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff12ca383f76... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/1 (61 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff4ab1477017... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff4ab1477017... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/2 (74 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff87fdd75641... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff87fdd75641... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/3 (73 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff1da7a9c0d1... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff1da7a9c0d1... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/4 (73 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff6af727051d... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff6af727051d... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/5 (72 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/6 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffc266a38cae... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feffc266a38cae... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/6 (73 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/7 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffab9a7bd75e... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feffab9a7bd75e... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/7 (73 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/8 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff57c39fbe39... server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feff57c39fbe39... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/8 (73 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/9 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffb5d4e3ae41... server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feffb5d4e3ae41... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/9 (62 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/10 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffc0e2a4d197... server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feffc0e2a4d197... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/10 (72 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/11 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff87ef961576... server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feff87ef961576... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/11 (74 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/12 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd6e67a50e40... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd6e67a50e40... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/12 (72 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/13 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd600cb6f3f6... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd600cb6f3f6... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/13 (61 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/14 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd8079673e45... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd8079673e45... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/14 (73 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/15 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd3661f8cf36... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd3661f8cf36... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/15 (73 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/16 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd7b1c2fbc04... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd7b1c2fbc04... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/16 (73 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/17 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefda2bde62364... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefda2bde62364... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/17 (73 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/18 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd7019b03bf5... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd7019b03bf5... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/18 (73 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/19 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd6135f7feac... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd6135f7feac... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/19 (61 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/20 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd1696cd3c86... server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefd1696cd3c86... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/20 (74 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/21 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd6c41b03cdf... server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefd6c41b03cdf... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/21 (74 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/22 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd7d85f4f66d... server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefd7d85f4f66d... client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/22 (62 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/23 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd8c3a72281c... server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefd8c3a72281c... client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/23 (75 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100494f045c39d91b7af621fa3ae54fa326b7f80ae695e89b4684dca6712007... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100494f045c39d91b7af621fa3ae54fa326b7f8... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100494f045c39... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/0 (125 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/1 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010054b3c906dd1f1f2b974c68d616efb9ef986368238f898220641a8e47ec82... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 100001020001000000000102010054b3c906dd1f1f2b974c68d616efb9ef9863... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [374] 16feff0000000000000001010e100001020001000000000102010054b3c906dd... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/1 (124 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100dcfd93e0c9a178f27fca859980c39a67e749d3a9bb23f701fb8611c38132... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100dcfd93e0c9a178f27fca859980c39a67e749... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100dcfd93e0c9... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/2 (123 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100040142aed6c4e0096d9565dfe193a5c124ad8aecd5b92115b983e4ae6231... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100040142aed6c4e0096d9565dfe193a5c124ad... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100040142aed6... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/3 (125 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100c2b18b01bd9317b1b855fb8472b23d548773faffac244dfccf1bbae880e1... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 1000010200010000000001020100c2b18b01bd9317b1b855fb8472b23d548773... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100c2b18b01bd... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/4 (123 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010049dffb03ad0cd395343600fc1fe3e296bcb3ccb0f4cd1a0fbb639fa6e88b... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 100001020001000000000102010049dffb03ad0cd395343600fc1fe3e296bcb3... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Original packet: [374] 16feff0000000000000001010e100001020001000000000102010049dffb03ad... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/5 (125 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/6 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100bba272cf705b70223bb8c3e8c34ad6087943c45b3adb607fb908aa60b00c... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 1000010200010000000001020100bba272cf705b70223bb8c3e8c34ad6087943... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100bba272cf70... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/6 (114 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/7 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100226ca85c9fcf3ae362e7703af319c24ea4239893cf7b5f627b1810820308... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 1000010200010000000001020100226ca85c9fcf3ae362e7703af319c24ea423... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100226ca85c9f... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/7 (125 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100fc25f6ab6aa29847a84608e9c901ecfaf38e1c6a606f7a304e66b4119869... handshake new: [259] 010101fc25f6ab6aa29847a84608e9c901ecfaf38e1c6a606f7a304e66b41198... record old: [270] 1000010200010000000001020100fc25f6ab6aa29847a84608e9c901ecfaf38e... record new: [271] 100001030001000000000103010101fc25f6ab6aa29847a84608e9c901ecfaf3... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100fc25f6ab6a... client: Filtered packet: [375] 16feff0000000000000001010f100001030001000000000103010101fc25f6ab... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8 (125 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/9 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01005a2cb080f2a5c9a971a04659880d57db27cc3d1b8dab0f52a2accbfa106b... handshake new: [259] 0101015a2cb080f2a5c9a971a04659880d57db27cc3d1b8dab0f52a2accbfa10... record old: [270] 10000102000100000000010201005a2cb080f2a5c9a971a04659880d57db27cc... record new: [271] 1000010300010000000001030101015a2cb080f2a5c9a971a04659880d57db27... client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201005a2cb080f2... client: Filtered packet: [375] 16feff0000000000000001010f1000010300010000000001030101015a2cb080... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/9 (124 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/10 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010063803b87939289955f6a15fd4fd6bb3889e1d899f8d603f01a0cfddd0a58... handshake new: [259] 01010063803b87939289955f6a15fd4fd6bb3889e1d899f8d603f01a0cfddd0a... record old: [270] 100001020001000000000102010063803b87939289955f6a15fd4fd6bb3889e1... record new: [271] 10000103000100000000010301010063803b87939289955f6a15fd4fd6bb3889... client: Original packet: [374] 16feff0000000000000001010e100001020001000000000102010063803b8793... client: Filtered packet: [375] 16feff0000000000000001010f10000103000100000000010301010063803b87... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/10 (154 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/11 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d68c29ddbb51673fe90022b74ddfd8e0c2972cc4c214864f8d143c82ebe1... handshake new: [259] 010100d68c29ddbb51673fe90022b74ddfd8e0c2972cc4c214864f8d143c82eb... record old: [270] 1000010200010000000001020100d68c29ddbb51673fe90022b74ddfd8e0c297... record new: [271] 100001030001000000000103010100d68c29ddbb51673fe90022b74ddfd8e0c2... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100d68c29ddbb... client: Filtered packet: [375] 16feff0000000000000001010f100001030001000000000103010100d68c29dd... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/11 (150 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/12 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01007f73957881e2ce71ea97d0b77cfabefeff3d883c8288f12ba4d40f7aae3e... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 10000102000100000000010201007f73957881e2ce71ea97d0b77cfabefeff3d... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201007f73957881... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/12 (124 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/13 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100134d8b642688b7fe250c9af3170bf03f02e1f897cca673c27171fc21601c... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100134d8b642688b7fe250c9af3170bf03f02e1... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100134d8b6426... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/13 (113 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/14 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004c85b94a5bcc7aa3c86c22887ec4b954361cbdc1b1e43c6fa8cad02584ed... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 10000102000100000000010201004c85b94a5bcc7aa3c86c22887ec4b954361c... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201004c85b94a5b... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/14 (125 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/15 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100fab50cf8632da24931c66a85346a83fe64a115a19d6cdaff28bd88059d60... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100fab50cf8632da24931c66a85346a83fe64a1... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100fab50cf863... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/15 (124 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/16 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01000a8e39d2b3a5e7e719f1cd1ecda54778d94fceaead640669552ad94e4360... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 10000102000100000000010201000a8e39d2b3a5e7e719f1cd1ecda54778d94f... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201000a8e39d2b3... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/16 (112 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/17 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01000a496f49a4ad8cb4e6fb752aa81e9e6ffd1b979382e01555fe7b23870a67... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 10000102000100000000010201000a496f49a4ad8cb4e6fb752aa81e9e6ffd1b... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201000a496f49a4... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/17 (124 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/18 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01003e22af65381e181db4e1e8de9414638422bab0b7b074d84beee67f47dd8e... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 10000102000100000000010201003e22af65381e181db4e1e8de9414638422ba... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201003e22af6538... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/18 (124 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/19 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e524ed6f0ba7ac40d5d79184762c9d9b94d4a20bc4d7e9b18b04d32f325a... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 1000010200010000000001020100e524ed6f0ba7ac40d5d79184762c9d9b94d4... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100e524ed6f0b... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/19 (124 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/20 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100a0650270ae793b8b64bad5a2a9dba36396397ac48aef05e86d26ec56e245... handshake new: [259] 010101a0650270ae793b8b64bad5a2a9dba36396397ac48aef05e86d26ec56e2... record old: [270] 1000010200010000000001020100a0650270ae793b8b64bad5a2a9dba3639639... record new: [271] 100001030001000000000103010101a0650270ae793b8b64bad5a2a9dba36396... client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100a0650270ae... client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010101a0650270... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/20 (125 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/21 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100361a5992b4c6b985e1b3e7656cdc0011ec54af6790675522ebec758dbe76... handshake new: [259] 010101361a5992b4c6b985e1b3e7656cdc0011ec54af6790675522ebec758dbe... record old: [270] 1000010200010000000001020100361a5992b4c6b985e1b3e7656cdc0011ec54... record new: [271] 100001030001000000000103010101361a5992b4c6b985e1b3e7656cdc0011ec... client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100361a5992b4... client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010101361a5992... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/21 (123 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/22 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100eb600aca1fa4afb094797fb578e7ae219d9d6527b1b6b245b2ef99952473... handshake new: [259] 010100eb600aca1fa4afb094797fb578e7ae219d9d6527b1b6b245b2ef999524... record old: [270] 1000010200010000000001020100eb600aca1fa4afb094797fb578e7ae219d9d... record new: [271] 100001030001000000000103010100eb600aca1fa4afb094797fb578e7ae219d... client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100eb600aca1f... client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010100eb600aca... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/22 (150 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/23 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01006e40629be3dcb82628107400844968eb5685037728777ba1ff651c2e585d... handshake new: [259] 0101006e40629be3dcb82628107400844968eb5685037728777ba1ff651c2e58... record old: [270] 10000102000100000000010201006e40629be3dcb82628107400844968eb5685... record new: [271] 1000010300010000000001030101006e40629be3dcb82628107400844968eb56... client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201006e40629be3... client: Filtered packet: [359] 16fefd0000000000000001010f1000010300010000000001030101006e40629b... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/23 (150 ms) [----------] 48 tests from DamageYDatagram/TlsDamageDHYTest (4760 ms total) [----------] 12 tests from KeyExchangeTest/TlsKeyExchangeTest [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/0 (224 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/1 (178 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/2 (180 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/3 (182 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/0 (179 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/1 (180 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/2 (181 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/3 (178 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/0 (178 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/1 (179 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/2 (180 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/3 (181 ms) [----------] 12 tests from KeyExchangeTest/TlsKeyExchangeTest (2204 ms total) [----------] 88 tests from TlsPadding/TlsPaddingTest [ RUN ] TlsPadding/TlsPaddingTest.Correct/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fefefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.Correct/0 (4 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0e0e [ OK ] TlsPadding/TlsPaddingTest.Correct/1 (3 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fcfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.Correct/2 (5 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0c0c [ OK ] TlsPadding/TlsPaddingTest.Correct/3 (2 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fbfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.Correct/4 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0b0b [ OK ] TlsPadding/TlsPaddingTest.Correct/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f1f1... [ OK ] TlsPadding/TlsPaddingTest.Correct/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410101 [ OK ] TlsPadding/TlsPaddingTest.Correct/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f0... [ OK ] TlsPadding/TlsPaddingTest.Correct/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/9 Content length=31 padding length=0 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141414100 [ OK ] TlsPadding/TlsPaddingTest.Correct/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/12 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/15 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/18 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/19 Content length=287 padding length=0 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/21 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/0 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0e10 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/1 (2 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/2 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0c20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/3 (4 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/4 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0b20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/5 (4 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/6 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410120 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/7 (3 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/8 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/9 Content length=31 padding length=0 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141414120 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/9 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/10 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/12 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/13 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/14 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/15 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/16 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/17 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/18 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/19 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/21 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/21 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fffefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/0 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410f0e0e0e0e0e0e0e0e0e0e0e0e0e0e [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fdfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410d0c0c0c0c0c0c0c0c0c0c0c0c [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/3 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fcfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410c0b0b0b0b0b0b0b0b0b0b0b [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f2f1... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/6 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410201 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f1... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/8 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/9 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/14 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/19 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/20 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/21 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fefefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/0 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0f0e [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fcfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0d0c [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/3 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fbfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0c0b [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/5 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f1f1... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410201 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f0... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/8 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/9 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/11 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/13 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/16 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/18 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/19 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/21 (0 ms) [----------] 88 tests from TlsPadding/TlsPaddingTest (57 ms total) [----------] 8 tests from SkipTls10/TlsSkipTest [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateRsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [531] 020000510301ed149c2d821ee76f948225ddc41db665a598d6e804d94b074cf1... record new: [89] 020000510301ed149c2d821ee76f948225ddc41db665a598d6e804d94b074cf1... server: Original packet: [536] 1603010213020000510301ed149c2d821ee76f948225ddc41db665a598d6e804... server: Filtered packet: [94] 1603010059020000510301ed149c2d821ee76f948225ddc41db665a598d6e804... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateRsa/0 (24 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateDhe/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 0200005703019ff278b22bbc65b75aa14ba5fe9d5507a1051e2ef990f88deb98... record new: [298] 0200005703019ff278b22bbc65b75aa14ba5fe9d5507a1051e2ef990f88deb98... server: Original packet: [745] 16030102e40200005703019ff278b22bbc65b75aa14ba5fe9d5507a1051e2ef9... server: Filtered packet: [303] 160301012a0200005703019ff278b22bbc65b75aa14ba5fe9d5507a1051e2ef9... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateDhe/0 (34 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateEcdhe/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 02000057030140fde91dce2d3a2e84886b330909f802fcc635a32b47cf7bbb13... record new: [298] 02000057030140fde91dce2d3a2e84886b330909f802fcc635a32b47cf7bbb13... server: Original packet: [745] 16030102e402000057030140fde91dce2d3a2e84886b330909f802fcc635a32b... server: Filtered packet: [303] 160301012a02000057030140fde91dce2d3a2e84886b330909f802fcc635a32b... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateEcdhe/0 (34 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateEcdsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [556] 020000570301a9800a2071474976a4c605b2195def4e0cd076d632fff5b89f7f... record new: [241] 020000570301a9800a2071474976a4c605b2195def4e0cd076d632fff5b89f7f... server: Original packet: [561] 160301022c020000570301a9800a2071474976a4c605b2195def4e0cd076d632... server: Filtered packet: [246] 16030100f1020000570301a9800a2071474976a4c605b2195def4e0cd076d632... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateEcdsa/0 (17 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipServerKeyExchange/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [740] 020000570301a684818d7219818f20b801d3c0a5c8155411a42327fb75c947be... record new: [537] 020000570301a684818d7219818f20b801d3c0a5c8155411a42327fb75c947be... server: Original packet: [745] 16030102e4020000570301a684818d7219818f20b801d3c0a5c8155411a42327... server: Filtered packet: [542] 1603010219020000570301a684818d7219818f20b801d3c0a5c8155411a42327... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipServerKeyExchange/0 (35 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [557] 020000570301502792d8ab7b9cd8ed1fcf4a7e33cfc67bd7be928b9c2a387093... record new: [410] 020000570301502792d8ab7b9cd8ed1fcf4a7e33cfc67bd7be928b9c2a387093... server: Original packet: [562] 160301022d020000570301502792d8ab7b9cd8ed1fcf4a7e33cfc67bd7be928b... server: Filtered packet: [415] 160301019a020000570301502792d8ab7b9cd8ed1fcf4a7e33cfc67bd7be928b... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 (17 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertAndKeyExch/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 0200005703014959c38bbb2b480ee6a0636a21c23c1ead4e40c48647c3299336... record new: [298] 0200005703014959c38bbb2b480ee6a0636a21c23c1ead4e40c48647c3299336... Dropping handshake: 12 record old: [298] 0200005703014959c38bbb2b480ee6a0636a21c23c1ead4e40c48647c3299336... record new: [95] 0200005703014959c38bbb2b480ee6a0636a21c23c1ead4e40c48647c3299336... server: Original packet: [745] 16030102e40200005703014959c38bbb2b480ee6a0636a21c23c1ead4e40c486... server: Filtered packet: [100] 160301005f0200005703014959c38bbb2b480ee6a0636a21c23c1ead4e40c486... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertAndKeyExch/0 (35 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [556] 0200005703013577b66372827020e88d328c96f9a61dc5169f111d00d913cd5e... record new: [241] 0200005703013577b66372827020e88d328c96f9a61dc5169f111d00d913cd5e... Dropping handshake: 12 record old: [241] 0200005703013577b66372827020e88d328c96f9a61dc5169f111d00d913cd5e... record new: [95] 0200005703013577b66372827020e88d328c96f9a61dc5169f111d00d913cd5e... server: Original packet: [561] 160301022c0200005703013577b66372827020e88d328c96f9a61dc5169f111d... server: Filtered packet: [100] 160301005f0200005703013577b66372827020e88d328c96f9a61dc5169f111d... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 (17 ms) [----------] 8 tests from SkipTls10/TlsSkipTest (214 ms total) [----------] 32 tests from SkipVariants/TlsSkipTest [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [531] 02000051030288cfb1dae9673c80bca9e780ecd6698855ee24256e0676492dac... record new: [89] 02000051030288cfb1dae9673c80bca9e780ecd6698855ee24256e0676492dac... server: Original packet: [536] 160302021302000051030288cfb1dae9673c80bca9e780ecd6698855ee24256e... server: Filtered packet: [94] 160302005902000051030288cfb1dae9673c80bca9e780ecd6698855ee24256e... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/0 (25 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [531] 02000051030374244ff71ace79508c4d88a5730fd27984ee2154c2965cc8b81b... record new: [89] 02000051030374244ff71ace79508c4d88a5730fd27984ee2154c2965cc8b81b... server: Original packet: [536] 160303021302000051030374244ff71ace79508c4d88a5730fd27984ee2154c2... server: Filtered packet: [94] 160303005902000051030374244ff71ace79508c4d88a5730fd27984ee2154c2... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/1 (24 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [594] 16feff0000000000000000005d020000510000000000000051feff1e45cccc83... server: Filtered packet: [144] 16feff0000000000000000005d020000510000000000000051feff1e45cccc83... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/2 (25 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [594] 16fefd0000000000000000005d020000510000000000000051fefdacd2636527... server: Filtered packet: [144] 16fefd0000000000000000005d020000510000000000000051fefdacd2636527... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/3 (24 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 0200005703024365a0a3a7a8ffb4195a4442a8620ac78350319b0201124aed27... record new: [298] 0200005703024365a0a3a7a8ffb4195a4442a8620ac78350319b0201124aed27... server: Original packet: [745] 16030202e40200005703024365a0a3a7a8ffb4195a4442a8620ac78350319b02... server: Filtered packet: [303] 160302012a0200005703024365a0a3a7a8ffb4195a4442a8620ac78350319b02... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/0 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [742] 0200005703034e6ef5c755152edad95715645aabcea7b8c8f09fb4c0e4dbdfe2... record new: [300] 0200005703034e6ef5c755152edad95715645aabcea7b8c8f09fb4c0e4dbdfe2... server: Original packet: [747] 16030302e60200005703034e6ef5c755152edad95715645aabcea7b8c8f09fb4... server: Filtered packet: [305] 160303012c0200005703034e6ef5c755152edad95715645aabcea7b8c8f09fb4... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/1 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [211] 0c0000c700020000000000c703001741046eb67881e35e98cc25d8e1ac81a81c... record new: [211] 0c0000c700010000000000c703001741046eb67881e35e98cc25d8e1ac81a81c... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feffee63c2d4b5... server: Filtered packet: [374] 16feff00000000000000000063020000570000000000000057feffee63c2d4b5... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/2 (35 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [213] 0c0000c900020000000000c903001741046eb67881e35e98cc25d8e1ac81a81c... record new: [213] 0c0000c900010000000000c903001741046eb67881e35e98cc25d8e1ac81a81c... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefd07cadba644... server: Filtered packet: [376] 16fefd00000000000000000063020000570000000000000057fefd07cadba644... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/3 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 0200005703025bab0af34c5a77023440ce0eab0ba3d3c3822b7c0114904d0001... record new: [298] 0200005703025bab0af34c5a77023440ce0eab0ba3d3c3822b7c0114904d0001... server: Original packet: [745] 16030202e40200005703025bab0af34c5a77023440ce0eab0ba3d3c3822b7c01... server: Filtered packet: [303] 160302012a0200005703025bab0af34c5a77023440ce0eab0ba3d3c3822b7c01... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/0 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [742] 02000057030384cc7a5d37a922af14a434c9de116c9b331574b38e1c48193437... record new: [300] 02000057030384cc7a5d37a922af14a434c9de116c9b331574b38e1c48193437... server: Original packet: [747] 16030302e602000057030384cc7a5d37a922af14a434c9de116c9b331574b38e... server: Filtered packet: [305] 160303012c02000057030384cc7a5d37a922af14a434c9de116c9b331574b38e... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/1 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [211] 0c0000c700020000000000c703001741046eb67881e35e98cc25d8e1ac81a81c... record new: [211] 0c0000c700010000000000c703001741046eb67881e35e98cc25d8e1ac81a81c... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [824] 16feff00000000000000000063020000570000000000000057fefffd7c3ad973... server: Filtered packet: [374] 16feff00000000000000000063020000570000000000000057fefffd7c3ad973... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/2 (35 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [213] 0c0000c900020000000000c903001741046eb67881e35e98cc25d8e1ac81a81c... record new: [213] 0c0000c900010000000000c903001741046eb67881e35e98cc25d8e1ac81a81c... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefd6eb39da570... server: Filtered packet: [376] 16fefd00000000000000000063020000570000000000000057fefd6eb39da570... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/3 (35 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [557] 020000570302115856e3457c695295ef41dce1faec60e94a10f33b98f49b28bd... record new: [242] 020000570302115856e3457c695295ef41dce1faec60e94a10f33b98f49b28bd... server: Original packet: [562] 160302022d020000570302115856e3457c695295ef41dce1faec60e94a10f33b... server: Filtered packet: [247] 16030200f2020000570302115856e3457c695295ef41dce1faec60e94a10f33b... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/0 (17 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [557] 020000570303813c58b912458ad26425af2a3064b0391b51fb656e688f4f5102... record new: [242] 020000570303813c58b912458ad26425af2a3064b0391b51fb656e688f4f5102... server: Original packet: [562] 160303022d020000570303813c58b912458ad26425af2a3064b0391b51fb656e... server: Filtered packet: [247] 16030300f2020000570303813c58b912458ad26425af2a3064b0391b51fb656e... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/1 (17 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [323] 0b00013700010000000001370001340001313082012d3081d5a0030201020201... record new: [0] record old: [154] 0c00008e000200000000008e03001741046eb67881e35e98cc25d8e1ac81a81c... record new: [154] 0c00008e000100000000008e03001741046eb67881e35e98cc25d8e1ac81a81c... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [640] 16feff00000000000000000063020000570000000000000057feffe31508e4c6... server: Filtered packet: [317] 16feff00000000000000000063020000570000000000000057feffe31508e4c6... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/2 (17 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [323] 0b00013700010000000001370001340001313082012d3081d5a0030201020201... record new: [0] record old: [155] 0c00008f000200000000008f03001741046eb67881e35e98cc25d8e1ac81a81c... record new: [155] 0c00008f000100000000008f03001741046eb67881e35e98cc25d8e1ac81a81c... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [641] 16fefd00000000000000000063020000570000000000000057fefdfca194a947... server: Filtered packet: [318] 16fefd00000000000000000063020000570000000000000057fefdfca194a947... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/3 (17 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [740] 020000570302060d0fc36331be77945d584a2d84967b2715c1d5f9accca9b3fd... record new: [537] 020000570302060d0fc36331be77945d584a2d84967b2715c1d5f9accca9b3fd... server: Original packet: [745] 16030202e4020000570302060d0fc36331be77945d584a2d84967b2715c1d5f9... server: Filtered packet: [542] 1603020219020000570302060d0fc36331be77945d584a2d84967b2715c1d5f9... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/0 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [742] 02000057030394229323a1aea7c7c2e7fb82f2fec4995bf11ab30923082c0a76... record new: [537] 02000057030394229323a1aea7c7c2e7fb82f2fec4995bf11ab30923082c0a76... server: Original packet: [747] 16030302e602000057030394229323a1aea7c7c2e7fb82f2fec4995bf11ab309... server: Filtered packet: [542] 160303021902000057030394229323a1aea7c7c2e7fb82f2fec4995bf11ab309... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/1 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [211] 0c0000c700020000000000c703001741046eb67881e35e98cc25d8e1ac81a81c... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feffaace34b344... server: Filtered packet: [613] 16feff00000000000000000063020000570000000000000057feffaace34b344... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/2 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [213] 0c0000c900020000000000c903001741046eb67881e35e98cc25d8e1ac81a81c... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefd94b6d58a57... server: Filtered packet: [613] 16fefd00000000000000000063020000570000000000000057fefd94b6d58a57... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/3 (35 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [556] 0200005703023bf2c2a8bcfb230cdcf3fe468d64229381dfdd2a733b98b1a8eb... record new: [410] 0200005703023bf2c2a8bcfb230cdcf3fe468d64229381dfdd2a733b98b1a8eb... server: Original packet: [561] 160302022c0200005703023bf2c2a8bcfb230cdcf3fe468d64229381dfdd2a73... server: Filtered packet: [415] 160302019a0200005703023bf2c2a8bcfb230cdcf3fe468d64229381dfdd2a73... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 (17 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [558] 020000570303a06c9b519d49b8c3d23e376a7b16f19e8789278a1a9b10d3028d... record new: [410] 020000570303a06c9b519d49b8c3d23e376a7b16f19e8789278a1a9b10d3028d... server: Original packet: [563] 160303022e020000570303a06c9b519d49b8c3d23e376a7b16f19e8789278a1a... server: Filtered packet: [415] 160303019a020000570303a06c9b519d49b8c3d23e376a7b16f19e8789278a1a... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/1 (17 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [155] 0c00008f000200000000008f03001741046eb67881e35e98cc25d8e1ac81a81c... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [641] 16feff00000000000000000063020000570000000000000057feff1c3b3ef273... server: Filtered packet: [486] 16feff00000000000000000063020000570000000000000057feff1c3b3ef273... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/2 (17 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [156] 0c000090000200000000009003001741046eb67881e35e98cc25d8e1ac81a81c... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [642] 16fefd00000000000000000063020000570000000000000057fefd352fe78a76... server: Filtered packet: [486] 16fefd00000000000000000063020000570000000000000057fefd352fe78a76... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/3 (17 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 0200005703027fd33eece6968020ec2e9f385cef524adfb257913fd8e96fdc28... record new: [298] 0200005703027fd33eece6968020ec2e9f385cef524adfb257913fd8e96fdc28... Dropping handshake: 12 record old: [298] 0200005703027fd33eece6968020ec2e9f385cef524adfb257913fd8e96fdc28... record new: [95] 0200005703027fd33eece6968020ec2e9f385cef524adfb257913fd8e96fdc28... server: Original packet: [745] 16030202e40200005703027fd33eece6968020ec2e9f385cef524adfb257913f... server: Filtered packet: [100] 160302005f0200005703027fd33eece6968020ec2e9f385cef524adfb257913f... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/0 (35 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [742] 0200005703039e0d56551c3a47321a56a80b9748db336315931526e3bd9a7621... record new: [300] 0200005703039e0d56551c3a47321a56a80b9748db336315931526e3bd9a7621... Dropping handshake: 12 record old: [300] 0200005703039e0d56551c3a47321a56a80b9748db336315931526e3bd9a7621... record new: [95] 0200005703039e0d56551c3a47321a56a80b9748db336315931526e3bd9a7621... server: Original packet: [747] 16030302e60200005703039e0d56551c3a47321a56a80b9748db336315931526... server: Filtered packet: [100] 160303005f0200005703039e0d56551c3a47321a56a80b9748db336315931526... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/1 (35 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [211] 0c0000c700020000000000c703001741046eb67881e35e98cc25d8e1ac81a81c... record new: [211] 0c0000c700010000000000c703001741046eb67881e35e98cc25d8e1ac81a81c... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [211] 0c0000c700010000000000c703001741046eb67881e35e98cc25d8e1ac81a81c... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feffed8eb34163... server: Filtered packet: [163] 16feff00000000000000000063020000570000000000000057feffed8eb34163... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/2 (35 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [213] 0c0000c900020000000000c903001741046eb67881e35e98cc25d8e1ac81a81c... record new: [213] 0c0000c900010000000000c903001741046eb67881e35e98cc25d8e1ac81a81c... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [213] 0c0000c900010000000000c903001741046eb67881e35e98cc25d8e1ac81a81c... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefd883dee2909... server: Filtered packet: [163] 16fefd00000000000000000063020000570000000000000057fefd883dee2909... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/3 (49 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [556] 02000057030282050b0725cb88674fbcb666bba0aec1217f63c754f5eee23317... record new: [241] 02000057030282050b0725cb88674fbcb666bba0aec1217f63c754f5eee23317... Dropping handshake: 12 record old: [241] 02000057030282050b0725cb88674fbcb666bba0aec1217f63c754f5eee23317... record new: [95] 02000057030282050b0725cb88674fbcb666bba0aec1217f63c754f5eee23317... server: Original packet: [561] 160302022c02000057030282050b0725cb88674fbcb666bba0aec1217f63c754... server: Filtered packet: [100] 160302005f02000057030282050b0725cb88674fbcb666bba0aec1217f63c754... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 (31 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [559] 02000057030317d174f2539c60298627acbf5ecaedff20e8399e5ac2157cff82... record new: [244] 02000057030317d174f2539c60298627acbf5ecaedff20e8399e5ac2157cff82... Dropping handshake: 12 record old: [244] 02000057030317d174f2539c60298627acbf5ecaedff20e8399e5ac2157cff82... record new: [95] 02000057030317d174f2539c60298627acbf5ecaedff20e8399e5ac2157cff82... server: Original packet: [564] 160303022f02000057030317d174f2539c60298627acbf5ecaedff20e8399e5a... server: Filtered packet: [100] 160303005f02000057030317d174f2539c60298627acbf5ecaedff20e8399e5a... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/1 (18 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [323] 0b00013700010000000001370001340001313082012d3081d5a0030201020201... record new: [0] record old: [154] 0c00008e000200000000008e03001741046eb67881e35e98cc25d8e1ac81a81c... record new: [154] 0c00008e000100000000008e03001741046eb67881e35e98cc25d8e1ac81a81c... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [154] 0c00008e000100000000008e03001741046eb67881e35e98cc25d8e1ac81a81c... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [640] 16feff00000000000000000063020000570000000000000057feff9fef877dcc... server: Filtered packet: [163] 16feff00000000000000000063020000570000000000000057feff9fef877dcc... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/2 (18 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [323] 0b00013700010000000001370001340001313082012d3081d5a0030201020201... record new: [0] record old: [155] 0c00008f000200000000008f03001741046eb67881e35e98cc25d8e1ac81a81c... record new: [155] 0c00008f000100000000008f03001741046eb67881e35e98cc25d8e1ac81a81c... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [155] 0c00008f000100000000008f03001741046eb67881e35e98cc25d8e1ac81a81c... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [641] 16fefd00000000000000000063020000570000000000000057fefdf9d95bece3... server: Filtered packet: [163] 16fefd00000000000000000063020000570000000000000057fefdf9d95bece3... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/3 (18 ms) [----------] 32 tests from SkipVariants/TlsSkipTest (891 ms total) [----------] 10 tests from AllHashFuncs/TlsHkdfTest [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/0 Hash = SHA-256 Output: [32] 33ad0a1c607ec03b09e6cd9893680ce210adf300aa1f2660e1b22e10f170f92a [ OK ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/0 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/1 Hash = SHA-384 Output: [48] 7ee8206f5570023e6dc7519eb1073bc4e791ad37b5c382aa10ba18e2357e7169... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/1 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/0 Hash = SHA-256 Output: [32] 11873828a9197811339124b58a1bb09f7f0d8dbb10f49c54bd1fd885cd153033 [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/0 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/1 Hash = SHA-384 Output: [48] 51b1d5b4597979084a15b2db84d3d6bcfc9345d9dc74da1a57c2769f3f83452f... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/0 Hash = SHA-256 Output: [32] 2f5f78d0a4c436ee6c8a4ef9d043810213fd4783633ad2e1406d2d9800fdc187 [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/1 Hash = SHA-384 Output: [48] 7b40f9ef91ffc9d129245cbff8827668ae4b63e803dd39a8d46af6e5eceaf87d... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/1 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/0 Hash = SHA-256 Output: [32] 7953b8dd6b98ce00b7dce803708ce3ac068b22fd0e3448e6e5e08ad61618e548 [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/0 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/1 Hash = SHA-384 Output: [48] 0193c0073f6a830e2e4fb258e400085c689c37320037ffc31c5b980b02923ffd... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/0 Hash = SHA-256 Output: [32] 347c6780ff0bbad71c283b16eb2f9cf62d24e6cdb613d51776548cb07dcde74c [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/1 Hash = SHA-384 Output: [48] 4b1e5ec1493078ea35bd3f0104e61aea14cc182ad1c47621c464c04e4b361605... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/1 (1 ms) [----------] 10 tests from AllHashFuncs/TlsHkdfTest (8 ms total) [----------] Global test environment tear-down [==========] 785 tests from 14 test cases ran. (56823 ms total) [ PASSED ] 785 tests. ssl_gtest.sh: #4709: ssl_gtest run successfully - PASSED executing sed to parse the xml report processing the parsed report ssl_gtest.sh: #4710: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/0 ("TLS", 769, 5, 65537, 0)' - PASSED ssl_gtest.sh: #4711: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/1 ("TLS", 769, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #4712: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/2 ("TLS", 769, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #4713: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/3 ("TLS", 769, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #4714: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/4 ("TLS", 769, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #4715: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/5 ("TLS", 770, 5, 65537, 0)' - PASSED ssl_gtest.sh: #4716: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/6 ("TLS", 770, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #4717: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/7 ("TLS", 770, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #4718: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/8 ("TLS", 770, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #4719: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/9 ("TLS", 770, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #4720: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/10 ("TLS", 771, 5, 65537, 0)' - PASSED ssl_gtest.sh: #4721: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/11 ("TLS", 771, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #4722: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/12 ("TLS", 771, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #4723: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/13 ("TLS", 771, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #4724: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/14 ("TLS", 771, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #4725: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/0 ("TLS", 769, 5, 65537, 0)' - PASSED ssl_gtest.sh: #4726: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/1 ("TLS", 769, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #4727: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/2 ("TLS", 769, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #4728: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/3 ("TLS", 769, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #4729: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/4 ("TLS", 769, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #4730: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/5 ("TLS", 770, 5, 65537, 0)' - PASSED ssl_gtest.sh: #4731: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/6 ("TLS", 770, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #4732: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/7 ("TLS", 770, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #4733: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/8 ("TLS", 770, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #4734: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/9 ("TLS", 770, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #4735: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/10 ("TLS", 771, 5, 65537, 0)' - PASSED ssl_gtest.sh: #4736: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/11 ("TLS", 771, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #4737: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/12 ("TLS", 771, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #4738: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/13 ("TLS", 771, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #4739: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/14 ("TLS", 771, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #4740: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/0 ("TLS", 769, 5, 65537, 0)' - PASSED ssl_gtest.sh: #4741: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/1 ("TLS", 769, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #4742: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/2 ("TLS", 769, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #4743: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/3 ("TLS", 769, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #4744: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/4 ("TLS", 769, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #4745: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/5 ("TLS", 770, 5, 65537, 0)' - PASSED ssl_gtest.sh: #4746: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/6 ("TLS", 770, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #4747: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/7 ("TLS", 770, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #4748: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/8 ("TLS", 770, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #4749: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/9 ("TLS", 770, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #4750: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/10 ("TLS", 771, 5, 65537, 0)' - PASSED ssl_gtest.sh: #4751: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/11 ("TLS", 771, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #4752: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/12 ("TLS", 771, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #4753: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/13 ("TLS", 771, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #4754: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/14 ("TLS", 771, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #4755: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/0 ("TLS", 769, 5, 65537, 0)' - PASSED ssl_gtest.sh: #4756: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/1 ("TLS", 769, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #4757: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/2 ("TLS", 769, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #4758: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/3 ("TLS", 769, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #4759: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/4 ("TLS", 769, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #4760: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/5 ("TLS", 770, 5, 65537, 0)' - PASSED ssl_gtest.sh: #4761: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/6 ("TLS", 770, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #4762: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/7 ("TLS", 770, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #4763: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/8 ("TLS", 770, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #4764: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/9 ("TLS", 770, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #4765: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/10 ("TLS", 771, 5, 65537, 0)' - PASSED ssl_gtest.sh: #4766: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/11 ("TLS", 771, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #4767: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/12 ("TLS", 771, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #4768: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/13 ("TLS", 771, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #4769: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/14 ("TLS", 771, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #4770: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/0 ("TLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #4771: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/1 ("TLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #4772: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/2 ("TLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #4773: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/3 ("TLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #4774: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/4 ("TLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #4775: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/5 ("TLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #4776: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/6 ("DTLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #4777: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/7 ("DTLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #4778: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/8 ("DTLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #4779: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/9 ("DTLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #4780: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/10 ("DTLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #4781: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/11 ("DTLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #4782: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/0 ("TLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #4783: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/1 ("TLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #4784: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/2 ("TLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #4785: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/3 ("TLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #4786: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/4 ("TLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #4787: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/5 ("TLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #4788: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/6 ("DTLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #4789: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/7 ("DTLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #4790: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/8 ("DTLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #4791: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/9 ("DTLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #4792: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/10 ("DTLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #4793: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/11 ("DTLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #4794: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/0 ("TLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #4795: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/1 ("TLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #4796: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/2 ("TLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #4797: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/3 ("TLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #4798: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/4 ("TLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #4799: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/5 ("TLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #4800: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/6 ("DTLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #4801: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/7 ("DTLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #4802: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/8 ("DTLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #4803: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/9 ("DTLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #4804: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/10 ("DTLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #4805: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/11 ("DTLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #4806: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/0 ("TLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #4807: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/1 ("TLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #4808: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/2 ("TLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #4809: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/3 ("TLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #4810: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/4 ("TLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #4811: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/5 ("TLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #4812: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/6 ("DTLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #4813: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/7 ("DTLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #4814: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/8 ("DTLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #4815: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/9 ("DTLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #4816: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/10 ("DTLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #4817: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/11 ("DTLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #4818: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/0 ("TLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #4819: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/1 ("TLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #4820: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/2 ("TLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #4821: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/3 ("TLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #4822: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/4 ("TLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #4823: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/5 ("TLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #4824: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/6 ("DTLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #4825: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/7 ("DTLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #4826: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/8 ("DTLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #4827: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/9 ("DTLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #4828: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/10 ("DTLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #4829: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/11 ("DTLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #4830: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/0 ("TLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #4831: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/1 ("TLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #4832: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/2 ("TLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #4833: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/3 ("TLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #4834: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/4 ("TLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #4835: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/5 ("TLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #4836: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/6 ("DTLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #4837: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/7 ("DTLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #4838: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/8 ("DTLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #4839: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/9 ("DTLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #4840: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/10 ("DTLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #4841: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/11 ("DTLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #4842: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/0 ("TLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #4843: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/1 ("TLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #4844: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/2 ("TLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #4845: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/3 ("TLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #4846: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/4 ("TLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #4847: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/5 ("TLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #4848: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/6 ("DTLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #4849: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/7 ("DTLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #4850: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/8 ("DTLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #4851: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/9 ("DTLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #4852: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/10 ("DTLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #4853: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/11 ("DTLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #4854: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/0 ("TLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #4855: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/1 ("TLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #4856: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/2 ("TLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #4857: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/3 ("TLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #4858: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/4 ("TLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #4859: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/5 ("TLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #4860: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/6 ("DTLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #4861: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/7 ("DTLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #4862: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/8 ("DTLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #4863: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/9 ("DTLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #4864: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/10 ("DTLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #4865: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/11 ("DTLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #4866: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/0 ("TLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #4867: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/1 ("TLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #4868: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/2 ("TLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #4869: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/3 ("TLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #4870: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/4 ("TLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #4871: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/5 ("TLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #4872: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/6 ("TLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #4873: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/7 ("TLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #4874: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/8 ("DTLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #4875: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/9 ("DTLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #4876: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/10 ("DTLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #4877: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/11 ("DTLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #4878: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/12 ("DTLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #4879: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/13 ("DTLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #4880: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/14 ("DTLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #4881: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/15 ("DTLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #4882: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/0 ("TLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #4883: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/1 ("TLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #4884: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/2 ("TLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #4885: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/3 ("TLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #4886: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/4 ("TLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #4887: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/5 ("TLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #4888: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/6 ("TLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #4889: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/7 ("TLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #4890: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/8 ("DTLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #4891: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/9 ("DTLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #4892: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/10 ("DTLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #4893: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/11 ("DTLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #4894: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/12 ("DTLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #4895: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/13 ("DTLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #4896: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/14 ("DTLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #4897: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/15 ("DTLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #4898: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/0 ("TLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #4899: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/1 ("TLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #4900: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/2 ("TLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #4901: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/3 ("TLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #4902: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/4 ("TLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #4903: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/5 ("TLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #4904: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/6 ("TLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #4905: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/7 ("TLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #4906: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/8 ("DTLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #4907: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/9 ("DTLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #4908: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/10 ("DTLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #4909: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/11 ("DTLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #4910: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/12 ("DTLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #4911: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/13 ("DTLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #4912: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/14 ("DTLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #4913: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/15 ("DTLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #4914: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/0 ("TLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #4915: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/1 ("TLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #4916: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/2 ("TLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #4917: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/3 ("TLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #4918: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/4 ("TLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #4919: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/5 ("TLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #4920: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/6 ("TLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #4921: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/7 ("TLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #4922: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/8 ("DTLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #4923: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/9 ("DTLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #4924: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/10 ("DTLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #4925: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/11 ("DTLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #4926: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/12 ("DTLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #4927: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/13 ("DTLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #4928: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/14 ("DTLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #4929: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/15 ("DTLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #4930: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/0 ("TLS", 769, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #4931: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/1 ("TLS", 769, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #4932: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/2 ("TLS", 769, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #4933: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/3 ("TLS", 769, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #4934: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/4 ("TLS", 769, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #4935: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/5 ("TLS", 769, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #4936: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/6 ("TLS", 769, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #4937: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/7 ("TLS", 769, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #4938: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/8 ("TLS", 769, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #4939: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/9 ("TLS", 769, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #4940: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/10 ("TLS", 769, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #4941: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/11 ("TLS", 769, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #4942: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/12 ("TLS", 769, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #4943: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/13 ("TLS", 769, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #4944: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/14 ("TLS", 769, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #4945: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/15 ("TLS", 769, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #4946: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/16 ("TLS", 770, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #4947: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/17 ("TLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #4948: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/18 ("TLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #4949: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/19 ("TLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #4950: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/20 ("TLS", 770, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #4951: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/21 ("TLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #4952: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/22 ("TLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #4953: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/23 ("TLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #4954: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/24 ("TLS", 770, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #4955: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/25 ("TLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #4956: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/26 ("TLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #4957: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/27 ("TLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #4958: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/28 ("TLS", 770, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #4959: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/29 ("TLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #4960: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/30 ("TLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #4961: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/31 ("TLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #4962: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/32 ("TLS", 771, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #4963: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/33 ("TLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #4964: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/34 ("TLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #4965: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/35 ("TLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #4966: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/36 ("TLS", 771, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #4967: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/37 ("TLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #4968: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/38 ("TLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #4969: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/39 ("TLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #4970: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/40 ("TLS", 771, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #4971: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/41 ("TLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #4972: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/42 ("TLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #4973: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/43 ("TLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #4974: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/44 ("TLS", 771, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #4975: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/45 ("TLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #4976: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/46 ("TLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #4977: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/47 ("TLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #4978: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/0 ("TLS", 769, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #4979: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/1 ("TLS", 769, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #4980: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/2 ("TLS", 769, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #4981: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/3 ("TLS", 769, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #4982: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/4 ("TLS", 769, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #4983: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/5 ("TLS", 769, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #4984: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/6 ("TLS", 769, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #4985: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/7 ("TLS", 769, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #4986: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/8 ("TLS", 769, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #4987: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/9 ("TLS", 769, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #4988: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/10 ("TLS", 769, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #4989: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/11 ("TLS", 769, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #4990: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/12 ("TLS", 769, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #4991: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/13 ("TLS", 769, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #4992: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/14 ("TLS", 769, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #4993: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/15 ("TLS", 769, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #4994: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/16 ("TLS", 770, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #4995: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/17 ("TLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #4996: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/18 ("TLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #4997: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/19 ("TLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #4998: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/20 ("TLS", 770, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #4999: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/21 ("TLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #5000: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/22 ("TLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #5001: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/23 ("TLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #5002: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/24 ("TLS", 770, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #5003: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/25 ("TLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #5004: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/26 ("TLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #5005: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/27 ("TLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #5006: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/28 ("TLS", 770, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #5007: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/29 ("TLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #5008: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/30 ("TLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #5009: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/31 ("TLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #5010: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/32 ("TLS", 771, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #5011: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/33 ("TLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #5012: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/34 ("TLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #5013: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/35 ("TLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #5014: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/36 ("TLS", 771, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #5015: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/37 ("TLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #5016: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/38 ("TLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #5017: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/39 ("TLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #5018: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/40 ("TLS", 771, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #5019: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/41 ("TLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #5020: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/42 ("TLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #5021: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/43 ("TLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #5022: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/44 ("TLS", 771, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #5023: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/45 ("TLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #5024: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/46 ("TLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #5025: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/47 ("TLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #5026: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/0 ("TLS", 769, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #5027: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/1 ("TLS", 769, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #5028: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/2 ("TLS", 769, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #5029: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/3 ("TLS", 769, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #5030: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/4 ("TLS", 769, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #5031: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/5 ("TLS", 769, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #5032: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/6 ("TLS", 769, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #5033: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/7 ("TLS", 769, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #5034: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/8 ("TLS", 769, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #5035: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/9 ("TLS", 769, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #5036: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/10 ("TLS", 769, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #5037: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/11 ("TLS", 769, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #5038: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/12 ("TLS", 769, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #5039: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/13 ("TLS", 769, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #5040: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/14 ("TLS", 769, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #5041: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/15 ("TLS", 769, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #5042: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/16 ("TLS", 770, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #5043: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/17 ("TLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #5044: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/18 ("TLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #5045: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/19 ("TLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #5046: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/20 ("TLS", 770, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #5047: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/21 ("TLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #5048: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/22 ("TLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #5049: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/23 ("TLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #5050: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/24 ("TLS", 770, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #5051: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/25 ("TLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #5052: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/26 ("TLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #5053: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/27 ("TLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #5054: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/28 ("TLS", 770, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #5055: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/29 ("TLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #5056: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/30 ("TLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #5057: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/31 ("TLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #5058: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/32 ("TLS", 771, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #5059: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/33 ("TLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #5060: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/34 ("TLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #5061: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/35 ("TLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #5062: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/36 ("TLS", 771, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #5063: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/37 ("TLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #5064: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/38 ("TLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #5065: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/39 ("TLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #5066: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/40 ("TLS", 771, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #5067: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/41 ("TLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #5068: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/42 ("TLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #5069: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/43 ("TLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #5070: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/44 ("TLS", 771, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #5071: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/45 ("TLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #5072: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/46 ("TLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #5073: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/47 ("TLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #5074: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/0 ("TLS", 769, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #5075: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/1 ("TLS", 769, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #5076: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/2 ("TLS", 769, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #5077: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/3 ("TLS", 769, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #5078: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/4 ("TLS", 769, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #5079: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/5 ("TLS", 769, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #5080: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/6 ("TLS", 769, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #5081: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/7 ("TLS", 769, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #5082: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/8 ("TLS", 769, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #5083: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/9 ("TLS", 769, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #5084: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/10 ("TLS", 769, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #5085: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/11 ("TLS", 769, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #5086: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/12 ("TLS", 769, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #5087: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/13 ("TLS", 769, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #5088: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/14 ("TLS", 769, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #5089: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/15 ("TLS", 769, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #5090: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/16 ("TLS", 770, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #5091: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/17 ("TLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #5092: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/18 ("TLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #5093: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/19 ("TLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #5094: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/20 ("TLS", 770, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #5095: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/21 ("TLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #5096: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/22 ("TLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #5097: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/23 ("TLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #5098: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/24 ("TLS", 770, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #5099: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/25 ("TLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #5100: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/26 ("TLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #5101: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/27 ("TLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #5102: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/28 ("TLS", 770, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #5103: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/29 ("TLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #5104: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/30 ("TLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #5105: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/31 ("TLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #5106: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/32 ("TLS", 771, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #5107: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/33 ("TLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #5108: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/34 ("TLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #5109: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/35 ("TLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #5110: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/36 ("TLS", 771, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #5111: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/37 ("TLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #5112: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/38 ("TLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #5113: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/39 ("TLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #5114: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/40 ("TLS", 771, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #5115: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/41 ("TLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #5116: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/42 ("TLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #5117: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/43 ("TLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #5118: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/44 ("TLS", 771, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #5119: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/45 ("TLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #5120: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/46 ("TLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #5121: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/47 ("TLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #5122: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/0 ("DTLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #5123: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/1 ("DTLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #5124: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/2 ("DTLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #5125: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/3 ("DTLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #5126: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/4 ("DTLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #5127: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/5 ("DTLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #5128: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/6 ("DTLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #5129: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/7 ("DTLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #5130: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/8 ("DTLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #5131: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/9 ("DTLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #5132: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/10 ("DTLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #5133: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/11 ("DTLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #5134: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/12 ("DTLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #5135: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/13 ("DTLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #5136: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/14 ("DTLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #5137: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/15 ("DTLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #5138: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/16 ("DTLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #5139: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/17 ("DTLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #5140: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/18 ("DTLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #5141: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/19 ("DTLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #5142: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/20 ("DTLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #5143: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/21 ("DTLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #5144: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/22 ("DTLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #5145: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/23 ("DTLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #5146: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/0 ("DTLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #5147: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/1 ("DTLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #5148: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/2 ("DTLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #5149: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/3 ("DTLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #5150: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/4 ("DTLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #5151: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/5 ("DTLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #5152: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/6 ("DTLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #5153: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/7 ("DTLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #5154: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/8 ("DTLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #5155: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/9 ("DTLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #5156: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/10 ("DTLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #5157: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/11 ("DTLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #5158: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/12 ("DTLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #5159: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/13 ("DTLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #5160: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/14 ("DTLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #5161: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/15 ("DTLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #5162: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/16 ("DTLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #5163: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/17 ("DTLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #5164: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/18 ("DTLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #5165: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/19 ("DTLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #5166: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/20 ("DTLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #5167: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/21 ("DTLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #5168: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/22 ("DTLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #5169: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/23 ("DTLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #5170: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/0 ("DTLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #5171: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/1 ("DTLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #5172: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/2 ("DTLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #5173: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/3 ("DTLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #5174: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/4 ("DTLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #5175: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/5 ("DTLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #5176: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/6 ("DTLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #5177: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/7 ("DTLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #5178: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/8 ("DTLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #5179: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/9 ("DTLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #5180: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/10 ("DTLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #5181: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/11 ("DTLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #5182: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/12 ("DTLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #5183: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/13 ("DTLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #5184: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/14 ("DTLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #5185: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/15 ("DTLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #5186: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/16 ("DTLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #5187: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/17 ("DTLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #5188: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/18 ("DTLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #5189: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/19 ("DTLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #5190: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/20 ("DTLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #5191: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/21 ("DTLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #5192: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/22 ("DTLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #5193: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/23 ("DTLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #5194: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/0 ("DTLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #5195: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/1 ("DTLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #5196: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/2 ("DTLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #5197: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/3 ("DTLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #5198: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/4 ("DTLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #5199: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/5 ("DTLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #5200: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/6 ("DTLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #5201: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/7 ("DTLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #5202: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/8 ("DTLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #5203: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/9 ("DTLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #5204: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/10 ("DTLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #5205: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/11 ("DTLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #5206: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/12 ("DTLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #5207: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/13 ("DTLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #5208: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/14 ("DTLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #5209: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/15 ("DTLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #5210: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/16 ("DTLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #5211: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/17 ("DTLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #5212: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/18 ("DTLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #5213: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/19 ("DTLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #5214: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/20 ("DTLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #5215: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/21 ("DTLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #5216: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/22 ("DTLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #5217: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/23 ("DTLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #5218: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/0 TLS 1.0, TLS_ECDHE_RSA_WITH_NULL_SHA, name = "NULL", key size = 0' - PASSED ssl_gtest.sh: #5219: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/1 TLS 1.0, TLS_RSA_WITH_RC4_128_SHA, name = "RC4", key size = 128' - PASSED ssl_gtest.sh: #5220: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/2 TLS 1.0, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, name = "3DES-EDE-CBC", key size = 168' - PASSED ssl_gtest.sh: #5221: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/3 TLS 1.0, TLS_RSA_WITH_AES_128_CBC_SHA, name = "AES-128", key size = 128' - PASSED ssl_gtest.sh: #5222: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/4 TLS 1.2, TLS_RSA_WITH_AES_256_CBC_SHA256, name = "AES-256", key size = 256' - PASSED ssl_gtest.sh: #5223: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/5 TLS 1.2, TLS_RSA_WITH_AES_128_GCM_SHA256, name = "AES-128-GCM", key size = 128' - PASSED ssl_gtest.sh: #5224: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/6 TLS 1.2, TLS_RSA_WITH_AES_256_GCM_SHA384, name = "AES-256-GCM", key size = 256' - PASSED ssl_gtest.sh: #5225: 'DamageYStream/TlsDamageDHYTest: DamageServerY/0 ("TLS", 769, 0, true)' - PASSED ssl_gtest.sh: #5226: 'DamageYStream/TlsDamageDHYTest: DamageServerY/1 ("TLS", 769, 0, false)' - PASSED ssl_gtest.sh: #5227: 'DamageYStream/TlsDamageDHYTest: DamageServerY/2 ("TLS", 769, 1, true)' - PASSED ssl_gtest.sh: #5228: 'DamageYStream/TlsDamageDHYTest: DamageServerY/3 ("TLS", 769, 1, false)' - PASSED ssl_gtest.sh: #5229: 'DamageYStream/TlsDamageDHYTest: DamageServerY/4 ("TLS", 769, 2, true)' - PASSED ssl_gtest.sh: #5230: 'DamageYStream/TlsDamageDHYTest: DamageServerY/5 ("TLS", 769, 2, false)' - PASSED ssl_gtest.sh: #5231: 'DamageYStream/TlsDamageDHYTest: DamageServerY/6 ("TLS", 769, 3, true)' - PASSED ssl_gtest.sh: #5232: 'DamageYStream/TlsDamageDHYTest: DamageServerY/7 ("TLS", 769, 3, false)' - PASSED ssl_gtest.sh: #5233: 'DamageYStream/TlsDamageDHYTest: DamageServerY/8 ("TLS", 769, 4, true)' - PASSED ssl_gtest.sh: #5234: 'DamageYStream/TlsDamageDHYTest: DamageServerY/9 ("TLS", 769, 4, false)' - PASSED ssl_gtest.sh: #5235: 'DamageYStream/TlsDamageDHYTest: DamageServerY/10 ("TLS", 769, 5, true)' - PASSED ssl_gtest.sh: #5236: 'DamageYStream/TlsDamageDHYTest: DamageServerY/11 ("TLS", 769, 5, false)' - PASSED ssl_gtest.sh: #5237: 'DamageYStream/TlsDamageDHYTest: DamageServerY/12 ("TLS", 770, 0, true)' - PASSED ssl_gtest.sh: #5238: 'DamageYStream/TlsDamageDHYTest: DamageServerY/13 ("TLS", 770, 0, false)' - PASSED ssl_gtest.sh: #5239: 'DamageYStream/TlsDamageDHYTest: DamageServerY/14 ("TLS", 770, 1, true)' - PASSED ssl_gtest.sh: #5240: 'DamageYStream/TlsDamageDHYTest: DamageServerY/15 ("TLS", 770, 1, false)' - PASSED ssl_gtest.sh: #5241: 'DamageYStream/TlsDamageDHYTest: DamageServerY/16 ("TLS", 770, 2, true)' - PASSED ssl_gtest.sh: #5242: 'DamageYStream/TlsDamageDHYTest: DamageServerY/17 ("TLS", 770, 2, false)' - PASSED ssl_gtest.sh: #5243: 'DamageYStream/TlsDamageDHYTest: DamageServerY/18 ("TLS", 770, 3, true)' - PASSED ssl_gtest.sh: #5244: 'DamageYStream/TlsDamageDHYTest: DamageServerY/19 ("TLS", 770, 3, false)' - PASSED ssl_gtest.sh: #5245: 'DamageYStream/TlsDamageDHYTest: DamageServerY/20 ("TLS", 770, 4, true)' - PASSED ssl_gtest.sh: #5246: 'DamageYStream/TlsDamageDHYTest: DamageServerY/21 ("TLS", 770, 4, false)' - PASSED ssl_gtest.sh: #5247: 'DamageYStream/TlsDamageDHYTest: DamageServerY/22 ("TLS", 770, 5, true)' - PASSED ssl_gtest.sh: #5248: 'DamageYStream/TlsDamageDHYTest: DamageServerY/23 ("TLS", 770, 5, false)' - PASSED ssl_gtest.sh: #5249: 'DamageYStream/TlsDamageDHYTest: DamageServerY/24 ("TLS", 771, 0, true)' - PASSED ssl_gtest.sh: #5250: 'DamageYStream/TlsDamageDHYTest: DamageServerY/25 ("TLS", 771, 0, false)' - PASSED ssl_gtest.sh: #5251: 'DamageYStream/TlsDamageDHYTest: DamageServerY/26 ("TLS", 771, 1, true)' - PASSED ssl_gtest.sh: #5252: 'DamageYStream/TlsDamageDHYTest: DamageServerY/27 ("TLS", 771, 1, false)' - PASSED ssl_gtest.sh: #5253: 'DamageYStream/TlsDamageDHYTest: DamageServerY/28 ("TLS", 771, 2, true)' - PASSED ssl_gtest.sh: #5254: 'DamageYStream/TlsDamageDHYTest: DamageServerY/29 ("TLS", 771, 2, false)' - PASSED ssl_gtest.sh: #5255: 'DamageYStream/TlsDamageDHYTest: DamageServerY/30 ("TLS", 771, 3, true)' - PASSED ssl_gtest.sh: #5256: 'DamageYStream/TlsDamageDHYTest: DamageServerY/31 ("TLS", 771, 3, false)' - PASSED ssl_gtest.sh: #5257: 'DamageYStream/TlsDamageDHYTest: DamageServerY/32 ("TLS", 771, 4, true)' - PASSED ssl_gtest.sh: #5258: 'DamageYStream/TlsDamageDHYTest: DamageServerY/33 ("TLS", 771, 4, false)' - PASSED ssl_gtest.sh: #5259: 'DamageYStream/TlsDamageDHYTest: DamageServerY/34 ("TLS", 771, 5, true)' - PASSED ssl_gtest.sh: #5260: 'DamageYStream/TlsDamageDHYTest: DamageServerY/35 ("TLS", 771, 5, false)' - PASSED ssl_gtest.sh: #5261: 'DamageYStream/TlsDamageDHYTest: DamageClientY/0 ("TLS", 769, 0, true)' - PASSED ssl_gtest.sh: #5262: 'DamageYStream/TlsDamageDHYTest: DamageClientY/1 ("TLS", 769, 0, false)' - PASSED ssl_gtest.sh: #5263: 'DamageYStream/TlsDamageDHYTest: DamageClientY/2 ("TLS", 769, 1, true)' - PASSED ssl_gtest.sh: #5264: 'DamageYStream/TlsDamageDHYTest: DamageClientY/3 ("TLS", 769, 1, false)' - PASSED ssl_gtest.sh: #5265: 'DamageYStream/TlsDamageDHYTest: DamageClientY/4 ("TLS", 769, 2, true)' - PASSED ssl_gtest.sh: #5266: 'DamageYStream/TlsDamageDHYTest: DamageClientY/5 ("TLS", 769, 2, false)' - PASSED ssl_gtest.sh: #5267: 'DamageYStream/TlsDamageDHYTest: DamageClientY/6 ("TLS", 769, 3, true)' - PASSED ssl_gtest.sh: #5268: 'DamageYStream/TlsDamageDHYTest: DamageClientY/7 ("TLS", 769, 3, false)' - PASSED ssl_gtest.sh: #5269: 'DamageYStream/TlsDamageDHYTest: DamageClientY/8 ("TLS", 769, 4, true)' - PASSED ssl_gtest.sh: #5270: 'DamageYStream/TlsDamageDHYTest: DamageClientY/9 ("TLS", 769, 4, false)' - PASSED ssl_gtest.sh: #5271: 'DamageYStream/TlsDamageDHYTest: DamageClientY/10 ("TLS", 769, 5, true)' - PASSED ssl_gtest.sh: #5272: 'DamageYStream/TlsDamageDHYTest: DamageClientY/11 ("TLS", 769, 5, false)' - PASSED ssl_gtest.sh: #5273: 'DamageYStream/TlsDamageDHYTest: DamageClientY/12 ("TLS", 770, 0, true)' - PASSED ssl_gtest.sh: #5274: 'DamageYStream/TlsDamageDHYTest: DamageClientY/13 ("TLS", 770, 0, false)' - PASSED ssl_gtest.sh: #5275: 'DamageYStream/TlsDamageDHYTest: DamageClientY/14 ("TLS", 770, 1, true)' - PASSED ssl_gtest.sh: #5276: 'DamageYStream/TlsDamageDHYTest: DamageClientY/15 ("TLS", 770, 1, false)' - PASSED ssl_gtest.sh: #5277: 'DamageYStream/TlsDamageDHYTest: DamageClientY/16 ("TLS", 770, 2, true)' - PASSED ssl_gtest.sh: #5278: 'DamageYStream/TlsDamageDHYTest: DamageClientY/17 ("TLS", 770, 2, false)' - PASSED ssl_gtest.sh: #5279: 'DamageYStream/TlsDamageDHYTest: DamageClientY/18 ("TLS", 770, 3, true)' - PASSED ssl_gtest.sh: #5280: 'DamageYStream/TlsDamageDHYTest: DamageClientY/19 ("TLS", 770, 3, false)' - PASSED ssl_gtest.sh: #5281: 'DamageYStream/TlsDamageDHYTest: DamageClientY/20 ("TLS", 770, 4, true)' - PASSED ssl_gtest.sh: #5282: 'DamageYStream/TlsDamageDHYTest: DamageClientY/21 ("TLS", 770, 4, false)' - PASSED ssl_gtest.sh: #5283: 'DamageYStream/TlsDamageDHYTest: DamageClientY/22 ("TLS", 770, 5, true)' - PASSED ssl_gtest.sh: #5284: 'DamageYStream/TlsDamageDHYTest: DamageClientY/23 ("TLS", 770, 5, false)' - PASSED ssl_gtest.sh: #5285: 'DamageYStream/TlsDamageDHYTest: DamageClientY/24 ("TLS", 771, 0, true)' - PASSED ssl_gtest.sh: #5286: 'DamageYStream/TlsDamageDHYTest: DamageClientY/25 ("TLS", 771, 0, false)' - PASSED ssl_gtest.sh: #5287: 'DamageYStream/TlsDamageDHYTest: DamageClientY/26 ("TLS", 771, 1, true)' - PASSED ssl_gtest.sh: #5288: 'DamageYStream/TlsDamageDHYTest: DamageClientY/27 ("TLS", 771, 1, false)' - PASSED ssl_gtest.sh: #5289: 'DamageYStream/TlsDamageDHYTest: DamageClientY/28 ("TLS", 771, 2, true)' - PASSED ssl_gtest.sh: #5290: 'DamageYStream/TlsDamageDHYTest: DamageClientY/29 ("TLS", 771, 2, false)' - PASSED ssl_gtest.sh: #5291: 'DamageYStream/TlsDamageDHYTest: DamageClientY/30 ("TLS", 771, 3, true)' - PASSED ssl_gtest.sh: #5292: 'DamageYStream/TlsDamageDHYTest: DamageClientY/31 ("TLS", 771, 3, false)' - PASSED ssl_gtest.sh: #5293: 'DamageYStream/TlsDamageDHYTest: DamageClientY/32 ("TLS", 771, 4, true)' - PASSED ssl_gtest.sh: #5294: 'DamageYStream/TlsDamageDHYTest: DamageClientY/33 ("TLS", 771, 4, false)' - PASSED ssl_gtest.sh: #5295: 'DamageYStream/TlsDamageDHYTest: DamageClientY/34 ("TLS", 771, 5, true)' - PASSED ssl_gtest.sh: #5296: 'DamageYStream/TlsDamageDHYTest: DamageClientY/35 ("TLS", 771, 5, false)' - PASSED ssl_gtest.sh: #5297: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/0 ("DTLS", 770, 0, true)' - PASSED ssl_gtest.sh: #5298: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/1 ("DTLS", 770, 0, false)' - PASSED ssl_gtest.sh: #5299: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/2 ("DTLS", 770, 1, true)' - PASSED ssl_gtest.sh: #5300: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/3 ("DTLS", 770, 1, false)' - PASSED ssl_gtest.sh: #5301: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/4 ("DTLS", 770, 2, true)' - PASSED ssl_gtest.sh: #5302: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/5 ("DTLS", 770, 2, false)' - PASSED ssl_gtest.sh: #5303: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/6 ("DTLS", 770, 3, true)' - PASSED ssl_gtest.sh: #5304: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/7 ("DTLS", 770, 3, false)' - PASSED ssl_gtest.sh: #5305: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/8 ("DTLS", 770, 4, true)' - PASSED ssl_gtest.sh: #5306: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/9 ("DTLS", 770, 4, false)' - PASSED ssl_gtest.sh: #5307: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/10 ("DTLS", 770, 5, true)' - PASSED ssl_gtest.sh: #5308: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/11 ("DTLS", 770, 5, false)' - PASSED ssl_gtest.sh: #5309: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/12 ("DTLS", 771, 0, true)' - PASSED ssl_gtest.sh: #5310: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/13 ("DTLS", 771, 0, false)' - PASSED ssl_gtest.sh: #5311: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/14 ("DTLS", 771, 1, true)' - PASSED ssl_gtest.sh: #5312: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/15 ("DTLS", 771, 1, false)' - PASSED ssl_gtest.sh: #5313: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/16 ("DTLS", 771, 2, true)' - PASSED ssl_gtest.sh: #5314: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/17 ("DTLS", 771, 2, false)' - PASSED ssl_gtest.sh: #5315: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/18 ("DTLS", 771, 3, true)' - PASSED ssl_gtest.sh: #5316: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/19 ("DTLS", 771, 3, false)' - PASSED ssl_gtest.sh: #5317: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/20 ("DTLS", 771, 4, true)' - PASSED ssl_gtest.sh: #5318: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/21 ("DTLS", 771, 4, false)' - PASSED ssl_gtest.sh: #5319: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/22 ("DTLS", 771, 5, true)' - PASSED ssl_gtest.sh: #5320: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/23 ("DTLS", 771, 5, false)' - PASSED ssl_gtest.sh: #5321: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/0 ("DTLS", 770, 0, true)' - PASSED ssl_gtest.sh: #5322: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/1 ("DTLS", 770, 0, false)' - PASSED ssl_gtest.sh: #5323: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/2 ("DTLS", 770, 1, true)' - PASSED ssl_gtest.sh: #5324: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/3 ("DTLS", 770, 1, false)' - PASSED ssl_gtest.sh: #5325: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/4 ("DTLS", 770, 2, true)' - PASSED ssl_gtest.sh: #5326: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/5 ("DTLS", 770, 2, false)' - PASSED ssl_gtest.sh: #5327: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/6 ("DTLS", 770, 3, true)' - PASSED ssl_gtest.sh: #5328: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/7 ("DTLS", 770, 3, false)' - PASSED ssl_gtest.sh: #5329: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/8 ("DTLS", 770, 4, true)' - PASSED ssl_gtest.sh: #5330: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/9 ("DTLS", 770, 4, false)' - PASSED ssl_gtest.sh: #5331: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/10 ("DTLS", 770, 5, true)' - PASSED ssl_gtest.sh: #5332: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/11 ("DTLS", 770, 5, false)' - PASSED ssl_gtest.sh: #5333: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/12 ("DTLS", 771, 0, true)' - PASSED ssl_gtest.sh: #5334: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/13 ("DTLS", 771, 0, false)' - PASSED ssl_gtest.sh: #5335: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/14 ("DTLS", 771, 1, true)' - PASSED ssl_gtest.sh: #5336: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/15 ("DTLS", 771, 1, false)' - PASSED ssl_gtest.sh: #5337: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/16 ("DTLS", 771, 2, true)' - PASSED ssl_gtest.sh: #5338: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/17 ("DTLS", 771, 2, false)' - PASSED ssl_gtest.sh: #5339: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/18 ("DTLS", 771, 3, true)' - PASSED ssl_gtest.sh: #5340: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/19 ("DTLS", 771, 3, false)' - PASSED ssl_gtest.sh: #5341: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/20 ("DTLS", 771, 4, true)' - PASSED ssl_gtest.sh: #5342: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/21 ("DTLS", 771, 4, false)' - PASSED ssl_gtest.sh: #5343: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/22 ("DTLS", 771, 5, true)' - PASSED ssl_gtest.sh: #5344: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/23 ("DTLS", 771, 5, false)' - PASSED ssl_gtest.sh: #5345: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/0 ("TLS", 771)' - PASSED ssl_gtest.sh: #5346: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/1 ("TLS", 770)' - PASSED ssl_gtest.sh: #5347: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/2 ("DTLS", 771)' - PASSED ssl_gtest.sh: #5348: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/3 ("DTLS", 770)' - PASSED ssl_gtest.sh: #5349: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/0 ("TLS", 771)' - PASSED ssl_gtest.sh: #5350: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/1 ("TLS", 770)' - PASSED ssl_gtest.sh: #5351: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/2 ("DTLS", 771)' - PASSED ssl_gtest.sh: #5352: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/3 ("DTLS", 770)' - PASSED ssl_gtest.sh: #5353: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/0 ("TLS", 771)' - PASSED ssl_gtest.sh: #5354: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/1 ("TLS", 770)' - PASSED ssl_gtest.sh: #5355: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/2 ("DTLS", 771)' - PASSED ssl_gtest.sh: #5356: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/3 ("DTLS", 770)' - PASSED ssl_gtest.sh: #5357: 'TlsPadding/TlsPaddingTest: Correct/0 (1, true)' - PASSED ssl_gtest.sh: #5358: 'TlsPadding/TlsPaddingTest: Correct/1 (1, false)' - PASSED ssl_gtest.sh: #5359: 'TlsPadding/TlsPaddingTest: Correct/2 (19, true)' - PASSED ssl_gtest.sh: #5360: 'TlsPadding/TlsPaddingTest: Correct/3 (19, false)' - PASSED ssl_gtest.sh: #5361: 'TlsPadding/TlsPaddingTest: Correct/4 (20, true)' - PASSED ssl_gtest.sh: #5362: 'TlsPadding/TlsPaddingTest: Correct/5 (20, false)' - PASSED ssl_gtest.sh: #5363: 'TlsPadding/TlsPaddingTest: Correct/6 (30, true)' - PASSED ssl_gtest.sh: #5364: 'TlsPadding/TlsPaddingTest: Correct/7 (30, false)' - PASSED ssl_gtest.sh: #5365: 'TlsPadding/TlsPaddingTest: Correct/8 (31, true)' - PASSED ssl_gtest.sh: #5366: 'TlsPadding/TlsPaddingTest: Correct/9 (31, false)' - PASSED ssl_gtest.sh: #5367: 'TlsPadding/TlsPaddingTest: Correct/10 (32, true)' - PASSED ssl_gtest.sh: #5368: 'TlsPadding/TlsPaddingTest: Correct/11 (32, false)' - PASSED ssl_gtest.sh: #5369: 'TlsPadding/TlsPaddingTest: Correct/12 (36, true)' - PASSED ssl_gtest.sh: #5370: 'TlsPadding/TlsPaddingTest: Correct/13 (36, false)' - PASSED ssl_gtest.sh: #5371: 'TlsPadding/TlsPaddingTest: Correct/14 (256, true)' - PASSED ssl_gtest.sh: #5372: 'TlsPadding/TlsPaddingTest: Correct/15 (256, false)' - PASSED ssl_gtest.sh: #5373: 'TlsPadding/TlsPaddingTest: Correct/16 (257, true)' - PASSED ssl_gtest.sh: #5374: 'TlsPadding/TlsPaddingTest: Correct/17 (257, false)' - PASSED ssl_gtest.sh: #5375: 'TlsPadding/TlsPaddingTest: Correct/18 (287, true)' - PASSED ssl_gtest.sh: #5376: 'TlsPadding/TlsPaddingTest: Correct/19 (287, false)' - PASSED ssl_gtest.sh: #5377: 'TlsPadding/TlsPaddingTest: Correct/20 (288, true)' - PASSED ssl_gtest.sh: #5378: 'TlsPadding/TlsPaddingTest: Correct/21 (288, false)' - PASSED ssl_gtest.sh: #5379: 'TlsPadding/TlsPaddingTest: PadTooLong/0 (1, true)' - PASSED ssl_gtest.sh: #5380: 'TlsPadding/TlsPaddingTest: PadTooLong/1 (1, false)' - PASSED ssl_gtest.sh: #5381: 'TlsPadding/TlsPaddingTest: PadTooLong/2 (19, true)' - PASSED ssl_gtest.sh: #5382: 'TlsPadding/TlsPaddingTest: PadTooLong/3 (19, false)' - PASSED ssl_gtest.sh: #5383: 'TlsPadding/TlsPaddingTest: PadTooLong/4 (20, true)' - PASSED ssl_gtest.sh: #5384: 'TlsPadding/TlsPaddingTest: PadTooLong/5 (20, false)' - PASSED ssl_gtest.sh: #5385: 'TlsPadding/TlsPaddingTest: PadTooLong/6 (30, true)' - PASSED ssl_gtest.sh: #5386: 'TlsPadding/TlsPaddingTest: PadTooLong/7 (30, false)' - PASSED ssl_gtest.sh: #5387: 'TlsPadding/TlsPaddingTest: PadTooLong/8 (31, true)' - PASSED ssl_gtest.sh: #5388: 'TlsPadding/TlsPaddingTest: PadTooLong/9 (31, false)' - PASSED ssl_gtest.sh: #5389: 'TlsPadding/TlsPaddingTest: PadTooLong/10 (32, true)' - PASSED ssl_gtest.sh: #5390: 'TlsPadding/TlsPaddingTest: PadTooLong/11 (32, false)' - PASSED ssl_gtest.sh: #5391: 'TlsPadding/TlsPaddingTest: PadTooLong/12 (36, true)' - PASSED ssl_gtest.sh: #5392: 'TlsPadding/TlsPaddingTest: PadTooLong/13 (36, false)' - PASSED ssl_gtest.sh: #5393: 'TlsPadding/TlsPaddingTest: PadTooLong/14 (256, true)' - PASSED ssl_gtest.sh: #5394: 'TlsPadding/TlsPaddingTest: PadTooLong/15 (256, false)' - PASSED ssl_gtest.sh: #5395: 'TlsPadding/TlsPaddingTest: PadTooLong/16 (257, true)' - PASSED ssl_gtest.sh: #5396: 'TlsPadding/TlsPaddingTest: PadTooLong/17 (257, false)' - PASSED ssl_gtest.sh: #5397: 'TlsPadding/TlsPaddingTest: PadTooLong/18 (287, true)' - PASSED ssl_gtest.sh: #5398: 'TlsPadding/TlsPaddingTest: PadTooLong/19 (287, false)' - PASSED ssl_gtest.sh: #5399: 'TlsPadding/TlsPaddingTest: PadTooLong/20 (288, true)' - PASSED ssl_gtest.sh: #5400: 'TlsPadding/TlsPaddingTest: PadTooLong/21 (288, false)' - PASSED ssl_gtest.sh: #5401: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/0 (1, true)' - PASSED ssl_gtest.sh: #5402: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/1 (1, false)' - PASSED ssl_gtest.sh: #5403: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/2 (19, true)' - PASSED ssl_gtest.sh: #5404: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/3 (19, false)' - PASSED ssl_gtest.sh: #5405: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/4 (20, true)' - PASSED ssl_gtest.sh: #5406: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/5 (20, false)' - PASSED ssl_gtest.sh: #5407: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/6 (30, true)' - PASSED ssl_gtest.sh: #5408: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/7 (30, false)' - PASSED ssl_gtest.sh: #5409: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/8 (31, true)' - PASSED ssl_gtest.sh: #5410: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/9 (31, false)' - PASSED ssl_gtest.sh: #5411: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/10 (32, true)' - PASSED ssl_gtest.sh: #5412: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/11 (32, false)' - PASSED ssl_gtest.sh: #5413: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/12 (36, true)' - PASSED ssl_gtest.sh: #5414: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/13 (36, false)' - PASSED ssl_gtest.sh: #5415: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/14 (256, true)' - PASSED ssl_gtest.sh: #5416: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/15 (256, false)' - PASSED ssl_gtest.sh: #5417: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/16 (257, true)' - PASSED ssl_gtest.sh: #5418: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/17 (257, false)' - PASSED ssl_gtest.sh: #5419: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/18 (287, true)' - PASSED ssl_gtest.sh: #5420: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/19 (287, false)' - PASSED ssl_gtest.sh: #5421: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/20 (288, true)' - PASSED ssl_gtest.sh: #5422: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/21 (288, false)' - PASSED ssl_gtest.sh: #5423: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/0 (1, true)' - PASSED ssl_gtest.sh: #5424: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/1 (1, false)' - PASSED ssl_gtest.sh: #5425: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/2 (19, true)' - PASSED ssl_gtest.sh: #5426: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/3 (19, false)' - PASSED ssl_gtest.sh: #5427: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/4 (20, true)' - PASSED ssl_gtest.sh: #5428: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/5 (20, false)' - PASSED ssl_gtest.sh: #5429: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/6 (30, true)' - PASSED ssl_gtest.sh: #5430: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/7 (30, false)' - PASSED ssl_gtest.sh: #5431: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/8 (31, true)' - PASSED ssl_gtest.sh: #5432: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/9 (31, false)' - PASSED ssl_gtest.sh: #5433: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/10 (32, true)' - PASSED ssl_gtest.sh: #5434: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/11 (32, false)' - PASSED ssl_gtest.sh: #5435: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/12 (36, true)' - PASSED ssl_gtest.sh: #5436: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/13 (36, false)' - PASSED ssl_gtest.sh: #5437: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/14 (256, true)' - PASSED ssl_gtest.sh: #5438: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/15 (256, false)' - PASSED ssl_gtest.sh: #5439: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/16 (257, true)' - PASSED ssl_gtest.sh: #5440: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/17 (257, false)' - PASSED ssl_gtest.sh: #5441: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/18 (287, true)' - PASSED ssl_gtest.sh: #5442: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/19 (287, false)' - PASSED ssl_gtest.sh: #5443: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/20 (288, true)' - PASSED ssl_gtest.sh: #5444: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/21 (288, false)' - PASSED ssl_gtest.sh: #5445: 'SkipTls10/TlsSkipTest: SkipCertificateRsa/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #5446: 'SkipTls10/TlsSkipTest: SkipCertificateDhe/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #5447: 'SkipTls10/TlsSkipTest: SkipCertificateEcdhe/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #5448: 'SkipTls10/TlsSkipTest: SkipCertificateEcdsa/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #5449: 'SkipTls10/TlsSkipTest: SkipServerKeyExchange/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #5450: 'SkipTls10/TlsSkipTest: SkipServerKeyExchangeEcdsa/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #5451: 'SkipTls10/TlsSkipTest: SkipCertAndKeyExch/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #5452: 'SkipTls10/TlsSkipTest: SkipCertAndKeyExchEcdsa/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #5453: 'SkipVariants/TlsSkipTest: SkipCertificateRsa/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #5454: 'SkipVariants/TlsSkipTest: SkipCertificateRsa/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #5455: 'SkipVariants/TlsSkipTest: SkipCertificateRsa/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #5456: 'SkipVariants/TlsSkipTest: SkipCertificateRsa/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #5457: 'SkipVariants/TlsSkipTest: SkipCertificateDhe/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #5458: 'SkipVariants/TlsSkipTest: SkipCertificateDhe/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #5459: 'SkipVariants/TlsSkipTest: SkipCertificateDhe/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #5460: 'SkipVariants/TlsSkipTest: SkipCertificateDhe/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #5461: 'SkipVariants/TlsSkipTest: SkipCertificateEcdhe/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #5462: 'SkipVariants/TlsSkipTest: SkipCertificateEcdhe/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #5463: 'SkipVariants/TlsSkipTest: SkipCertificateEcdhe/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #5464: 'SkipVariants/TlsSkipTest: SkipCertificateEcdhe/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #5465: 'SkipVariants/TlsSkipTest: SkipCertificateEcdsa/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #5466: 'SkipVariants/TlsSkipTest: SkipCertificateEcdsa/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #5467: 'SkipVariants/TlsSkipTest: SkipCertificateEcdsa/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #5468: 'SkipVariants/TlsSkipTest: SkipCertificateEcdsa/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #5469: 'SkipVariants/TlsSkipTest: SkipServerKeyExchange/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #5470: 'SkipVariants/TlsSkipTest: SkipServerKeyExchange/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #5471: 'SkipVariants/TlsSkipTest: SkipServerKeyExchange/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #5472: 'SkipVariants/TlsSkipTest: SkipServerKeyExchange/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #5473: 'SkipVariants/TlsSkipTest: SkipServerKeyExchangeEcdsa/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #5474: 'SkipVariants/TlsSkipTest: SkipServerKeyExchangeEcdsa/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #5475: 'SkipVariants/TlsSkipTest: SkipServerKeyExchangeEcdsa/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #5476: 'SkipVariants/TlsSkipTest: SkipServerKeyExchangeEcdsa/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #5477: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExch/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #5478: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExch/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #5479: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExch/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #5480: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExch/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #5481: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExchEcdsa/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #5482: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExchEcdsa/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #5483: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExchEcdsa/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #5484: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExchEcdsa/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #5485: 'AllHashFuncs/TlsHkdfTest: HkdfNullNull/0 4' - PASSED ssl_gtest.sh: #5486: 'AllHashFuncs/TlsHkdfTest: HkdfNullNull/1 5' - PASSED ssl_gtest.sh: #5487: 'AllHashFuncs/TlsHkdfTest: HkdfKey1Only/0 4' - PASSED ssl_gtest.sh: #5488: 'AllHashFuncs/TlsHkdfTest: HkdfKey1Only/1 5' - PASSED ssl_gtest.sh: #5489: 'AllHashFuncs/TlsHkdfTest: HkdfKey2Only/0 4' - PASSED ssl_gtest.sh: #5490: 'AllHashFuncs/TlsHkdfTest: HkdfKey2Only/1 5' - PASSED ssl_gtest.sh: #5491: 'AllHashFuncs/TlsHkdfTest: HkdfKey1Key2/0 4' - PASSED ssl_gtest.sh: #5492: 'AllHashFuncs/TlsHkdfTest: HkdfKey1Key2/1 5' - PASSED ssl_gtest.sh: #5493: 'AllHashFuncs/TlsHkdfTest: HkdfExpandLabel/0 4' - PASSED ssl_gtest.sh: #5494: 'AllHashFuncs/TlsHkdfTest: HkdfExpandLabel/1 5' - PASSED TIMESTAMP ssl_gtests END: Fri Mar 31 16:39:45 UTC 2017 ssl_gtests.sh: Testing with PKIX =============================== Running tests for libpkix TIMESTAMP libpkix BEGIN: Fri Mar 31 16:39:45 UTC 2017 TIMESTAMP libpkix END: Fri Mar 31 16:39:45 UTC 2017 Running tests for cert TIMESTAMP cert BEGIN: Fri Mar 31 16:39:45 UTC 2017 cert.sh: Certutil and Crlutil Tests with ECC =============================== cert.sh: #5495: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA -f ../tests.pw cert.sh: #5496: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5497: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5498: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #5499: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA -f ../tests.pw cert.sh: #5500: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5501: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5502: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #5503: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5504: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #5505: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5506: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #5507: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA -f ../tests.pw cert.sh: #5508: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5509: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5510: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #5511: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5512: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #5513: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5514: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #5515: Exporting Root Cert - PASSED cert.sh: Creating an DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5516: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #5517: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5518: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #5519: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5520: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #5521: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5522: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #5523: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5524: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #5525: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5526: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #5527: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5528: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #5529: Exporting DSA Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5530: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #5531: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5532: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #5533: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5534: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #5535: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5536: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #5537: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5538: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #5539: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5540: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #5541: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5542: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #5543: Exporting EC Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw cert.sh: #5544: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5545: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5546: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #5547: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5548: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #5549: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5550: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #5551: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5552: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #5553: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5554: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #5555: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5556: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5557: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #5558: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5559: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #5560: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5561: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #5562: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5563: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5564: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5565: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5566: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #5567: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5568: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5569: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #5570: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #5571: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5572: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw cert.sh: #5573: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5574: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5575: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #5576: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5577: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #5578: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5579: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #5580: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5581: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #5582: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5583: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #5584: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5585: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5586: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #5587: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5588: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #5589: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5590: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #5591: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5592: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5593: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #5594: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #5595: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5596: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5597: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5598: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5599: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5600: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #5601: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw cert.sh: #5602: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5603: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA.ca.cert cert.sh: #5604: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #5605: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-ec.ca.cert cert.sh: #5606: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5607: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #5608: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5609: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5610: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #5611: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5612: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5613: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #5614: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5615: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5616: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #5617: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5618: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5619: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #5620: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5621: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #5622: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5623: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA.ca.cert cert.sh: #5624: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #5625: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-ec.ca.cert cert.sh: #5626: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5627: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #5628: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5629: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5630: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #5631: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5632: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5633: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #5634: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5635: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5636: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #5637: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5638: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5639: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #5640: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5641: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5642: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #5643: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5644: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5645: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #5646: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5647: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5648: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #5649: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5650: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5651: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #5652: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5653: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5654: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #5655: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5656: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #5657: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #5658: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #5659: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw cert.sh: #5660: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5661: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA.ca.cert cert.sh: #5662: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #5663: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #5664: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5665: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #5666: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5667: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5668: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #5669: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5670: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5671: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #5672: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5673: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5674: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #5675: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5676: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5677: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #5678: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5679: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw cert.sh: #5680: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5681: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA.ca.cert cert.sh: #5682: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #5683: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #5684: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5685: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #5686: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5687: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5688: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #5689: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5690: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5691: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #5692: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5693: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5694: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #5695: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5696: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5697: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #5698: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5699: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw cert.sh: #5700: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5701: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA.ca.cert cert.sh: #5702: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #5703: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #5704: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5705: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #5706: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5707: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5708: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #5709: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5710: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5711: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #5712: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5713: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5714: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #5715: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5716: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5717: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #5718: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5719: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw cert.sh: #5720: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5721: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA.ca.cert cert.sh: #5722: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #5723: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #5724: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5725: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #5726: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5727: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5728: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #5729: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5730: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5731: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #5732: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5733: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5734: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #5735: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5736: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5737: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #5738: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5739: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #5740: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #5741: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #5742: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #5743: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #5744: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #5745: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #5746: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #5747: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw cert.sh: #5748: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5749: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #5750: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5751: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw cert.sh: #5752: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5753: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #5754: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5755: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #5756: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5757: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5758: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #5759: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5760: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5761: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #5762: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5763: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw cert.sh: #5764: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5765: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #5766: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #5767: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #5768: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5769: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #5770: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5771: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5772: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #5773: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5774: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5775: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #5776: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5777: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5778: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #5779: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5780: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5781: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #5782: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5783: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:31:1a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 16:45:23 2017 Not After : Sat Jul 01 16:45:23 2017 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:19:cd:fe:e3:aa:10:05:c2:5d:fa:59:1c:1e:02:a0: fc:3b:a7:68:5e:b8:e0:cc:a1:ad:67:c6:d0:a1:88:cc: 02:08:e8:b2:3c:04:47:91:f0:d5:fc:2e:7f:12:b7:5a: 53:e6:9a:2e:ac:e6:d5:7e:7d:d4:b0:32:cb:8c:fb:12: c2:32:62:78:cc:be:4a:bf:cb:64:59:44:38:6e:7b:33: d9:83:7a:d1:83:da:04:3e:40:62:43:0f:f9:55:de:62: 29:16:81:f8:db:e8:54:d3:a4:2f:dc:59:ed:c8:4b:60: e5:d4:ed:ec:a2:db:ea:d7:09:98:72:85:13:bc:2d:ea: 81:48:b6:08:c8:32:e0:e7:81:c9:d6:89:b9:4a:4b:b9: b4:50:f9:2d:80:2d:37:f9:be:27:7d:da:37:8a:ed:8c: c9:af:f2:0e:91:7a:51:bc:dc:19:e6:17:2c:ff:4a:ce: e1:d5:a2:5a:d8:e9:b3:91:e4:6b:b7:32:26:0c:76:9d: 27:f9:ca:88:63:27:69:20:b3:66:63:b8:94:a7:1e:f8: 5b:77:82:90:7d:83:09:4d:4a:cd:6a:2d:c1:11:97:cc: 3b:18:5f:4a:07:d6:a5:99:4d:40:45:62:b4:c4:48:cb: 93:cf:25:cd:e7:67:33:82:5a:f4:5b:79:7c:bd:9d:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:cc:66:d7:b6:73:5a:39:4a:9a:97:93:c4:3b:8a:66: 26:cc:9c:04:36:a5:7f:5d:70:30:f2:a9:77:2d:a8:35: 11:7a:3e:e0:eb:f7:8e:00:6c:5e:de:fa:78:3a:69:3b: 93:0a:a2:7a:32:cf:48:cb:e7:07:b6:8d:a8:d4:76:eb: a4:fc:b0:d1:aa:b5:23:1a:e3:b1:37:8f:9e:71:93:e4: 94:32:df:2e:50:fb:98:2b:5a:aa:9e:d1:55:d7:bb:f1: fc:ce:ba:d6:59:78:4e:b2:ac:9d:0a:f1:2a:ad:eb:dd: 9b:dd:4c:ac:17:23:e8:12:33:f5:11:e0:b3:17:dc:c7: c6:53:df:ea:f1:db:81:33:f7:81:33:57:60:73:d1:d5: c6:60:7c:7c:97:00:39:44:c1:4d:df:aa:2f:f1:d7:ee: 03:3d:a8:2f:a8:fe:84:23:a5:ba:fe:cb:75:77:28:1c: ca:dd:dc:e0:1c:05:f5:89:ee:a9:a4:bc:9e:48:a5:2a: 5b:d0:75:bf:72:cd:df:15:ac:8e:2f:55:69:25:af:6a: eb:a1:46:25:f6:54:dd:92:c6:67:90:95:9c:61:36:0b: a5:8a:32:0f:87:99:e6:f0:89:71:2a:20:36:08:e2:55: b5:46:b0:a7:74:6d:1d:9c:4e:de:92:de:ce:7e:98:15 Fingerprint (SHA-256): 60:FF:77:A9:7F:7F:36:B0:D5:D0:7F:79:E8:95:40:9D:B8:FE:D1:8D:85:4B:1C:EC:4D:73:BB:4D:D7:A4:EE:9E Fingerprint (SHA1): BE:E0:2C:4D:BC:92:B5:A9:30:94:A9:02:45:0D:5A:2F:74:D3:18:42 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5784: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:31:29 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 16:45:33 2017 Not After : Sat Jul 01 16:45:33 2017 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:d0:fd:14:8e:a2:2c:1c:ae:39:1e:fe:ea:5b:7e:02: 7d:2f:df:1b:28:9e:dd:c8:29:5e:97:dd:2f:fc:00:62: 36:2d:9b:38:ea:d3:c3:fd:35:f2:37:f1:98:d7:7e:65: 27:5a:21:4a:02:ed:e3:ae:a6:b5:ae:a1:fd:9e:b2:f3: ca:f4:c0:67:f3:45:0c:a3:8c:8d:14:e0:97:b0:d5:2b: 87:4d:19:43:35:f0:fb:fa:94:3b:96:f6:33:e2:f2:6a: 5a:67:74:fa:0f:29:3b:3a:85:26:43:8a:2e:13:cc:e5: dc:f8:51:a2:ae:ee:61:97:f7:02:40:6c:59:39:57:6d: 69:ad:e0:f5:36:fd:e7:75:e5:b2:1d:51:0d:fd:d6:1c: 81:89:51:aa:ab:17:5d:1e:ed:04:20:f1:ab:e1:25:bc: d8:27:a3:c3:10:13:51:04:ea:f1:f6:f2:17:ef:52:ca: c3:de:28:28:a3:5d:ca:40:a4:ad:eb:f6:87:53:aa:a4: 5b:86:28:bd:c3:bd:ad:4c:0d:9f:02:54:57:0b:ba:06: 66:23:88:a9:ad:d6:f0:c7:f1:a4:d1:3d:1b:23:ba:66: 96:3f:c0:29:91:df:5f:18:b9:4d:39:07:65:8f:fa:19: 61:82:a9:fc:ac:f0:f9:1b:ca:b0:c0:f1:16:c8:aa:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:c0:05:ea:ff:65:9d:84:4c:db:62:a1:de:82:04:d2: 22:60:6e:5f:92:53:89:af:4d:f8:32:50:1c:4b:86:66: 45:f9:21:da:c9:84:9c:a7:05:0b:f5:02:4f:aa:6a:7c: c0:c7:c7:a9:ad:68:85:e3:fa:01:d8:7f:f8:80:de:24: 45:bf:13:5d:64:3a:b3:36:82:43:14:25:52:bb:ed:ee: a9:e1:e8:de:6b:1d:16:3a:84:14:ad:30:c3:46:f3:32: 33:fb:0c:d2:81:c5:e6:4f:d8:4a:cf:af:b6:39:6c:4b: a7:f2:ab:a7:60:1d:c8:29:65:9b:e9:64:45:88:3b:3b: fe:13:7c:7c:2f:45:3f:59:66:e4:cf:08:85:60:38:bb: f1:ba:db:d6:c8:12:de:5c:ef:64:36:33:4c:1e:96:1c: 48:76:65:06:1f:6b:4e:a6:20:f0:d2:8f:83:03:3f:14: cb:d6:63:65:c0:b6:24:9d:89:8b:40:52:c9:f8:a1:f2: fa:d1:ea:37:d6:70:a5:3c:b6:9f:36:8d:ef:04:d7:34: eb:64:32:74:07:1a:62:9a:93:81:41:1b:78:3b:c8:82: e4:45:27:4e:1d:ff:a2:33:25:b0:4d:d9:61:77:96:79: 18:a9:50:c2:d2:0e:97:53:e6:32:03:e7:61:34:3f:2f Fingerprint (SHA-256): 8B:C8:BD:B5:50:40:3C:E9:30:AB:4B:58:63:C8:C5:8C:F3:FC:63:6C:F3:54:72:48:85:08:B7:8D:5E:53:7E:5E Fingerprint (SHA1): A6:0A:7A:D6:AB:A7:04:9B:23:9E:44:A7:70:68:C6:0D:D3:AF:5F:84 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5785: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:31:3c Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 16:45:42 2017 Not After : Sat Jul 01 16:45:42 2017 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:4f:ba:16:d2:99:35:ab:29:c6:56:19:04:96:0b:3f: 29:92:25:9f:90:29:c8:8c:b4:a6:cf:de:6b:a3:2c:e5: b6:75:9b:d1:94:69:9e:f6:1d:93:56:3e:82:84:3c:95: f4:90:49:81:ca:a0:69:9d:86:a1:6c:0b:47:05:bf:a6: 54:50:1d:66:ff:e6:be:2d:91:08:99:c3:e1:fd:b0:48: f4:fc:c3:0a:7a:5d:10:5b:2d:69:6d:ef:60:41:f4:fa: f2:46:5a:32:4c:74:e3:fb:2c:34:dc:75:47:d2:32:a5: b6:81:40:25:a4:8e:26:10:49:9e:8f:bb:b9:0e:89:37: be:63:8c:17:db:ef:df:5b:1f:51:19:cd:69:b5:69:c4: 24:df:4b:f0:2b:77:ad:f7:a1:c1:a0:c4:07:23:ce:9f: 3d:48:03:8f:19:b6:c1:f2:36:aa:a7:8c:56:a3:24:fb: e3:bd:81:f0:58:b1:8b:93:d9:75:06:fd:72:59:8b:9f: 0f:a9:1d:d3:53:69:69:49:8e:37:bc:06:3f:d4:4b:5a: c7:9a:37:36:75:8a:9f:c1:d3:4f:80:30:74:16:50:c7: 40:d9:ed:97:b6:b7:28:7d:cc:a0:67:4d:5e:46:0f:53: c9:5e:5b:a5:05:e3:52:69:5d:ce:3c:58:fb:49:5c:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:a5:c0:7f:d3:77:ea:7f:ab:e0:f1:3c:50:bb:0a:18: dd:f2:48:8b:29:70:d2:a0:29:4e:c9:c4:33:07:ed:f0: f7:b9:e9:7b:d3:b8:cf:71:71:83:df:00:9d:41:7a:78: 43:00:05:36:c5:41:eb:24:55:55:86:ff:9f:85:f8:7f: 92:2a:dd:45:73:4b:57:f4:ff:90:38:48:bb:97:b2:c0: e1:39:f6:8a:ee:47:fb:30:57:33:86:ec:2d:ba:f7:d2: fb:1e:f2:60:99:d9:4d:ad:2e:a3:96:e4:86:42:c2:0b: bf:40:98:97:25:c0:96:00:c8:46:57:ba:2c:a1:f0:3d: 50:2e:49:78:8e:7a:61:1b:6d:1c:60:6c:8f:1b:76:b0: 15:03:f0:86:eb:32:29:33:8b:ef:d1:40:ae:fa:14:c3: cb:5e:65:05:78:df:ac:82:9d:71:ea:87:66:c9:7b:6e: 4f:b2:31:81:01:9b:17:08:06:30:85:66:2f:6c:7a:f6: 59:2b:ce:22:cc:be:b8:dd:c9:ee:7a:6a:ef:8b:07:74: 6c:9f:a6:02:85:8d:af:fe:ca:45:3b:ae:78:5f:75:e5: bd:11:b3:ab:e8:5d:9c:1e:6f:27:be:b1:c0:9d:23:43: 02:84:da:98:09:86:a8:ad:5f:cf:44:3d:93:26:e8:64 Fingerprint (SHA-256): 0F:5A:71:E3:6C:82:09:38:F3:D4:0B:B7:4C:1E:69:39:FB:94:35:CF:EC:A9:40:86:B4:57:57:89:04:73:58:E9 Fingerprint (SHA1): F1:3D:40:73:7B:B5:4E:CE:6D:97:A3:C3:53:61:4F:97:A2:5E:B3:54 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5786: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:31:4c Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 16:45:48 2017 Not After : Sat Jul 01 16:45:48 2017 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:09:92:cc:5c:c2:08:5a:41:4c:ea:be:ff:c5:a2:e2: 2b:8b:6a:90:dd:35:82:44:c4:18:e5:75:7c:96:f8:ba: 7f:70:c9:ec:87:f7:5e:14:1b:c0:f7:0a:3c:f0:08:60: 07:be:c6:3a:9c:df:a9:20:a8:e2:42:6d:26:08:c2:ec: 27:be:d9:3d:b2:df:6b:50:bb:2e:3a:e1:45:42:15:ba: 66:31:5b:0b:19:db:06:58:ef:12:39:72:84:e5:b3:f9: f8:cb:92:ee:0f:fd:cd:bb:8c:91:fa:47:c3:10:0b:89: 5c:b7:a1:95:95:73:08:55:66:ec:2e:97:ba:43:15:d4: 0d:6f:40:0b:51:29:a1:35:d4:27:75:c9:84:6e:5e:aa: ff:55:d5:6f:4b:ef:f0:d6:f2:96:c2:83:c4:41:38:6e: 84:29:ff:cc:8b:40:2e:f4:96:21:0c:48:b0:96:77:2b: 93:b0:9b:e3:d4:fb:08:ee:06:97:f7:96:81:c7:5d:cc: 04:08:e2:f0:f9:76:89:02:2a:44:a9:78:d9:fb:cc:89: f0:82:04:60:fd:3f:65:1a:20:84:3f:b6:14:8b:c2:59: dd:3b:c9:d2:18:83:af:fa:8a:09:ff:a4:ba:d4:11:e9: c4:eb:14:f6:be:d2:b3:e4:fa:f6:f2:c2:f1:8c:7a:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e8:6c:28:3b:75:09:2e:35:35:70:dd:26:25:5d:2e:cc: 30:bf:af:c6:3d:b1:0b:5d:98:d6:9f:71:03:de:eb:3f: 10:66:ab:ad:51:80:24:3f:7a:d4:3a:a3:30:55:87:10: 8b:7c:88:d2:16:03:00:38:9b:8d:d1:b3:c4:e3:c6:09: 6f:c2:5d:3a:5e:ef:7f:18:bd:2c:e5:39:57:93:04:05: 4f:b2:6c:04:ff:74:cd:c3:61:e6:e4:b6:ff:f4:dc:6c: 45:aa:1d:11:50:3d:f6:7b:97:8b:ef:4f:d0:d9:95:1d: 53:ce:75:4c:d9:d9:f7:dc:7d:3b:0c:01:5f:9c:1e:90: 68:86:b7:f1:84:2c:a4:3c:88:3a:01:8d:4b:0d:fa:30: af:e9:af:2b:3c:59:d3:b2:3c:2e:0e:18:51:ba:4c:13: d0:1e:0b:5c:f6:ff:72:5f:6e:7b:6b:de:f7:9b:d7:67: 26:d7:86:35:f2:9c:47:8a:9d:c8:ac:e7:3f:8c:7a:3f: 66:02:e9:83:3d:d4:47:96:17:08:22:a2:5f:8c:ae:f6: 4d:04:9f:29:80:df:6d:a1:3d:7c:36:bf:ca:68:d1:d1: 3b:9d:a7:b7:85:0a:e5:9f:d3:48:81:ee:06:88:a7:f5: 08:ae:bc:2d:dd:8c:ed:15:8b:0e:af:59:ab:1f:94:db Fingerprint (SHA-256): A9:8F:78:64:59:A6:F2:3D:E7:E8:A3:99:7D:F2:A3:7C:BC:E7:94:2E:CB:63:6A:92:8F:39:D1:93:AB:89:7E:B1 Fingerprint (SHA1): 43:0E:78:6A:94:02:FF:D4:8C:A0:EF:27:9B:F0:17:60:53:F9:61:16 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5787: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:31:58 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 16:46:02 2017 Not After : Sat Jul 01 16:46:02 2017 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:d2:47:5b:74:e4:39:de:b0:7e:72:f7:7f:89:00:20: ce:7a:f5:c1:6f:b8:0b:2d:ac:31:05:f4:a8:b8:1f:49: aa:4e:74:ca:a6:b0:b6:8d:f5:57:1e:08:7d:c0:22:45: 7b:77:5e:15:96:c0:12:6c:be:81:de:eb:5d:cc:93:d8: 86:47:e0:8c:b8:22:51:74:93:72:a3:61:b1:69:b7:ab: 78:d7:2a:07:b1:76:29:56:df:31:12:45:0c:8b:c2:d3: a5:3e:71:36:2b:66:c1:fd:d8:f3:c4:24:20:52:61:b6: 2b:1a:24:05:a3:07:cf:2b:7b:f2:d2:1b:67:08:d1:84: 4a:53:bd:a0:37:20:ed:ef:02:25:a8:14:d8:5e:d3:89: 92:a4:f0:b8:c8:b3:55:00:2b:55:b4:0c:bb:3f:11:8c: 1c:3b:ea:7f:1b:48:e2:09:f8:16:2c:88:75:43:45:2d: 16:6e:63:a2:85:4d:35:c8:18:d1:21:19:57:a1:26:d4: 2c:ff:93:6c:34:ca:78:e5:98:04:31:61:4a:98:33:34: 95:76:e3:87:aa:53:e3:2a:34:9b:20:6d:32:a5:a2:63: ee:b8:70:da:b7:b9:9a:d4:ab:a1:73:f2:1e:49:25:52: f5:55:d8:e0:59:34:02:dc:df:63:7d:e1:05:3d:06:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:57:df:a3:9b:b5:3c:f1:12:4c:05:5a:b5:43:8b:23: db:9b:ed:69:14:b2:92:f9:9e:c7:36:09:e2:19:54:fb: 75:52:99:e2:2a:ce:b9:79:e8:97:42:2c:a6:d7:58:14: 3d:16:b4:6f:19:fe:92:a9:e5:d4:f3:57:47:09:ef:69: c1:d8:d2:75:e8:42:26:a1:f5:55:db:91:83:51:c3:ca: fb:20:92:21:ef:8b:c1:bc:26:3a:3c:fc:cb:7b:51:9e: be:df:ee:90:26:dd:38:be:95:6e:50:9f:2d:b5:11:f9: 3c:4a:bb:6f:6c:5f:9a:98:82:1b:f5:35:5f:c3:6d:7c: 2d:8c:1f:68:c7:75:1b:f9:6f:e4:39:7a:b1:ce:32:69: e6:68:b3:25:72:b1:b7:f4:3e:c5:41:90:e0:ed:26:51: 84:f8:6e:f5:da:c6:cf:eb:f0:fd:3f:a5:07:2c:f7:22: 4b:95:86:a5:58:26:4a:dd:aa:a4:56:ec:8b:08:d0:25: 0d:fe:39:33:98:68:6a:48:94:d2:85:25:50:28:c9:7d: db:b7:3a:6a:66:02:4d:86:fe:38:2f:e0:c6:ee:23:64: 8f:1b:a6:e9:a4:fc:b4:3c:6b:1b:54:32:6d:c8:bf:af: 28:b9:13:f3:84:4e:7a:9c:73:e6:61:59:ec:a9:ce:f7 Fingerprint (SHA-256): 74:55:95:C2:C6:F2:AA:DE:3A:24:5F:8D:07:5E:13:5B:79:E9:D2:19:3C:EC:83:46:E3:55:E5:BC:1A:D6:F7:2D Fingerprint (SHA1): 7C:63:61:7A:F8:E8:13:5C:26:8B:18:75:F0:15:1E:DD:2D:7F:53:E3 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5788: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:31:72 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 16:46:18 2017 Not After : Sat Jul 01 16:46:18 2017 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:18:bd:d2:a6:ab:85:fe:48:dd:d3:58:ec:e8:d7:10: c7:eb:e2:0e:60:9a:e3:f1:cb:f1:cf:80:df:64:b4:3e: 5a:fc:e2:b3:dd:ee:5d:f9:c2:45:c2:71:a4:25:34:6f: b9:7d:8f:91:13:16:fc:e4:77:23:2c:7d:32:91:64:b1: 10:80:c6:09:d4:dc:fe:d9:d3:40:f2:65:32:3e:ff:5e: 65:e2:cb:68:5c:30:fe:cd:5c:d1:87:61:0e:9a:96:13: d6:c3:7d:07:04:f7:0e:b5:c7:95:b2:71:84:cf:bc:db: c3:f2:32:67:42:b4:05:8e:ef:ae:01:f6:1b:3d:11:e1: 40:8a:55:94:0e:91:c8:10:0e:50:a8:b9:63:52:b8:2d: 5d:c1:97:de:87:99:bd:64:9f:cb:31:bf:4d:6f:17:a9: af:55:8d:e8:71:60:0e:02:2d:6b:6a:8b:f2:6d:8a:d4: 53:60:f7:da:06:91:06:5a:77:83:cf:cf:1f:0b:cf:20: c8:c2:34:94:57:76:df:39:6d:03:2b:15:ff:7e:b6:5b: 2c:38:08:64:3e:7f:34:02:d3:6f:2d:27:5e:c0:0b:d8: bc:cb:5b:54:da:30:66:78:96:53:d0:08:0a:66:89:b2: ed:51:c4:fd:00:26:7a:c1:cb:17:18:fb:0d:c8:77:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:e4:b3:35:94:74:7a:7f:dc:49:a4:46:e3:a6:12:6c: 55:2c:22:ee:9f:6b:2b:a6:9a:e9:f2:4f:8d:1f:38:3e: 25:19:e4:a6:e5:19:7f:b6:bf:07:ff:8c:1d:15:c4:0e: 09:2b:85:8d:b5:47:93:a2:ac:f3:97:30:7f:92:df:56: 8d:40:12:cb:db:cc:6e:73:65:ad:2a:31:ef:c3:f6:ed: b0:bf:c4:8d:cd:a5:27:3b:15:26:87:c6:16:65:b8:97: f3:41:e4:a0:bf:d9:c7:75:a7:8f:e7:6a:e0:d9:66:3a: 40:e3:a9:8b:c3:14:25:94:75:41:5d:7f:1e:9e:22:43: 51:26:18:50:81:02:b7:4a:76:2d:61:88:58:6a:f8:a3: 4b:af:14:a4:b1:d4:6c:8b:b3:82:fc:33:10:37:dc:23: b1:51:98:56:f8:95:17:b0:f8:ef:ba:ff:28:f4:69:08: 3b:76:21:c5:ff:f0:b3:a1:72:39:dd:4c:21:4c:04:49: fe:62:b7:38:00:04:67:0c:ae:51:74:19:88:05:9c:78: a8:08:96:7d:5e:71:5c:4a:6b:3c:0b:57:52:6d:11:6c: 72:df:54:84:cd:f9:39:5f:3a:4f:1e:5c:99:62:9b:41: 25:bd:e8:7c:5f:b2:ad:94:23:22:06:80:a3:35:04:75 Fingerprint (SHA-256): 57:BB:81:EC:01:94:FF:52:2C:AB:4F:EF:56:5F:43:3F:14:19:CF:11:93:9E:26:B4:24:82:C1:AD:F3:E9:EB:C9 Fingerprint (SHA1): 23:50:31:FA:64:E1:12:EF:89:7E:CD:2B:A3:EB:2F:26:D1:1D:C0:B9 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5789: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:31:92 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 16:46:35 2017 Not After : Sat Jul 01 16:46:35 2017 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:e5:a4:25:f9:8a:e9:a4:27:cf:91:f0:8a:ae:ac:e2: e8:a1:da:bc:67:4b:be:73:d5:8c:30:aa:cd:56:8a:a3: 12:52:87:33:42:5a:e7:28:97:a2:26:03:0b:8e:1b:00: a1:b4:04:ce:13:82:37:aa:7b:e3:41:f5:7f:65:e2:63: 36:04:7c:ea:67:98:ed:b8:a1:b8:5d:44:a3:4e:88:48: c7:d2:d4:e4:a3:03:bf:65:3b:40:a2:4d:d5:ba:26:ab: 6a:a2:ba:1e:a1:d7:48:32:6f:e8:70:b7:ff:5e:cc:e1: fc:38:74:54:5f:7b:88:40:a3:2f:ca:d0:5f:bf:b4:8f: 31:f2:10:3d:4a:1b:0e:c0:b1:51:d1:68:93:80:92:36: f2:68:8e:93:a8:70:3e:ac:32:94:36:a9:47:6f:d8:85: 24:34:09:77:58:ca:f2:ea:0c:54:00:38:de:14:23:72: de:b8:f4:f2:3b:e5:35:ba:df:f5:ee:f2:65:60:b3:06: e0:c3:6b:00:69:c1:c4:6f:e5:e6:07:bb:ec:a4:d6:46: f3:4c:63:f5:1d:cd:7f:ad:be:cc:cb:c7:b7:c0:29:9a: cb:e5:dc:9a:f5:23:bf:d3:bb:6c:e2:86:88:87:53:6d: 2f:9e:eb:72:a2:f6:8e:e5:a0:5a:0c:b4:ac:28:12:7f Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:99:14:19:b6:40:42:46:fe:3e:71:48:9c:ce:84:81: 7c:4f:b4:87:70:85:83:89:6f:27:20:88:be:48:b3:9f: 56:1e:15:09:66:af:eb:7c:53:28:a3:62:5b:43:23:cb: 92:22:30:77:a0:ad:02:b5:94:70:c3:75:82:65:02:5f: df:5d:e4:b8:7c:81:ab:58:32:25:82:fc:28:01:9b:af: 7c:94:b8:17:94:0b:1c:8b:b1:83:00:2c:48:bb:17:ab: d3:ce:3e:9a:83:ef:a7:0b:43:34:5d:af:6e:1d:96:f4: ca:8f:79:8e:bc:93:b2:00:ba:5a:5d:4f:fd:5e:7d:e9: da:db:15:f2:e5:a5:63:26:92:c2:7d:6e:8b:75:be:14: 4a:de:07:7a:85:30:29:2d:da:62:2f:bb:bc:3a:f1:4a: f9:db:6c:54:d7:ee:85:6a:13:d0:d2:af:27:00:e9:51: bc:d5:28:8c:fd:9c:86:e6:ac:ac:99:6b:52:61:a5:9e: 67:57:7b:fe:6a:88:32:3f:84:40:87:cf:6d:a9:cd:40: 96:47:3d:fe:eb:30:7e:c2:fe:c0:a3:4f:5b:a9:13:9a: 33:a2:9d:90:2d:62:cf:56:88:3f:62:3f:2a:e7:3a:7d: c1:9f:54:38:d3:bd:d8:6e:01:f5:b3:6e:fb:c0:98:0e Fingerprint (SHA-256): 07:93:4B:4A:A3:64:FC:FA:A4:2E:67:B9:DD:8F:CD:1B:1F:6E:3F:11:76:41:63:23:17:1C:BD:29:23:BC:86:6C Fingerprint (SHA1): 0E:CA:7D:3C:13:A4:A1:87:BC:52:B7:DB:52:A7:C5:4E:09:F4:57:9D Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5790: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:31:b2 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 16:46:49 2017 Not After : Sat Jul 01 16:46:49 2017 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:d3:27:97:f1:f7:bf:7b:2b:22:9d:95:2c:79:42:8d: 9c:3e:ad:98:57:54:68:6c:8a:8e:99:9c:d8:bb:38:1e: d0:01:88:52:5a:c7:17:51:63:c4:05:57:dc:3c:0b:6b: a6:4a:f6:70:f6:91:ec:b2:54:65:34:c2:7b:51:67:37: b2:35:bb:47:58:c8:5c:8a:46:89:bb:77:4f:d3:74:04: 85:ed:d6:7a:32:8a:67:ef:d3:f5:f9:ff:66:d5:83:9d: 5e:88:bf:37:af:cd:f8:4e:08:03:40:20:68:b8:ed:03: ee:7d:2d:63:64:be:cf:1a:64:27:c1:b9:f1:96:1d:c4: 5b:e8:e3:03:47:e9:9f:b2:02:c1:d2:ce:60:82:c2:ad: b0:9a:a5:e8:20:82:85:a4:3a:9b:f7:6a:40:11:2d:f7: a6:99:3d:d2:d4:41:fd:4c:71:62:ea:04:e0:13:95:bc: b7:7e:ae:6f:68:29:9c:9f:10:33:c0:6b:c2:ac:5d:3f: e1:d4:4e:b4:ee:f1:ce:c4:a1:0e:50:5c:93:69:e7:ed: 86:74:58:d8:15:15:03:8c:f7:a3:d3:a1:a1:36:1d:92: a7:8e:1f:e1:a9:dc:40:b3:2e:0c:52:e0:e4:d4:df:b3: 37:e9:ac:3b:d7:69:ec:75:8b:c3:17:25:93:0a:48:87 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:ce:53:f3:52:14:49:65:7d:60:d7:02:2c:aa:aa:df: 11:17:de:3b:b0:49:be:87:c4:1d:9e:27:e9:ff:b5:c4: 70:d4:c0:c6:36:da:48:59:b2:2a:7c:a8:32:8d:33:80: 36:45:b8:1b:cd:11:55:7a:f6:18:66:cd:b8:83:19:37: 60:df:39:d0:1b:ef:9e:01:9b:9e:33:b7:3d:09:4b:a2: 6c:7d:ec:04:63:39:ae:6b:ce:b0:02:56:71:21:00:55: dc:c2:ed:13:93:fc:cc:3d:83:c4:ba:fd:c3:78:08:18: c7:98:b0:57:75:48:cf:16:41:b0:1b:37:90:6a:69:77: f0:cd:00:35:34:e9:be:78:49:b8:cd:a4:d1:5b:4d:ab: cb:55:f9:07:d0:5c:be:a6:a0:85:1a:94:81:02:97:5e: 0c:8e:c4:ba:54:eb:07:9c:ca:dd:ab:9e:db:ef:d4:ea: c5:2c:90:0d:81:bf:7b:ac:b0:53:c5:b2:37:4a:7c:73: 10:95:c8:83:9b:b5:63:96:e1:26:39:a0:a7:b7:67:89: 5f:01:cd:fc:2e:e2:35:a5:4f:08:cc:6c:64:b1:bd:8a: ab:02:a2:3d:de:7f:64:ea:a3:cc:db:ad:3a:2a:a2:83: b8:75:b5:f7:f2:d8:bc:46:02:65:92:39:3b:cf:d4:32 Fingerprint (SHA-256): 39:8E:E8:9C:C3:E9:3E:BE:D6:E0:B1:20:24:41:FB:D2:AB:B9:65:84:A3:9B:A0:5F:22:DC:A3:33:92:A3:43:02 Fingerprint (SHA1): 75:81:37:22:88:7D:22:67:72:08:2A:16:51:91:5C:EE:B7:41:26:3C Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5791: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:31:cd Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 16:47:02 2017 Not After : Sat Jul 01 16:47:02 2017 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:f2:aa:3e:e7:43:50:9e:43:ba:d7:78:b4:e3:f7:b5: 39:d6:fb:1e:3a:50:9d:df:3a:03:5f:b4:f1:c4:1b:18: 5e:b1:43:6b:ef:53:84:93:b5:b3:ae:e6:84:b3:f0:94: 75:62:ae:2b:f9:3a:7c:8e:c9:de:36:d1:55:ba:69:e9: 6f:29:57:79:a2:9d:0a:7d:35:21:a9:44:43:7e:38:82: 26:a6:6d:5b:b0:f4:cd:b2:46:0c:20:f8:7a:a9:60:5a: 46:5c:cc:aa:1e:da:37:8f:d4:7b:aa:46:e1:dd:53:32: e2:ff:d4:7e:0b:12:8d:0f:89:7a:a2:9c:44:13:e4:1e: 3c:0d:9f:6a:6d:5b:f8:3c:84:ca:44:dd:7c:68:ca:06: 1a:a1:c3:23:12:c4:6a:18:ef:e5:1e:0d:8e:bf:59:0e: 05:bf:e2:24:32:f6:d9:1d:0a:36:8a:8e:9f:e9:3d:66: d6:37:f7:38:04:a3:86:e3:1e:89:03:f9:fa:a5:a0:60: d2:06:de:88:1f:81:90:00:c7:da:42:7a:fc:2f:d7:57: cc:d9:ff:46:b4:d9:87:5a:37:b6:24:ef:f4:15:2c:1a: bb:dd:d0:5a:2f:b1:6b:9e:66:b6:69:f3:22:de:20:0a: 6b:47:bf:d6:5f:27:c9:2f:cc:5d:c8:e5:6f:fd:aa:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:a3:a6:34:c5:8d:8f:a0:28:d7:a6:56:df:eb:e4:6e: 07:95:0b:dd:27:0a:37:f0:a1:be:ab:0d:c2:ad:80:fb: ff:85:fe:5f:71:1a:1f:fb:df:0f:ac:5a:65:33:75:df: 29:ab:e2:81:40:72:39:b7:f0:dd:7c:83:0d:dc:9c:2b: b0:da:9c:f4:7c:d7:a3:a4:22:2b:bc:e4:03:31:df:c1: 43:d1:36:01:af:39:57:59:97:ee:9a:bb:61:27:72:11: a0:66:10:a0:26:2f:0f:ad:e0:08:43:b1:cb:aa:d5:1a: e6:ec:cd:e0:22:1b:1e:00:38:dd:a7:54:a8:c1:15:03: c0:7a:c4:8b:55:6b:4b:75:cb:04:10:8a:a5:17:4c:5b: 7c:61:fe:26:0a:0e:38:a3:06:09:e7:ab:ac:15:bc:a6: 07:6b:e4:99:c8:80:ee:9b:5b:0a:ec:75:67:48:4c:3d: 54:3b:e0:69:20:bc:d8:7f:c3:35:43:12:73:98:39:0d: 99:4f:72:b9:f2:16:cb:83:3f:09:54:24:c2:fe:f0:1b: 7d:70:cd:d6:04:84:2a:49:cd:0c:78:2b:8b:22:e3:b4: 9a:f2:50:f0:85:07:6d:45:49:bb:cd:af:72:25:dd:0c: b3:84:88:e9:1f:f0:57:7c:72:b9:9d:f0:ad:c6:56:8f Fingerprint (SHA-256): 05:4E:45:6E:E8:6B:28:EA:D7:A8:F7:FF:7E:CB:28:8D:E8:26:5A:FB:DA:09:65:6B:68:4A:DC:C1:C7:61:39:2A Fingerprint (SHA1): 5D:21:52:2F:D9:7B:76:B8:21:4E:B2:AE:4C:5B:19:1B:8E:58:9E:50 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5792: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:31:e5 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Mar 31 16:47:22 2017 Not After : Sat Jul 01 16:47:22 2017 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:f7:2c:2e:91:81:35:1d:2e:02:2b:c8:a8:e2:ef:e3: 97:ea:2c:12:2e:7c:aa:8d:fc:d9:fe:51:a1:ce:2e:a5: 82:b9:45:7a:97:be:89:71:98:6b:7d:bf:52:ac:15:03: d4:fb:a3:72:c5:5e:48:4b:82:d9:f2:e2:03:01:76:38: ea:57:38:81:e3:ee:17:ef:36:bb:a9:a3:1b:a0:64:8c: 30:a1:c1:18:e6:da:44:e0:2d:1b:da:5c:42:77:35:bc: f6:dd:32:5b:07:13:37:c2:54:6a:35:ae:85:74:a5:65: 1e:f2:6e:f6:a6:cd:eb:37:53:f5:13:ed:20:35:88:4e: 70:04:f2:53:2f:7f:35:56:e9:a6:cd:14:97:4f:e0:15: 0a:69:2a:ec:76:77:c4:01:96:a0:b3:cc:ed:71:df:6c: e9:43:31:93:ba:13:65:71:ab:58:1e:60:c5:2b:3e:f5: ec:40:ec:17:a4:fb:7e:db:5d:94:81:0e:f3:5d:8a:0a: 54:28:9a:18:01:09:f0:39:2b:ac:09:ff:22:fa:7d:1c: e9:09:3f:49:f2:e8:e9:f2:f2:02:ca:97:bf:76:37:56: 5f:a0:d0:f1:30:c3:69:9c:2c:cc:e3:c6:bf:ef:2d:be: 9d:3e:85:3a:55:07:8b:7b:e3:5c:fc:da:7e:62:a3:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:60:50:76:11:1e:b1:8a:de:20:b7:11:c5:bd:3d:3e: 0c:9f:05:fc:74:f7:03:fb:7d:22:dd:c3:49:d1:f1:8a: 3b:33:52:c3:a7:8f:0c:38:26:2f:68:1e:1b:f4:96:b8: 71:bb:1e:b6:97:7a:f9:7b:db:62:d5:53:f6:0b:73:53: 24:2d:ce:75:00:f4:13:af:88:eb:12:c9:17:f7:21:40: e1:01:b9:e8:8f:1d:96:11:4c:18:03:ec:02:18:64:8c: e6:78:19:8c:64:d8:b7:1d:66:a3:8d:84:9d:e6:5c:7f: 79:39:1d:3d:1b:96:55:35:ac:50:3b:09:04:b9:85:11: 1f:60:a3:a2:c7:54:d3:43:8b:40:d6:9d:1a:0f:be:86: e0:f0:c9:9f:af:7a:f0:93:6c:9d:cd:49:24:1a:09:f0: 5a:50:39:1c:a9:84:c8:b2:d5:b6:fb:35:e1:3a:5c:c6: b3:e4:01:7d:0f:61:ea:b8:fa:bf:04:43:1f:74:bd:e3: b1:d0:97:9d:b6:85:61:5a:20:bd:0a:1d:a0:ad:72:3f: 97:b1:1c:80:9f:b2:56:45:87:d7:4b:ec:c9:df:eb:15: 6b:c5:8e:93:f2:08:73:7d:64:32:40:1e:96:86:c8:8b: e8:09:df:3b:7c:6c:e3:86:29:c8:5b:2c:c0:50:d2:65 Fingerprint (SHA-256): 7B:80:E4:65:45:18:D2:99:BF:25:F0:87:B2:46:16:A1:CF:E3:14:71:16:05:8F:F0:A3:81:81:BD:B3:C3:6A:CF Fingerprint (SHA1): B5:01:59:3A:89:24:3D:A2:DB:85:0E:BE:D5:37:91:91:1F:10:86:3F Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5793: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:32:0b Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Mar 31 16:47:28 2017 Not After : Sat Jul 01 16:47:28 2017 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:a5:ce:83:34:34:c8:cd:4e:eb:7f:ff:3f:0d:87:b4: 4f:b8:7e:21:f9:d0:68:da:d3:d5:a4:17:2d:65:c1:99: 03:3b:d2:63:f5:98:07:5a:c2:74:6e:6b:d0:9b:d9:6b: f5:bc:f4:61:fc:08:9b:61:41:02:94:4f:82:d3:e4:03: d5:22:ff:e9:f1:07:3b:e9:a3:92:b4:5a:b6:8b:36:54: cd:a2:6b:98:6c:63:f9:8d:34:0e:0b:dc:1c:ed:f6:54: 28:53:17:44:cc:c1:f8:b3:33:4a:c0:5b:ec:3c:3d:6d: b7:d2:95:f8:c0:47:3f:06:8a:ca:55:27:9a:a4:2e:01: 88:20:0d:f8:f0:4d:19:a1:ed:cd:89:a6:f1:0b:1d:1a: 42:66:8a:0b:e5:2c:47:89:16:00:41:44:c7:2f:ae:77: fb:89:a4:23:78:af:a0:27:52:95:68:57:26:50:e5:51: f8:67:f6:23:17:bd:bc:c7:5e:68:8a:06:9a:de:03:13: 08:09:c6:44:16:8e:b0:9a:7e:b7:7e:fb:5d:bb:1f:ef: 03:b0:c9:dd:9a:c1:22:1b:45:e6:56:eb:2d:41:5d:32: 36:08:3b:8c:f3:c6:7e:09:e1:44:1e:2f:44:bb:bf:59: 5b:dd:63:6e:7a:de:0c:93:5d:58:dc:da:1f:50:36:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:6f:27:04:6b:17:49:43:94:76:f9:44:f3:c0:d6:ee: ae:9c:11:fc:07:94:4c:8e:68:5e:f7:78:54:a9:49:3c: dc:e7:cb:de:b6:fc:1c:54:32:1c:30:e3:5b:59:b2:e9: b6:66:e7:c3:96:39:a3:b1:5a:7a:28:3b:56:15:18:4d: 58:74:e4:ac:09:2c:aa:59:45:58:04:24:29:a0:ff:7e: 95:17:b5:72:28:0b:b3:82:12:ef:b0:d6:14:77:cf:1d: 2f:77:1f:86:a3:fc:ea:06:8d:4e:38:5d:fe:ba:94:26: a6:31:49:60:d2:46:44:2e:88:fd:5e:ba:f0:33:ab:43: c9:39:11:83:86:08:6d:d7:22:26:7c:8c:c2:fc:06:39: dc:dc:13:9a:42:2f:88:a2:9d:36:4c:ef:2a:e4:73:af: 3d:88:af:70:fd:78:70:55:aa:31:42:e4:23:3b:47:c5: d4:d7:b2:e2:68:25:b4:19:b7:da:47:2f:15:75:fd:22: 9b:06:2f:61:eb:64:57:38:1b:53:35:9b:b4:3e:d9:76: 53:bb:65:2a:c0:33:81:97:0d:89:36:1f:49:21:52:86: 1c:71:c7:bd:3c:a1:2c:45:4d:53:ec:54:a2:a6:87:9f: e2:88:74:0d:5a:b1:f4:cc:00:b9:5f:60:1c:b7:ae:eb Fingerprint (SHA-256): F8:50:3A:C9:B3:49:CB:F7:EF:AC:52:77:FA:0A:7C:4A:40:66:39:80:10:FF:9E:02:2A:D9:90:E1:4A:22:2E:E2 Fingerprint (SHA1): FE:ED:1B:59:66:48:14:07:B3:20:AB:B8:E0:C9:A0:4C:DD:C4:C5:7F Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5794: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #5795: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #5796: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #5797: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:32:36 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Mar 31 16:47:54 2017 Not After : Sat Jul 01 16:47:54 2017 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:14:22:68:c9:c4:e4:ca:51:14:c0:8b:af:90:05:33: 44:e8:91:e2:5a:38:66:0a:c9:28:b5:b9:64:a2:f6:4c: 98:44:ee:2e:24:e1:83:6f:d4:3e:53:2e:4f:b1:94:0b: d1:30:1e:12:a1:49:15:1c:ed:08:d0:df:44:45:a4:c6: 90:43:20:e0:ce:56:64:c6:1d:21:56:44:0b:89:b7:5d: 32:d2:fe:0f:1d:46:d0:9e:c3:a2:68:d3:9c:f0:19:b1: 2b:81:df:b0:f6:30:4d:48:26:3a:db:72:21:c3:65:e4: 3b:07:2e:3d:80:b2:fa:34:16:e9:d8:b5:bf:00:89:8f: ac:4c:74:d3:84:5e:7f:a9:29:cf:da:09:ce:d1:47:23: 09:a3:0c:02:8c:94:67:92:75:ac:a0:5e:b7:0d:49:8e: 07:d5:46:a9:b5:cd:c4:e3:4d:05:6f:ad:af:51:da:fd: f5:46:c8:23:08:2b:17:0c:99:f2:c9:e5:e2:56:32:f2: bc:4a:3e:b9:08:6f:ac:fe:5e:d4:b1:3c:f4:62:e2:34: a8:ca:94:46:6b:45:db:61:72:23:37:40:ed:e8:41:a8: 60:fa:07:c5:ce:fd:73:1c:ca:93:30:ab:68:e1:04:e6: 93:84:52:af:27:e5:aa:74:4b:12:fe:0f:4d:65:19:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 21:c8:58:c8:9c:07:ad:13:84:17:b6:6e:d0:e5:f1:3f: f8:02:25:48:2c:91:47:b1:35:be:68:80:28:2b:bb:ce: 9b:cc:ec:6c:b5:76:0b:e4:40:15:4d:52:67:e5:b8:14: d7:09:89:9e:2d:dd:c4:ae:be:23:95:a0:d1:ad:86:4a: b2:0f:cf:f9:3a:03:d3:27:25:8e:ba:5f:fa:cc:c3:f8: 0e:74:c3:16:75:9b:71:56:fc:03:d4:79:7c:62:24:d8: f1:36:35:49:77:25:26:13:c2:2f:9f:68:66:69:95:78: ab:e7:6f:04:2b:43:58:32:5e:78:5c:e9:22:bf:30:36: d7:dd:e0:29:ca:64:2e:ce:73:3e:56:31:b8:2c:9b:d5: 92:6f:31:7d:ec:c6:d9:17:0e:cb:f3:60:ca:39:58:75: 91:52:5b:e9:cd:81:c5:dd:db:83:d5:5a:8f:b1:1f:78: 44:80:5e:19:9d:77:33:74:c4:d8:77:54:5e:b8:58:0c: 93:af:c2:4c:b5:25:74:ee:e2:70:11:a9:a0:59:3c:77: 70:bf:de:03:54:3c:dc:34:23:3e:f5:99:fb:61:5e:c7: 5e:79:ee:87:f2:12:20:fe:fd:20:ae:c5:d8:7a:42:dd: 9c:0b:db:be:69:81:3d:7f:09:b5:36:16:ff:5a:98:b8 Fingerprint (SHA-256): 83:E3:94:3F:06:75:FF:48:EB:03:A2:2A:2C:4E:78:09:BB:DB:A6:5D:EF:D5:2F:50:07:04:E2:0E:74:54:2A:7E Fingerprint (SHA1): B4:9E:A2:C4:8F:66:93:6F:D1:5F:C2:05:6B:EC:F0:B7:38:1A:F1:D3 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5798: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der cert.sh: #5799: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #5800: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #5801: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #5802: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #5803: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #5804: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #5805: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:32:9b Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Mar 31 16:48:47 2017 Not After : Sat Jul 01 16:48:47 2017 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:05:2b:84:c3:5d:eb:76:4c:dc:59:6f:98:5c:e5:69: df:71:c7:e9:41:53:f5:c2:ed:af:ac:06:9e:91:fe:48: 1f:31:dc:5e:ca:99:16:07:90:2c:51:06:4c:44:f2:df: 7f:8b:3c:28:f0:1d:58:62:01:e1:1f:d9:1a:4d:60:9d: 32:f5:7c:4e:1a:12:bd:30:fe:3a:5a:b0:ac:4f:df:d9: a0:77:73:a0:83:b2:dd:85:c9:73:74:09:4b:e3:84:14: 07:36:21:6f:9f:1e:3c:2e:cd:cc:d2:99:34:0f:1b:6b: 6b:c1:31:2b:22:94:15:c9:cc:c2:1a:8c:85:09:e4:db: 48:18:b2:d5:d0:7e:61:81:85:82:89:d0:69:cf:d6:2a: 3e:9f:3a:80:d6:e6:a1:e9:f6:4e:34:8a:78:9e:50:db: f2:09:19:fc:61:d7:08:6e:59:bd:aa:f9:05:3b:e3:f9: 25:45:4d:f6:65:db:aa:27:e2:2b:71:f1:fd:52:9e:99: a3:e8:6a:f0:e1:62:0d:9d:22:3b:7d:1a:a0:f6:6b:50: 11:d7:c2:cb:5e:85:7a:21:eb:b3:ad:e9:30:50:29:aa: 4e:0c:b1:bc:06:65:1c:af:82:03:f6:10:ad:ce:be:ab: 2f:36:55:9c:d8:13:74:b4:8d:fb:df:9c:7e:8b:79:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6e:41:53:08:e7:4a:1e:bc:e3:79:84:6d:b8:0c:80:43: 34:00:6e:b9:fc:7e:a3:0d:7e:39:48:8d:d9:3e:fb:31: 89:66:22:0a:4b:30:55:8a:9b:58:7d:9c:bd:77:65:b8: 90:71:0c:f5:9f:a6:92:32:90:49:e0:bd:e2:b8:bc:b2: 8b:ed:06:d5:d8:bf:13:9a:7c:50:68:8e:e3:ba:b0:f1: 57:ce:cd:74:8f:14:94:ee:b3:4d:1c:43:7c:9a:07:07: c7:b7:ab:85:8a:c6:01:d2:69:c2:18:b3:63:06:fc:fe: ea:e2:81:9a:13:eb:84:4b:11:c3:ed:e3:eb:4a:00:a3: 00:21:b0:2e:6b:5a:c5:85:2c:a2:a9:82:24:23:20:a1: e7:ec:9c:2d:8b:d6:b5:85:fe:da:d2:ba:96:ca:96:4f: ad:c1:dd:9c:2f:1f:37:50:2c:43:32:e5:19:fb:cd:08: ec:6c:c6:39:b7:e3:00:79:f1:a9:d3:64:3c:c6:e9:22: 49:77:d0:69:a5:56:03:46:62:67:e2:47:02:5b:cf:c5: 3e:f1:13:9f:ce:eb:35:e4:6c:74:67:50:27:72:db:a4: bf:15:90:87:5b:36:c7:ae:3e:b0:38:50:9d:29:6e:a2: 83:08:9a:92:bc:ab:c5:b1:85:ce:40:96:2a:4f:40:f3 Fingerprint (SHA-256): ED:F9:EA:35:13:9A:B4:EC:F8:52:FD:4B:CC:D8:83:4D:B5:87:69:54:90:A9:C4:B6:3E:6F:41:D3:27:3B:9D:E6 Fingerprint (SHA1): 6B:81:A6:A8:7D:A9:AD:5A:A9:A9:D7:47:A2:3C:F4:AD:7A:2C:84:7F Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5806: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #5807: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #5808: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw cert.sh: #5809: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5810: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5811: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dbpass -o root.cert cert.sh: #5812: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #5813: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5814: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #5815: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #5816: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5817: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA.ca.cert cert.sh: #5818: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #5819: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #5820: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5821: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #5822: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5823: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5824: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #5825: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5826: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5827: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #5828: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5829: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5830: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #5831: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5832: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5833: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #5834: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5835: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #5836: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #5837: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #5838: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #5839: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5840: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #5841: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5842: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #5843: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #5844: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #5845: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #5846: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #5847: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #5848: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #5849: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #5850: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #5851: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #5852: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #5853: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #5854: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #5855: perform selftest - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5856: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #5857: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5858: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5859: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #5860: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5861: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5862: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #5863: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5864: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5865: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #5866: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5867: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5868: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #5869: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5870: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5871: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #5872: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5873: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5874: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #5875: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5876: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5877: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #5878: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5879: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5880: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #5881: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5882: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5883: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #5884: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5885: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5886: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #5887: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5888: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5889: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #5890: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5891: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5892: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #5893: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5894: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5895: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #5896: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5897: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5898: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #5899: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5900: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5901: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #5902: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5903: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5904: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #5905: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5906: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5907: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #5908: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5909: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5910: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #5911: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5912: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5913: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #5914: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5915: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5916: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #5917: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5918: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5919: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #5920: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5921: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5922: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #5923: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5924: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5925: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #5926: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5927: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5928: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #5929: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5930: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5931: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #5932: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5933: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5934: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #5935: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5936: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5937: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #5938: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5939: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5940: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #5941: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5942: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5943: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #5944: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5945: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5946: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #5947: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5948: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5949: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #5950: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5951: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5952: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #5953: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5954: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5955: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #5956: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5957: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5958: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #5959: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5960: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5961: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #5962: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5963: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5964: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #5965: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5966: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5967: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #5968: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5969: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5970: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #5971: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5972: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5973: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #5974: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5975: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5976: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #5977: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5978: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5979: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #5980: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5981: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5982: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #5983: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5984: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5985: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #5986: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5987: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5988: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #5989: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5990: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5991: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #5992: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5993: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5994: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #5995: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5996: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5997: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #5998: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5999: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6000: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #6001: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6002: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6003: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #6004: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6005: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6006: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #6007: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6008: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6009: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #6010: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6011: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6012: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #6013: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6014: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6015: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #6016: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6017: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6018: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #6019: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6020: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6021: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #6022: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6023: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6024: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #6025: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6026: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6027: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #6028: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6029: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6030: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #6031: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6032: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6033: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #6034: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6035: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6036: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #6037: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6038: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6039: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #6040: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6041: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6042: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #6043: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6044: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6045: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #6046: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6047: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #6048: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #6049: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #6050: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #6051: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #6052: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #6053: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #6054: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #6055: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #6056: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #6057: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #6058: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #6059: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #6060: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #6061: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #6062: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #6063: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #6064: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #6065: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #6066: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #6067: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Fri Mar 31 16:54:31 UTC 2017 Running tests for tools TIMESTAMP tools BEGIN: Fri Mar 31 16:54:31 UTC 2017 tools.sh: Tools Tests with ECC =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6068: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fb:2a:ef:d3:27:ce:dc:6d:b3:58:5c:fa:72:22:5d:d8 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6069: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6070: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6071: Exporting Alice's email EC cert & key (pk12util -o) - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6072: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 35:47:0e:c4:45:05:98:78:05:8d:49:0b:4b:35:93:98 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Mar 31 16:40:59 2017 Not After : Thu Mar 31 16:40:59 2067 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:a5:8b:8a:a8:96:52:a1:7c:f5:9f:f3:19:33:8d: 00:95:b1:6b:49:94:6d:86:af:1f:60:8f:8b:3e:66:86: 25:88:13:9a:8f:4e:5d:a3:e4:f3:16:d3:c8:a8:61:ec: 3c:90:68:55:90:db:53:27:e2:b3:71:99:bc:33:88:3d: ba:b6:bb:00:91:af:da:b5:d4:21:8c:9a:84:38:60:fc: 41:24:f8:84:bb:1c:63:18:20:4d:8f:76:cb:d3:d8:98: b5:09:41:fb:f6:85:5b:c4:03:c5:42:3f:21:fd:83:62: ce:a1:1c:83:6b:ab:47:5a:30:27:18:7c:23:23:fe:10: d7:15:74:b2:74 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:01:6c:f2:f0:0d:98:c0:7b:35:46:98: fe:70:5c:f8:8f:98:c7:22:7f:c7:a6:b5:30:4c:71:b7: ea:4a:ef:ad:9a:73:1d:4c:95:48:86:18:65:97:33:5e: e8:9c:4d:da:b3:d2:fb:3c:75:f4:9e:d0:a8:13:13:e3: ae:31:f5:f8:7b:ec:1f:02:42:00:e5:83:a9:d8:83:d1: 61:9a:0e:9f:97:45:98:54:3e:1b:c2:d6:b6:bc:99:22: 16:1e:6f:13:d3:62:f8:15:fb:55:a6:42:5e:a5:30:f2: 88:49:2c:77:99:8b:4d:ba:01:68:e8:9c:10:26:4b:28: 4f:35:5b:1d:6d:5e:35:b5:e3:a1:ed Fingerprint (SHA-256): 6C:83:5C:18:9D:EA:B6:7C:3B:A0:5E:BE:A9:F6:3A:2C:59:60:C3:12:3E:C6:78:6C:D6:93:45:13:E6:B8:6E:40 Fingerprint (SHA1): CA:AF:5D:01:C1:A5:80:90:41:4E:E7:6A:D5:1A:1D:98:FF:03:2E:F2 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Mar 31 16:43:27 2017 Not After : Thu Mar 31 16:43:27 2022 Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:c6:5f:d9:d4:27:0e:f0:a2:5c:c1:88:ae:22:ef:c4: 21:f0:83:75:eb:b7:1e:4a:03:b0:4d:88:02:98:7b:2e: 17:93:26:31:38:2e:06:53:a6:8d:2e:17:23:65:76:87: 20:0d:82:34:5d:39:c4:61:ca:5d:f5:3e:2b:1d:85:90: 92:e8:bc:6a:02:c1:dc:5f:0c:90:94:f7:54:ef:ff:00: c0:8e:56:23:ee:ee:2d:1f:09:45:be:c9:4c:da:3f:89: 7e Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:00:81:71:1b:f1:b3:24:73:64:4c:b5: 9a:9f:84:8c:6d:97:ca:c2:04:9e:c9:3b:b4:f3:98:e2: 67:3e:aa:6c:b4:8a:56:b4:d5:2b:f5:2f:63:62:7d:c3: 79:48:26:fa:d3:f0:cd:93:6a:f8:5e:82:52:dc:5a:f4: 39:2e:3d:ca:e5:9a:02:02:42:01:46:d2:4f:70:ac:6a: 3e:02:91:8a:3a:5a:db:af:48:02:0f:68:75:42:5c:45: 1f:23:e2:e7:bd:98:e9:77:79:e8:aa:f6:03:d7:83:25: 45:6c:b3:5b:48:8a:15:eb:95:66:3b:1b:7b:22:4b:e3: 9d:e1:4b:bc:91:d8:09:25:8a:08:4c Fingerprint (SHA-256): 11:09:A0:8B:CA:9E:8C:76:1C:B2:16:2E:0D:58:B3:FF:A2:FE:DB:DF:9D:BD:41:B1:F0:95:25:D3:E9:37:C1:77 Fingerprint (SHA1): F4:4E:2D:12:98:50:B0:ED:6C:95:6C:D7:FE:F7:63:5E:2B:90:4D:25 Friendly Name: Alice-ec tools.sh: #6073: Listing Alice's pk12 EC file (pk12util -l) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6074: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 00:d4:26:45:b7:79:3b:62:8a:83:54:db:cb:b0:4c:86 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6075: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6076: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6077: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: a2:77:82:c2:03:79:da:62:e9:67:74:ca:d0:ae:ce:e3 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6078: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6079: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6080: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 9c:f6:a6:c0:cf:83:da:77:01:12:37:5a:1d:6f:d6:22 Iteration Count: 2000 (0x7d0) tools.sh: #6081: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6082: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6083: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 94:e8:89:15:56:1e:b0:63:5f:d6:87:97:9b:a7:65:3e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6084: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6085: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6086: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cf:f1:dd:c2:72:a9:69:a0:70:7a:8b:f1:1a:dc:d3:e7 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6087: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6088: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6089: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 34:8a:21:32:59:b9:c2:63:3a:e8:96:f1:00:7e:01:d2 Iteration Count: 2000 (0x7d0) tools.sh: #6090: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6091: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6092: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c4:a3:ef:d8:2c:4b:56:9e:93:a5:c9:97:1d:ad:e9:1e Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:2c:0b:a4:6e:00:2f:d4:22:fb:83:90:10:ba:c1: ea:e6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6093: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6094: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6095: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 13:43:7c:86:12:bc:45:eb:10:9c:21:c8:02:44:10:2d Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:6b:eb:60:ca:25:57:c0:53:ab:d4:ce:87:75:63: f9:a1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6096: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6097: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6098: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6c:3a:15:50:4b:a7:55:17:23:6b:51:4b:4d:1e:16:de Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:6b:55:68:45:6d:78:b2:c8:d2:2e:ec:b7:29:cc: 82:5f tools.sh: #6099: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6100: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6101: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a4:6e:3e:de:81:82:7c:80:32:72:3e:6f:30:8a:2f:1b Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:75:32:92:57:91:67:11:3f:b9:2f:42:5e:68:8f: ac:e8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6102: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6103: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6104: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 73:ce:25:3a:0c:5b:ca:e7:8f:a1:ee:9b:00:e9:20:80 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:87:cb:a7:b5:9c:25:28:d2:e2:f5:58:96:58:b5: 85:21 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6105: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6106: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6107: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 17:34:84:30:e4:eb:41:78:1c:51:93:62:18:72:8a:fa Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:de:e1:57:25:88:88:5b:3a:69:46:80:70:3b:25: 94:54 tools.sh: #6108: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6109: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6110: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c9:4f:b4:88:b7:0b:93:74:a1:09:5c:6d:d6:91:36:74 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:73:54:b9:98:d8:4d:8c:c8:33:4b:0d:3b:c0:fc: 4d:41 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6111: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6112: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6113: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b7:34:70:65:50:fb:bd:a2:48:bd:85:fa:d8:9e:c8:24 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:39:58:5f:c5:99:54:b5:d0:1f:05:b6:dd:fb:a5: 10:a4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6114: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6115: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6116: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 49:d2:cd:6d:6b:65:3e:a8:3b:17:fe:7c:1d:b4:54:b0 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e2:35:a7:fe:28:38:37:81:c1:ec:68:76:da:78: e0:07 tools.sh: #6117: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6118: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6119: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 51:c6:29:39:41:97:cb:61:ae:53:74:3e:3b:ee:fe:7a Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:8a:6c:6d:48:4e:8d:e7:c1:b7:04:eb:78:01:10: 08:71 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6120: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6121: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6122: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6d:69:e4:d2:3f:8d:8b:65:94:a8:3f:8d:fd:3e:af:82 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:74:47:84:85:2c:75:dc:78:02:69:bc:be:97:2a: a8:e7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6123: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6124: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6125: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9d:ae:ee:e3:88:10:56:27:e1:94:76:b4:46:2c:d4:36 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:00:dc:ec:16:ee:a4:6b:59:b7:d7:c1:12:41:9f: 03:5c tools.sh: #6126: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6127: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6128: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c5:cb:0c:5e:95:9e:8f:15:b8:12:5c:31:6f:96:fc:d8 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:c1:e1:f5:fa:b4:35:3a:cc:a3:1b:87:21:9b:b6: af:55 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6129: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6130: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6131: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a8:a6:95:83:93:0e:e5:f3:09:7e:76:29:ab:4b:a8:45 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:33:00:11:33:94:78:42:29:1f:02:76:5e:2b:d3: a0:5d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6132: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6133: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6134: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5b:a0:cb:f2:65:37:41:cb:96:6b:af:6f:71:ed:88:56 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:b2:8c:b4:46:2c:c4:b7:bc:98:ca:a0:91:6a:4d: a4:ab tools.sh: #6135: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6136: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6137: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0c:18:b7:df:47:50:e6:fd:2f:cf:f4:d3:15:1d:4e:41 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:0e:2a:05:7b:88:88:da:98:e3:3f:2c:00:c3:3b: 8a:73 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6138: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6139: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6140: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 82:89:07:41:b2:fa:94:ed:25:7c:6e:7a:eb:9d:3e:f6 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:91:26:5d:fa:4a:16:6c:e2:ad:1c:24:b7:5c:3e: 8b:e6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6141: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6142: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6143: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 13:db:4b:db:2d:ee:65:55:0d:3b:f4:80:47:e8:bc:10 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:66:26:17:6d:9d:04:10:88:33:ba:4f:6c:75:a8: 52:83 tools.sh: #6144: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6145: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6146: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: d0:15:c1:b0:89:fa:8d:e5:55:42:f0:db:27:b5:6b:98 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6147: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6148: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6149: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 98:ea:88:1b:93:8e:3d:39:5d:c3:53:ec:58:e1:b9:99 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6150: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6151: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6152: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: d6:dc:f0:0f:7c:d8:db:0c:f1:23:a7:94:d5:25:05:a2 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6153: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6154: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6155: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: a4:d1:e1:4c:60:f5:1c:29:a2:bc:bd:c3:11:5e:f8:e3 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6156: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6157: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6158: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 75:1e:18:b3:29:96:33:56:bb:64:8d:9c:1f:ef:88:6c Iteration Count: 2000 (0x7d0) tools.sh: #6159: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6160: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6161: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: a4:60:af:f9:c7:d7:74:66:bf:bd:81:06:84:6f:bd:83 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6162: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6163: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6164: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: d3:b7:1f:8c:e6:27:e9:d9:67:1b:f7:34:47:9a:44:43 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6165: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6166: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6167: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: dc:b5:52:a0:d8:21:8b:52:e3:9a:41:1d:29:bf:a7:31 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6168: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6169: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6170: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 74:15:a5:6a:9f:f8:26:d7:da:fb:40:74:aa:5d:4b:55 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6171: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6172: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6173: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: f6:cb:d5:6e:ee:82:b5:0a:88:12:68:95:8b:36:67:17 Iteration Count: 2000 (0x7d0) tools.sh: #6174: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6175: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6176: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 6f:76:35:ba:ff:79:17:8d:11:d5:24:b5:10:8c:76:27 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6177: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6178: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6179: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c7:e4:8f:62:02:4e:c1:96:9d:a2:c2:b1:4b:23:da:34 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6180: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6181: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6182: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 91:c1:7d:4d:90:a4:9e:f6:1e:af:85:a8:d2:20:bd:bf Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6183: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6184: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6185: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 41:42:24:04:d6:6f:3a:9f:c4:1a:29:65:cf:51:d9:c7 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6186: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6187: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6188: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: b3:f0:07:e9:df:5d:0c:dc:0e:fc:02:45:3a:56:f6:fd Iteration Count: 2000 (0x7d0) tools.sh: #6189: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6190: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6191: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a8:14:d8:86:00:20:c3:4f:7a:1d:5e:e9:48:95:8d:7f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6192: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6193: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6194: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5d:0f:bf:2f:b8:7c:ad:46:de:69:04:83:c3:43:fc:ab Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6195: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6196: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6197: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a1:e0:3f:51:06:b3:3c:19:a2:6f:18:ab:b1:6a:06:58 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6198: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6199: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6200: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5b:89:2d:99:90:63:25:5e:f2:de:a8:a3:93:2a:e7:d6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6201: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6202: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6203: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6e:7a:69:3e:79:fa:16:83:54:4e:26:60:af:93:5a:0b Iteration Count: 2000 (0x7d0) tools.sh: #6204: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6205: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6206: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a9:c6:36:f2:37:03:92:83:6e:1d:0b:22:d8:55:bd:38 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6207: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6208: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6209: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 06:db:33:1f:c7:6f:79:66:0d:8d:bf:b8:bf:0f:86:99 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6210: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6211: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6212: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8e:a9:f1:ef:71:9d:47:2d:b5:1b:5d:b9:35:ab:87:e6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6213: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6214: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6215: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d6:f9:ff:fa:7d:c5:37:c8:d5:42:2d:74:05:0d:df:dd Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6216: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6217: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6218: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4f:df:43:8b:a4:7d:76:11:22:c6:9f:26:43:d7:ba:a7 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6219: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6220: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6221: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d6:0c:14:68:22:7c:89:9d:f8:be:a6:14:96:1a:d1:88 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6222: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6223: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6224: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c4:3e:79:0a:ed:85:be:39:96:ca:45:61:ca:a6:85:e9 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6225: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6226: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6227: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 92:9b:c4:83:1a:3e:71:ec:8b:ac:75:a4:ce:24:51:df Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6228: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6229: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6230: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 61:93:a5:ed:0e:02:2e:5e:a4:b9:f4:8d:02:aa:e1:16 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6231: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6232: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6233: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e4:bc:0e:5a:d0:f7:ed:02:9a:a0:48:42:e0:ff:80:b4 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:39:51 2017 Not After : Thu Mar 31 16:39:51 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:f8:ec:c6:3a:8c:a7:7d:e2:0c:39:62:0c:bd:22:3e: ea:e0:b8:92:2b:5f:a3:7a:54:ac:e4:43:97:52:06:4c: 36:3e:e4:7a:ef:68:9d:2b:6d:18:96:36:50:8d:36:b8: 58:e6:a4:3c:f1:98:87:87:aa:38:c7:e4:60:40:7c:76: be:ea:0e:71:78:24:4b:0a:17:dc:af:52:7d:a4:b2:4e: 7e:f4:a1:a3:a2:7e:fb:7b:9a:7a:91:27:02:dd:fd:f1: 87:02:20:9e:57:95:a8:14:07:0d:8b:95:74:61:3d:35: fe:a2:c1:8b:5f:e6:8a:16:a1:e7:9f:a3:95:84:59:29: 40:66:76:a9:f6:de:3d:2f:e2:35:b2:5b:48:d1:3b:63: aa:3e:39:1d:27:d9:84:c5:91:54:71:0e:ef:da:0e:14: d0:36:e2:9c:9c:85:03:5e:01:5f:c4:d1:1b:5c:99:a7: 9f:a9:86:f0:64:6a:4c:9e:02:5d:94:00:ac:c1:1a:28: 28:bf:3d:c9:7f:e6:d6:a0:3a:fb:11:51:aa:2c:ee:39: 8e:b0:78:1a:6c:94:a7:04:80:e6:6d:ad:0c:04:aa:fe: 7b:5e:4c:b0:5c:9c:4d:2f:0a:f8:fe:d8:86:55:30:cc: 8c:a8:26:21:04:24:10:b1:bd:c7:e0:e9:e6:ba:95:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:1d:9d:ad:d4:b4:c4:67:b9:8d:92:6c:a3:ff:e9:d5: de:23:00:72:58:1d:04:24:52:1a:72:16:fb:f3:7d:db: b3:a5:c5:a0:e1:3f:1d:54:22:c1:d3:fb:38:41:2d:6f: 3b:78:e5:9c:80:84:6c:c9:88:6c:d7:fc:de:54:e0:07: 28:54:4f:6b:d4:83:68:22:7d:6b:47:e3:c0:19:2a:e9: 5b:00:dc:e9:9f:43:de:be:17:13:96:ca:da:9f:32:69: c4:38:ca:f1:2f:be:8c:ae:94:65:39:98:ea:7f:a1:52: bc:a9:c5:c6:2b:71:db:97:7f:3e:1f:92:64:b8:8d:f3: af:0c:8c:45:81:44:b9:f5:0c:d1:ff:79:63:21:b3:ef: 12:73:46:3a:b0:f2:1a:1d:06:c8:26:6a:43:a3:fc:3a: a8:be:dc:ae:31:3c:d0:46:f9:1d:33:6f:2c:5f:c9:00: 9d:c1:f3:78:85:a5:5c:f4:d5:aa:84:25:d0:0d:d5:5c: 78:f0:cf:ee:a2:8d:91:3d:6f:1c:fe:36:9e:c1:e2:e5: a3:59:e9:d2:94:85:8e:3e:c0:87:da:54:1c:77:d1:17: cf:94:25:df:69:c4:c6:b1:62:fa:f0:e5:b2:81:62:05: 80:f5:a0:34:3a:56:d0:20:96:bf:22:d8:ec:10:f9:f9 Fingerprint (SHA-256): FF:50:EF:31:FE:A7:6F:B5:22:0A:65:BA:DC:A4:6C:E7:6F:0F:FB:9B:D1:E6:66:09:31:2D:D2:75:90:25:79:BD Fingerprint (SHA1): AB:E2:88:8E:DA:51:EA:54:A2:E4:D4:F4:71:69:6D:F6:F3:17:9B:82 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 16:43:21 2017 Not After : Thu Mar 31 16:43:21 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:13:f6:6a:ea:ba:55:7f:7f:f8:8c:91:60:8e:6c:a8: 1e:be:31:f2:66:83:93:7a:ca:74:fc:ca:e5:43:49:45: 23:66:bd:c2:f2:f4:ac:e2:78:09:7c:29:40:56:2b:0f: 06:90:d7:bf:3a:83:c5:9d:aa:0f:c2:08:11:fe:5a:5e: 1f:e5:3a:d4:04:69:2f:e6:a7:dd:c5:d5:10:9d:f6:85: dd:ac:1b:a0:2c:c5:be:90:ff:a8:c1:c0:ba:e1:78:ea: 55:3d:2f:da:9d:88:a2:f1:d9:5a:35:18:c2:f9:c5:c7: 73:3f:c1:8b:50:d0:d9:a5:a9:15:24:23:3a:f8:3a:98: 96:cb:20:9f:ee:13:08:f5:45:01:74:f9:b7:11:e2:d3: ff:10:e1:b1:00:f6:65:3a:a8:da:71:1f:05:4d:e9:43: 7c:d5:7c:e8:a3:59:d9:9b:79:a5:7c:7d:b9:2f:36:bf: 53:9e:5d:2d:7b:8e:aa:74:c7:fd:5c:01:db:77:ca:2c: d2:84:78:40:cf:cb:68:64:cb:1d:da:b5:84:84:a8:13: 52:f2:8d:6b:c7:e2:c6:7d:b8:7d:7c:64:b9:0c:ae:1e: d2:03:25:51:b2:98:ca:6c:64:48:04:c2:1c:26:b8:0c: 55:8e:0c:8c:e9:3c:62:43:07:00:ec:f3:52:39:3c:c5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:f7:e5:c4:37:44:db:da:c5:4b:41:3c:f8:de:47:13: f8:21:1a:f6:d9:d9:67:ba:9e:df:19:f5:50:a4:70:30: 10:fd:78:14:d3:d0:a5:b9:ce:f6:ee:d7:70:a8:d7:ec: 20:c5:29:4d:38:c1:46:e6:54:9b:21:ab:cb:da:e8:c0: 57:38:7a:cb:6c:14:be:a4:ad:26:96:4c:a3:a8:27:e5: f0:66:6c:4d:ff:a3:bc:88:41:7c:ad:47:fd:b8:9b:9c: 6e:2a:bb:02:ef:2d:2f:76:b3:be:a9:10:a5:d8:65:d6: 01:8c:aa:41:ce:c4:42:f3:d8:46:cc:2d:2e:09:31:b9: 7c:57:7f:5b:62:ba:52:4c:9e:d4:9b:c8:b6:ba:b1:84: 78:9d:95:7c:13:60:af:3b:09:b4:b0:e7:9e:28:96:79: ac:c5:d4:61:5f:25:f9:d4:2f:12:66:19:cb:41:b6:fe: 07:e8:b3:1b:e4:a6:de:32:d8:0b:b8:43:49:9f:7a:5b: 73:f1:de:0f:d3:55:a0:14:2e:6e:99:05:68:c4:51:63: 98:0b:d6:3b:da:b7:14:00:ea:c5:d3:bb:12:3e:61:37: c5:36:c4:d6:43:ea:55:cf:06:91:eb:da:f2:99:72:2e: ec:f6:08:4d:22:2a:3d:be:1f:5c:ab:8c:c4:22:2b:5f Fingerprint (SHA-256): 95:B4:80:E2:43:12:33:F5:22:4F:01:4B:2F:61:B4:7B:AC:89:DF:77:1D:DB:D5:7F:B5:5A:A8:3C:7B:AA:7A:50 Fingerprint (SHA1): 3B:EF:3C:FF:0B:CC:36:EF:D6:E5:89:67:56:B4:36:71:00:4F:51:18 Friendly Name: Alice tools.sh: #6234: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #6235: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #6236: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #6237: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #6238: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #6239: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #6240: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #6241: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #6242: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #6243: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #6244: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Fri Mar 31 16:56:11 UTC 2017 Running tests for fips TIMESTAMP fips BEGIN: Fri Mar 31 16:56:11 UTC 2017 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #6245: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #6246: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 0589382379228388975400c6d9164d2e5e1083e8 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #6247: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #6248: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #6249: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6250: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #6251: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #6252: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #6253: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #6254: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #6255: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #6256: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #6257: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 0589382379228388975400c6d9164d2e5e1083e8 FIPS_PUB_140_Test_Certificate fips.sh: #6258: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #6259: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #6260: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #6261: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #6262: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 0589382379228388975400c6d9164d2e5e1083e8 FIPS_PUB_140_Test_Certificate fips.sh: #6263: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #6264: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #6265: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest1.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle Changing byte 0x00033964 (211300): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/fips/mangle dbtest -r -d ../fips fips.sh: #6266: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Fri Mar 31 16:57:37 UTC 2017 Running tests for ssl TIMESTAMP ssl BEGIN: Fri Mar 31 16:57:37 UTC 2017 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 16:57:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:57:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 16:57:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6267: Server never started - PASSED kill -0 29576 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29576 found at Fri Mar 31 16:57:43 UTC 2017 selfserv_9626 with PID 29576 started at Fri Mar 31 16:57:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6268: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 29576 at Fri Mar 31 16:57:44 UTC 2017 kill -USR1 29576 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29576 killed at Fri Mar 31 16:57:44 UTC 2017 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 16:57:45 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:57:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 16:57:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6269: Server never started - PASSED kill -0 29644 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29644 found at Fri Mar 31 16:57:51 UTC 2017 selfserv_9626 with PID 29644 started at Fri Mar 31 16:57:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6270: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 29644 at Fri Mar 31 16:57:51 UTC 2017 kill -USR1 29644 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29644 killed at Fri Mar 31 16:57:51 UTC 2017 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 16:57:52 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:57:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 16:57:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6271: Server never started - PASSED kill -0 29712 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29712 found at Fri Mar 31 16:57:58 UTC 2017 selfserv_9626 with PID 29712 started at Fri Mar 31 16:57:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6272: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 29712 at Fri Mar 31 16:57:58 UTC 2017 kill -USR1 29712 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29712 killed at Fri Mar 31 16:57:59 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 16:57:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:57:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 16:58:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6273: Server never started - PASSED kill -0 29796 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29796 found at Fri Mar 31 16:58:05 UTC 2017 selfserv_9626 with PID 29796 started at Fri Mar 31 16:58:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6274: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 29796 at Fri Mar 31 16:58:05 UTC 2017 kill -USR1 29796 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29796 killed at Fri Mar 31 16:58:06 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 16:58:06 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:58:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 16:58:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6275: Server never started - PASSED kill -0 29879 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29879 found at Fri Mar 31 16:58:12 UTC 2017 selfserv_9626 with PID 29879 started at Fri Mar 31 16:58:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6276: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 29879 at Fri Mar 31 16:58:12 UTC 2017 kill -USR1 29879 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29879 killed at Fri Mar 31 16:58:13 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 16:58:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:58:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 16:58:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6277: Server never started - PASSED kill -0 29947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29947 found at Fri Mar 31 16:58:19 UTC 2017 selfserv_9626 with PID 29947 started at Fri Mar 31 16:58:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6278: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 29947 at Fri Mar 31 16:58:19 UTC 2017 kill -USR1 29947 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29947 killed at Fri Mar 31 16:58:20 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 16:58:20 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:58:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 16:58:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6279: Server never started - PASSED kill -0 30028 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30028 found at Fri Mar 31 16:58:26 UTC 2017 selfserv_9626 with PID 30028 started at Fri Mar 31 16:58:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6280: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 30028 at Fri Mar 31 16:58:27 UTC 2017 kill -USR1 30028 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30028 killed at Fri Mar 31 16:58:27 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 16:58:27 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:58:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 16:58:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6281: Server never started - PASSED kill -0 30096 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30096 found at Fri Mar 31 16:58:33 UTC 2017 selfserv_9626 with PID 30096 started at Fri Mar 31 16:58:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6282: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 30096 at Fri Mar 31 16:58:34 UTC 2017 kill -USR1 30096 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30096 killed at Fri Mar 31 16:58:34 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 16:58:34 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:58:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 16:58:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6283: Server never started - PASSED kill -0 30164 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30164 found at Fri Mar 31 16:58:40 UTC 2017 selfserv_9626 with PID 30164 started at Fri Mar 31 16:58:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6284: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 30164 at Fri Mar 31 16:58:41 UTC 2017 kill -USR1 30164 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30164 killed at Fri Mar 31 16:58:41 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 16:58:41 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:58:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 16:58:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6285: Server never started - PASSED kill -0 30245 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30245 found at Fri Mar 31 16:58:47 UTC 2017 selfserv_9626 with PID 30245 started at Fri Mar 31 16:58:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6286: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 30245 at Fri Mar 31 16:58:48 UTC 2017 kill -USR1 30245 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30245 killed at Fri Mar 31 16:58:48 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 16:58:48 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:58:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 16:58:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6287: Server never started - PASSED kill -0 30313 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30313 found at Fri Mar 31 16:58:54 UTC 2017 selfserv_9626 with PID 30313 started at Fri Mar 31 16:58:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6288: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 30313 at Fri Mar 31 16:58:55 UTC 2017 kill -USR1 30313 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30313 killed at Fri Mar 31 16:58:55 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 16:58:55 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:58:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 16:59:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6289: Server never started - PASSED kill -0 30384 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30384 found at Fri Mar 31 16:59:01 UTC 2017 selfserv_9626 with PID 30384 started at Fri Mar 31 16:59:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6290: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 30384 at Fri Mar 31 16:59:02 UTC 2017 kill -USR1 30384 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30384 killed at Fri Mar 31 16:59:02 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 16:59:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:59:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 16:59:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6291: Server never started - PASSED kill -0 30482 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30482 found at Fri Mar 31 16:59:09 UTC 2017 selfserv_9626 with PID 30482 started at Fri Mar 31 16:59:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6292: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 30482 at Fri Mar 31 16:59:09 UTC 2017 kill -USR1 30482 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30482 killed at Fri Mar 31 16:59:10 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 16:59:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:59:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 16:59:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6293: Server never started - PASSED kill -0 30550 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30550 found at Fri Mar 31 16:59:16 UTC 2017 selfserv_9626 with PID 30550 started at Fri Mar 31 16:59:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6294: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 30550 at Fri Mar 31 16:59:16 UTC 2017 kill -USR1 30550 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30550 killed at Fri Mar 31 16:59:17 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 16:59:17 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:59:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 16:59:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6295: Server never started - PASSED kill -0 30618 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30618 found at Fri Mar 31 16:59:23 UTC 2017 selfserv_9626 with PID 30618 started at Fri Mar 31 16:59:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6296: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 30618 at Fri Mar 31 16:59:23 UTC 2017 kill -USR1 30618 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30618 killed at Fri Mar 31 16:59:24 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 16:59:24 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:59:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 16:59:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6297: Server never started - PASSED kill -0 30699 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30699 found at Fri Mar 31 16:59:30 UTC 2017 selfserv_9626 with PID 30699 started at Fri Mar 31 16:59:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6298: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 30699 at Fri Mar 31 16:59:30 UTC 2017 kill -USR1 30699 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30699 killed at Fri Mar 31 16:59:31 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 16:59:31 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:59:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 16:59:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6299: Server never started - PASSED kill -0 30767 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30767 found at Fri Mar 31 16:59:37 UTC 2017 selfserv_9626 with PID 30767 started at Fri Mar 31 16:59:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6300: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 30767 at Fri Mar 31 16:59:37 UTC 2017 kill -USR1 30767 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30767 killed at Fri Mar 31 16:59:38 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 16:59:38 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:59:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 16:59:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6301: Server never started - PASSED kill -0 30835 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30835 found at Fri Mar 31 16:59:44 UTC 2017 selfserv_9626 with PID 30835 started at Fri Mar 31 16:59:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6302: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 30835 at Fri Mar 31 16:59:44 UTC 2017 kill -USR1 30835 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30835 killed at Fri Mar 31 16:59:45 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 16:59:45 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:59:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 16:59:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6303: Server never started - PASSED kill -0 30916 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30916 found at Fri Mar 31 16:59:51 UTC 2017 selfserv_9626 with PID 30916 started at Fri Mar 31 16:59:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6304: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 30916 at Fri Mar 31 16:59:52 UTC 2017 kill -USR1 30916 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30916 killed at Fri Mar 31 16:59:52 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 16:59:52 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:59:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 16:59:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6305: Server never started - PASSED kill -0 30984 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30984 found at Fri Mar 31 16:59:58 UTC 2017 selfserv_9626 with PID 30984 started at Fri Mar 31 16:59:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6306: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 30984 at Fri Mar 31 16:59:59 UTC 2017 kill -USR1 30984 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30984 killed at Fri Mar 31 16:59:59 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 16:59:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 16:59:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:00:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6307: Server never started - PASSED kill -0 31055 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31055 found at Fri Mar 31 17:00:05 UTC 2017 selfserv_9626 with PID 31055 started at Fri Mar 31 17:00:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6308: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 31055 at Fri Mar 31 17:00:06 UTC 2017 kill -USR1 31055 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31055 killed at Fri Mar 31 17:00:06 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:00:06 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:00:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:00:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6309: Server never started - PASSED kill -0 31149 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31149 found at Fri Mar 31 17:00:12 UTC 2017 selfserv_9626 with PID 31149 started at Fri Mar 31 17:00:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6310: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 31149 at Fri Mar 31 17:00:13 UTC 2017 kill -USR1 31149 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31149 killed at Fri Mar 31 17:00:13 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:00:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:00:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:00:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6311: Server never started - PASSED kill -0 31217 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31217 found at Fri Mar 31 17:00:19 UTC 2017 selfserv_9626 with PID 31217 started at Fri Mar 31 17:00:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6312: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 31217 at Fri Mar 31 17:00:20 UTC 2017 kill -USR1 31217 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31217 killed at Fri Mar 31 17:00:20 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:00:20 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:00:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:00:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6313: Server never started - PASSED kill -0 31286 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31286 found at Fri Mar 31 17:00:26 UTC 2017 selfserv_9626 with PID 31286 started at Fri Mar 31 17:00:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6314: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 31286 at Fri Mar 31 17:00:27 UTC 2017 kill -USR1 31286 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31286 killed at Fri Mar 31 17:00:27 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:00:28 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:00:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:00:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6315: Server never started - PASSED kill -0 31366 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31366 found at Fri Mar 31 17:00:34 UTC 2017 selfserv_9626 with PID 31366 started at Fri Mar 31 17:00:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6316: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 31366 at Fri Mar 31 17:00:34 UTC 2017 kill -USR1 31366 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31366 killed at Fri Mar 31 17:00:35 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:00:35 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:00:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:00:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6317: Server never started - PASSED kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31434 found at Fri Mar 31 17:00:41 UTC 2017 selfserv_9626 with PID 31434 started at Fri Mar 31 17:00:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6318: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 31434 at Fri Mar 31 17:00:41 UTC 2017 kill -USR1 31434 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31434 killed at Fri Mar 31 17:00:42 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:00:42 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:00:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:00:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6319: Server never started - PASSED kill -0 31503 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31503 found at Fri Mar 31 17:00:48 UTC 2017 selfserv_9626 with PID 31503 started at Fri Mar 31 17:00:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6320: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 31503 at Fri Mar 31 17:00:48 UTC 2017 kill -USR1 31503 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31503 killed at Fri Mar 31 17:00:49 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:00:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:00:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:00:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6321: Server never started - PASSED kill -0 31584 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31584 found at Fri Mar 31 17:00:55 UTC 2017 selfserv_9626 with PID 31584 started at Fri Mar 31 17:00:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6322: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 31584 at Fri Mar 31 17:00:55 UTC 2017 kill -USR1 31584 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31584 killed at Fri Mar 31 17:00:56 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:00:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:00:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:01:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6323: Server never started - PASSED kill -0 31655 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31655 found at Fri Mar 31 17:01:02 UTC 2017 selfserv_9626 with PID 31655 started at Fri Mar 31 17:01:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6324: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 31655 at Fri Mar 31 17:01:02 UTC 2017 kill -USR1 31655 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31655 killed at Fri Mar 31 17:01:03 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:01:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:01:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:01:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6325: Server never started - PASSED kill -0 31750 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31750 found at Fri Mar 31 17:01:09 UTC 2017 selfserv_9626 with PID 31750 started at Fri Mar 31 17:01:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6326: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 31750 at Fri Mar 31 17:01:10 UTC 2017 kill -USR1 31750 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31750 killed at Fri Mar 31 17:01:10 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:01:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:01:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:01:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6327: Server never started - PASSED kill -0 31832 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31832 found at Fri Mar 31 17:01:16 UTC 2017 selfserv_9626 with PID 31832 started at Fri Mar 31 17:01:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6328: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 31832 at Fri Mar 31 17:01:17 UTC 2017 kill -USR1 31832 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31832 killed at Fri Mar 31 17:01:17 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:01:17 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:01:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:01:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6329: Server never started - PASSED kill -0 31900 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31900 found at Fri Mar 31 17:01:23 UTC 2017 selfserv_9626 with PID 31900 started at Fri Mar 31 17:01:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6330: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 31900 at Fri Mar 31 17:01:24 UTC 2017 kill -USR1 31900 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31900 killed at Fri Mar 31 17:01:24 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:01:24 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:01:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:01:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6331: Server never started - PASSED kill -0 31969 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31969 found at Fri Mar 31 17:01:30 UTC 2017 selfserv_9626 with PID 31969 started at Fri Mar 31 17:01:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6332: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 31969 at Fri Mar 31 17:01:31 UTC 2017 kill -USR1 31969 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31969 killed at Fri Mar 31 17:01:31 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:01:31 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:01:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:01:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6333: Server never started - PASSED kill -0 32049 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32049 found at Fri Mar 31 17:01:37 UTC 2017 selfserv_9626 with PID 32049 started at Fri Mar 31 17:01:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6334: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 32049 at Fri Mar 31 17:01:38 UTC 2017 kill -USR1 32049 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32049 killed at Fri Mar 31 17:01:38 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:01:38 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:01:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:01:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6335: Server never started - PASSED kill -0 32117 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32117 found at Fri Mar 31 17:01:44 UTC 2017 selfserv_9626 with PID 32117 started at Fri Mar 31 17:01:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6336: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 32117 at Fri Mar 31 17:01:45 UTC 2017 kill -USR1 32117 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32117 killed at Fri Mar 31 17:01:45 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:01:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:01:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:01:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6337: Server never started - PASSED kill -0 32186 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32186 found at Fri Mar 31 17:01:51 UTC 2017 selfserv_9626 with PID 32186 started at Fri Mar 31 17:01:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6338: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 32186 at Fri Mar 31 17:01:52 UTC 2017 kill -USR1 32186 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32186 killed at Fri Mar 31 17:01:52 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:01:53 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:01:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:01:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6339: Server never started - PASSED kill -0 32266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32266 found at Fri Mar 31 17:01:59 UTC 2017 selfserv_9626 with PID 32266 started at Fri Mar 31 17:01:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6340: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 32266 at Fri Mar 31 17:01:59 UTC 2017 kill -USR1 32266 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32266 killed at Fri Mar 31 17:02:00 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:02:00 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:02:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:02:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6341: Server never started - PASSED kill -0 32337 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32337 found at Fri Mar 31 17:02:06 UTC 2017 selfserv_9626 with PID 32337 started at Fri Mar 31 17:02:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6342: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 32337 at Fri Mar 31 17:02:06 UTC 2017 kill -USR1 32337 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32337 killed at Fri Mar 31 17:02:07 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:02:07 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:02:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:02:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6343: Server never started - PASSED kill -0 32419 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32419 found at Fri Mar 31 17:02:13 UTC 2017 selfserv_9626 with PID 32419 started at Fri Mar 31 17:02:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6344: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 32419 at Fri Mar 31 17:02:13 UTC 2017 kill -USR1 32419 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32419 killed at Fri Mar 31 17:02:14 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:02:14 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:02:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:02:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6345: Server never started - PASSED kill -0 32499 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32499 found at Fri Mar 31 17:02:20 UTC 2017 selfserv_9626 with PID 32499 started at Fri Mar 31 17:02:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6346: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 32499 at Fri Mar 31 17:02:20 UTC 2017 kill -USR1 32499 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32499 killed at Fri Mar 31 17:02:21 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:02:21 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:02:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:02:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6347: Server never started - PASSED kill -0 32567 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32567 found at Fri Mar 31 17:02:27 UTC 2017 selfserv_9626 with PID 32567 started at Fri Mar 31 17:02:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6348: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 32567 at Fri Mar 31 17:02:27 UTC 2017 kill -USR1 32567 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32567 killed at Fri Mar 31 17:02:28 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:02:28 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:02:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:02:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6349: Server never started - PASSED kill -0 32636 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32636 found at Fri Mar 31 17:02:34 UTC 2017 selfserv_9626 with PID 32636 started at Fri Mar 31 17:02:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6350: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 32636 at Fri Mar 31 17:02:35 UTC 2017 kill -USR1 32636 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32636 killed at Fri Mar 31 17:02:35 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:02:35 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:02:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:02:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6351: Server never started - PASSED kill -0 32716 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32716 found at Fri Mar 31 17:02:41 UTC 2017 selfserv_9626 with PID 32716 started at Fri Mar 31 17:02:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6352: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 32716 at Fri Mar 31 17:02:42 UTC 2017 kill -USR1 32716 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32716 killed at Fri Mar 31 17:02:42 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:02:42 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:02:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:02:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6353: Server never started - PASSED kill -0 316 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 316 found at Fri Mar 31 17:02:48 UTC 2017 selfserv_9626 with PID 316 started at Fri Mar 31 17:02:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6354: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 316 at Fri Mar 31 17:02:49 UTC 2017 kill -USR1 316 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 316 killed at Fri Mar 31 17:02:49 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:02:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:02:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:02:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6355: Server never started - PASSED kill -0 387 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 387 found at Fri Mar 31 17:02:55 UTC 2017 selfserv_9626 with PID 387 started at Fri Mar 31 17:02:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6356: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 387 at Fri Mar 31 17:02:56 UTC 2017 kill -USR1 387 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 387 killed at Fri Mar 31 17:02:56 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:02:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:02:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:03:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6357: Server never started - PASSED kill -0 470 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 470 found at Fri Mar 31 17:03:02 UTC 2017 selfserv_9626 with PID 470 started at Fri Mar 31 17:03:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6358: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 470 at Fri Mar 31 17:03:03 UTC 2017 kill -USR1 470 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 470 killed at Fri Mar 31 17:03:03 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:03:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:03:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:03:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6359: Server never started - PASSED kill -0 552 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 552 found at Fri Mar 31 17:03:09 UTC 2017 selfserv_9626 with PID 552 started at Fri Mar 31 17:03:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6360: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 552 at Fri Mar 31 17:03:10 UTC 2017 kill -USR1 552 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 552 killed at Fri Mar 31 17:03:10 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:03:11 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:03:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:03:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6361: Server never started - PASSED kill -0 621 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 621 found at Fri Mar 31 17:03:17 UTC 2017 selfserv_9626 with PID 621 started at Fri Mar 31 17:03:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6362: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 621 at Fri Mar 31 17:03:17 UTC 2017 kill -USR1 621 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 621 killed at Fri Mar 31 17:03:17 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:03:18 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:03:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:03:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6363: Server never started - PASSED kill -0 701 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 701 found at Fri Mar 31 17:03:24 UTC 2017 selfserv_9626 with PID 701 started at Fri Mar 31 17:03:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6364: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 701 at Fri Mar 31 17:03:24 UTC 2017 kill -USR1 701 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 701 killed at Fri Mar 31 17:03:25 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:03:25 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:03:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:03:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6365: Server never started - PASSED kill -0 769 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 769 found at Fri Mar 31 17:03:31 UTC 2017 selfserv_9626 with PID 769 started at Fri Mar 31 17:03:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6366: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 769 at Fri Mar 31 17:03:31 UTC 2017 kill -USR1 769 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 769 killed at Fri Mar 31 17:03:32 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:03:32 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:03:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:03:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6367: Server never started - PASSED kill -0 838 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 838 found at Fri Mar 31 17:03:38 UTC 2017 selfserv_9626 with PID 838 started at Fri Mar 31 17:03:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6368: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 838 at Fri Mar 31 17:03:38 UTC 2017 kill -USR1 838 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 838 killed at Fri Mar 31 17:03:39 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:03:39 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:03:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:03:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6369: Server never started - PASSED kill -0 918 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 918 found at Fri Mar 31 17:03:45 UTC 2017 selfserv_9626 with PID 918 started at Fri Mar 31 17:03:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6370: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 918 at Fri Mar 31 17:03:45 UTC 2017 kill -USR1 918 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 918 killed at Fri Mar 31 17:03:46 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:03:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:03:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:03:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6371: Server never started - PASSED kill -0 987 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 987 found at Fri Mar 31 17:03:52 UTC 2017 selfserv_9626 with PID 987 started at Fri Mar 31 17:03:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6372: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 987 at Fri Mar 31 17:03:52 UTC 2017 kill -USR1 987 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 987 killed at Fri Mar 31 17:03:53 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:03:53 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:03:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:03:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6373: Server never started - PASSED kill -0 1071 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1071 found at Fri Mar 31 17:03:59 UTC 2017 selfserv_9626 with PID 1071 started at Fri Mar 31 17:03:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6374: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 1071 at Fri Mar 31 17:04:00 UTC 2017 kill -USR1 1071 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1071 killed at Fri Mar 31 17:04:00 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:04:00 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:04:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:04:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6375: Server never started - PASSED kill -0 1157 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1157 found at Fri Mar 31 17:04:06 UTC 2017 selfserv_9626 with PID 1157 started at Fri Mar 31 17:04:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6376: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 1157 at Fri Mar 31 17:04:07 UTC 2017 kill -USR1 1157 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1157 killed at Fri Mar 31 17:04:07 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:04:07 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:04:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:04:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6377: Server never started - PASSED kill -0 1242 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1242 found at Fri Mar 31 17:04:13 UTC 2017 selfserv_9626 with PID 1242 started at Fri Mar 31 17:04:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6378: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 1242 at Fri Mar 31 17:04:14 UTC 2017 kill -USR1 1242 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1242 killed at Fri Mar 31 17:04:14 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:04:14 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:04:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:04:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6379: Server never started - PASSED kill -0 1311 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1311 found at Fri Mar 31 17:04:20 UTC 2017 selfserv_9626 with PID 1311 started at Fri Mar 31 17:04:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6380: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 1311 at Fri Mar 31 17:04:21 UTC 2017 kill -USR1 1311 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1311 killed at Fri Mar 31 17:04:21 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:04:21 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:04:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:04:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6381: Server never started - PASSED kill -0 1391 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1391 found at Fri Mar 31 17:04:27 UTC 2017 selfserv_9626 with PID 1391 started at Fri Mar 31 17:04:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6382: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 1391 at Fri Mar 31 17:04:28 UTC 2017 kill -USR1 1391 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1391 killed at Fri Mar 31 17:04:28 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:04:29 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:04:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:04:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6383: Server never started - PASSED kill -0 1460 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1460 found at Fri Mar 31 17:04:34 UTC 2017 selfserv_9626 with PID 1460 started at Fri Mar 31 17:04:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6384: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 1460 at Fri Mar 31 17:04:35 UTC 2017 kill -USR1 1460 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1460 killed at Fri Mar 31 17:04:35 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:04:36 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:04:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:04:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6385: Server never started - PASSED kill -0 1528 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1528 found at Fri Mar 31 17:04:42 UTC 2017 selfserv_9626 with PID 1528 started at Fri Mar 31 17:04:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6386: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 1528 at Fri Mar 31 17:04:42 UTC 2017 kill -USR1 1528 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1528 killed at Fri Mar 31 17:04:43 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:04:43 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:04:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:04:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6387: Server never started - PASSED kill -0 1608 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1608 found at Fri Mar 31 17:04:49 UTC 2017 selfserv_9626 with PID 1608 started at Fri Mar 31 17:04:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6388: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 1608 at Fri Mar 31 17:04:49 UTC 2017 kill -USR1 1608 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1608 killed at Fri Mar 31 17:04:50 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:04:50 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:04:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:04:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6389: Server never started - PASSED kill -0 1678 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1678 found at Fri Mar 31 17:04:56 UTC 2017 selfserv_9626 with PID 1678 started at Fri Mar 31 17:04:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6390: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 1678 at Fri Mar 31 17:04:56 UTC 2017 kill -USR1 1678 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1678 killed at Fri Mar 31 17:04:57 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:04:57 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:04:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:05:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6391: Server never started - PASSED kill -0 1749 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1749 found at Fri Mar 31 17:05:03 UTC 2017 selfserv_9626 with PID 1749 started at Fri Mar 31 17:05:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6392: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 1749 at Fri Mar 31 17:05:03 UTC 2017 kill -USR1 1749 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1749 killed at Fri Mar 31 17:05:04 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:05:04 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:05:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:05:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6393: Server never started - PASSED kill -0 1847 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1847 found at Fri Mar 31 17:05:10 UTC 2017 selfserv_9626 with PID 1847 started at Fri Mar 31 17:05:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6394: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 1847 at Fri Mar 31 17:05:10 UTC 2017 kill -USR1 1847 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1847 killed at Fri Mar 31 17:05:11 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:05:11 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:05:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:05:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6395: Server never started - PASSED kill -0 1916 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1916 found at Fri Mar 31 17:05:17 UTC 2017 selfserv_9626 with PID 1916 started at Fri Mar 31 17:05:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6396: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 1916 at Fri Mar 31 17:05:18 UTC 2017 kill -USR1 1916 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1916 killed at Fri Mar 31 17:05:18 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:05:18 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:05:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:05:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6397: Server never started - PASSED kill -0 1984 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1984 found at Fri Mar 31 17:05:24 UTC 2017 selfserv_9626 with PID 1984 started at Fri Mar 31 17:05:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6398: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 1984 at Fri Mar 31 17:05:25 UTC 2017 kill -USR1 1984 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1984 killed at Fri Mar 31 17:05:25 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:05:25 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:05:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:05:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6399: Server never started - PASSED kill -0 2064 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2064 found at Fri Mar 31 17:05:31 UTC 2017 selfserv_9626 with PID 2064 started at Fri Mar 31 17:05:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6400: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 2064 at Fri Mar 31 17:05:32 UTC 2017 kill -USR1 2064 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2064 killed at Fri Mar 31 17:05:32 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:05:32 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:05:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:05:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6401: Server never started - PASSED kill -0 2133 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2133 found at Fri Mar 31 17:05:38 UTC 2017 selfserv_9626 with PID 2133 started at Fri Mar 31 17:05:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6402: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 2133 at Fri Mar 31 17:05:39 UTC 2017 kill -USR1 2133 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2133 killed at Fri Mar 31 17:05:39 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:05:39 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:05:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:05:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6403: Server never started - PASSED kill -0 2201 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2201 found at Fri Mar 31 17:05:45 UTC 2017 selfserv_9626 with PID 2201 started at Fri Mar 31 17:05:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6404: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 2201 at Fri Mar 31 17:05:46 UTC 2017 kill -USR1 2201 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2201 killed at Fri Mar 31 17:05:46 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:05:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:05:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:05:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6405: Server never started - PASSED kill -0 2281 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2281 found at Fri Mar 31 17:05:52 UTC 2017 selfserv_9626 with PID 2281 started at Fri Mar 31 17:05:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6406: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 2281 at Fri Mar 31 17:05:53 UTC 2017 kill -USR1 2281 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2281 killed at Fri Mar 31 17:05:53 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:05:54 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:05:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:05:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6407: Server never started - PASSED kill -0 2352 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2352 found at Fri Mar 31 17:06:00 UTC 2017 selfserv_9626 with PID 2352 started at Fri Mar 31 17:06:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6408: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 2352 at Fri Mar 31 17:06:00 UTC 2017 kill -USR1 2352 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2352 killed at Fri Mar 31 17:06:00 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:06:01 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:06:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:06:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6409: Server never started - PASSED kill -0 2429 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2429 found at Fri Mar 31 17:06:07 UTC 2017 selfserv_9626 with PID 2429 started at Fri Mar 31 17:06:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6410: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 2429 at Fri Mar 31 17:06:07 UTC 2017 kill -USR1 2429 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2429 killed at Fri Mar 31 17:06:08 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:06:08 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:06:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:06:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6411: Server never started - PASSED kill -0 2524 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2524 found at Fri Mar 31 17:06:14 UTC 2017 selfserv_9626 with PID 2524 started at Fri Mar 31 17:06:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6412: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 2524 at Fri Mar 31 17:06:14 UTC 2017 kill -USR1 2524 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2524 killed at Fri Mar 31 17:06:15 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:06:15 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:06:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:06:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6413: Server never started - PASSED kill -0 2596 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2596 found at Fri Mar 31 17:06:21 UTC 2017 selfserv_9626 with PID 2596 started at Fri Mar 31 17:06:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6414: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 2596 at Fri Mar 31 17:06:21 UTC 2017 kill -USR1 2596 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2596 killed at Fri Mar 31 17:06:22 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:06:22 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:06:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:06:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6415: Server never started - PASSED kill -0 2664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2664 found at Fri Mar 31 17:06:28 UTC 2017 selfserv_9626 with PID 2664 started at Fri Mar 31 17:06:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6416: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 2664 at Fri Mar 31 17:06:28 UTC 2017 kill -USR1 2664 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2664 killed at Fri Mar 31 17:06:29 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:06:29 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:06:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:06:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6417: Server never started - PASSED kill -0 2744 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2744 found at Fri Mar 31 17:06:35 UTC 2017 selfserv_9626 with PID 2744 started at Fri Mar 31 17:06:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6418: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 2744 at Fri Mar 31 17:06:36 UTC 2017 kill -USR1 2744 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2744 killed at Fri Mar 31 17:06:36 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:06:36 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:06:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:06:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6419: Server never started - PASSED kill -0 2813 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2813 found at Fri Mar 31 17:06:42 UTC 2017 selfserv_9626 with PID 2813 started at Fri Mar 31 17:06:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6420: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 2813 at Fri Mar 31 17:06:43 UTC 2017 kill -USR1 2813 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2813 killed at Fri Mar 31 17:06:43 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:06:43 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:06:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:06:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6421: Server never started - PASSED kill -0 2881 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2881 found at Fri Mar 31 17:06:49 UTC 2017 selfserv_9626 with PID 2881 started at Fri Mar 31 17:06:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6422: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 2881 at Fri Mar 31 17:06:50 UTC 2017 kill -USR1 2881 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2881 killed at Fri Mar 31 17:06:50 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:06:50 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:06:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:06:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6423: Server never started - PASSED kill -0 2961 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 2961 found at Fri Mar 31 17:06:56 UTC 2017 selfserv_9626 with PID 2961 started at Fri Mar 31 17:06:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6424: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 2961 at Fri Mar 31 17:06:57 UTC 2017 kill -USR1 2961 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 2961 killed at Fri Mar 31 17:06:57 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:06:57 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:06:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:07:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6425: Server never started - PASSED kill -0 3033 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3033 found at Fri Mar 31 17:07:03 UTC 2017 selfserv_9626 with PID 3033 started at Fri Mar 31 17:07:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6426: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 3033 at Fri Mar 31 17:07:04 UTC 2017 kill -USR1 3033 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 3033 killed at Fri Mar 31 17:07:04 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:07:04 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:07:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:07:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6427: Server never started - PASSED kill -0 3114 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3114 found at Fri Mar 31 17:07:10 UTC 2017 selfserv_9626 with PID 3114 started at Fri Mar 31 17:07:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6428: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 3114 at Fri Mar 31 17:07:11 UTC 2017 kill -USR1 3114 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 3114 killed at Fri Mar 31 17:07:11 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:07:12 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:07:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:07:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6429: Server never started - PASSED kill -0 3196 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3196 found at Fri Mar 31 17:07:18 UTC 2017 selfserv_9626 with PID 3196 started at Fri Mar 31 17:07:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6430: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 3196 at Fri Mar 31 17:07:18 UTC 2017 kill -USR1 3196 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 3196 killed at Fri Mar 31 17:07:19 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:07:19 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:07:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:07:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6431: Server never started - PASSED kill -0 3264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3264 found at Fri Mar 31 17:07:25 UTC 2017 selfserv_9626 with PID 3264 started at Fri Mar 31 17:07:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6432: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 3264 at Fri Mar 31 17:07:25 UTC 2017 kill -USR1 3264 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 3264 killed at Fri Mar 31 17:07:26 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 17:07:26 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:07:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:07:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6433: Server never started - PASSED kill -0 3336 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3336 found at Fri Mar 31 17:07:32 UTC 2017 selfserv_9626 with PID 3336 started at Fri Mar 31 17:07:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6434: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 3336 at Fri Mar 31 17:07:32 UTC 2017 kill -USR1 3336 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 3336 killed at Fri Mar 31 17:07:33 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:07:33 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:07:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:07:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6435: Server never started - PASSED kill -0 3432 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3432 found at Fri Mar 31 17:07:39 UTC 2017 selfserv_9626 with PID 3432 started at Fri Mar 31 17:07:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6436: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 3432 at Fri Mar 31 17:07:39 UTC 2017 kill -USR1 3432 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 3432 killed at Fri Mar 31 17:07:40 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:07:40 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:07:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:07:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6437: Server never started - PASSED kill -0 3510 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3510 found at Fri Mar 31 17:07:46 UTC 2017 selfserv_9626 with PID 3510 started at Fri Mar 31 17:07:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6438: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 3510 at Fri Mar 31 17:07:46 UTC 2017 kill -USR1 3510 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 3510 killed at Fri Mar 31 17:07:47 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:07:47 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:07:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:07:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6439: Server never started - PASSED kill -0 3594 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3594 found at Fri Mar 31 17:07:53 UTC 2017 selfserv_9626 with PID 3594 started at Fri Mar 31 17:07:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6440: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 3594 at Fri Mar 31 17:07:53 UTC 2017 kill -USR1 3594 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 3594 killed at Fri Mar 31 17:07:54 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:07:54 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:07:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:08:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6441: Server never started - PASSED kill -0 3675 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3675 found at Fri Mar 31 17:08:00 UTC 2017 selfserv_9626 with PID 3675 started at Fri Mar 31 17:08:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6442: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 3675 at Fri Mar 31 17:08:01 UTC 2017 kill -USR1 3675 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 3675 killed at Fri Mar 31 17:08:01 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:08:01 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:08:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:08:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6443: Server never started - PASSED kill -0 3746 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3746 found at Fri Mar 31 17:08:07 UTC 2017 selfserv_9626 with PID 3746 started at Fri Mar 31 17:08:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6444: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 3746 at Fri Mar 31 17:08:08 UTC 2017 kill -USR1 3746 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 3746 killed at Fri Mar 31 17:08:08 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:08:08 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:08:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:08:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6445: Server never started - PASSED kill -0 3828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3828 found at Fri Mar 31 17:08:14 UTC 2017 selfserv_9626 with PID 3828 started at Fri Mar 31 17:08:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6446: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 3828 at Fri Mar 31 17:08:15 UTC 2017 kill -USR1 3828 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 3828 killed at Fri Mar 31 17:08:15 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:08:15 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:08:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:08:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6447: Server never started - PASSED kill -0 3922 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3922 found at Fri Mar 31 17:08:21 UTC 2017 selfserv_9626 with PID 3922 started at Fri Mar 31 17:08:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6448: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 3922 at Fri Mar 31 17:08:22 UTC 2017 kill -USR1 3922 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 3922 killed at Fri Mar 31 17:08:22 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:08:22 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:08:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:08:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6449: Server never started - PASSED kill -0 3990 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3990 found at Fri Mar 31 17:08:28 UTC 2017 selfserv_9626 with PID 3990 started at Fri Mar 31 17:08:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6450: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 3990 at Fri Mar 31 17:08:29 UTC 2017 kill -USR1 3990 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 3990 killed at Fri Mar 31 17:08:29 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:08:30 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:08:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:08:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6451: Server never started - PASSED kill -0 4058 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4058 found at Fri Mar 31 17:08:36 UTC 2017 selfserv_9626 with PID 4058 started at Fri Mar 31 17:08:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6452: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 4058 at Fri Mar 31 17:08:36 UTC 2017 kill -USR1 4058 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 4058 killed at Fri Mar 31 17:08:36 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:08:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:08:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:08:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6453: Server never started - PASSED kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4139 found at Fri Mar 31 17:08:43 UTC 2017 selfserv_9626 with PID 4139 started at Fri Mar 31 17:08:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6454: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 4139 at Fri Mar 31 17:08:43 UTC 2017 kill -USR1 4139 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 4139 killed at Fri Mar 31 17:08:44 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:08:44 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:08:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:08:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6455: Server never started - PASSED kill -0 4207 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4207 found at Fri Mar 31 17:08:50 UTC 2017 selfserv_9626 with PID 4207 started at Fri Mar 31 17:08:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6456: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 4207 at Fri Mar 31 17:08:50 UTC 2017 kill -USR1 4207 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 4207 killed at Fri Mar 31 17:08:51 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:08:51 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:08:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:08:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6457: Server never started - PASSED kill -0 4277 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4277 found at Fri Mar 31 17:08:57 UTC 2017 selfserv_9626 with PID 4277 started at Fri Mar 31 17:08:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6458: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 4277 at Fri Mar 31 17:08:57 UTC 2017 kill -USR1 4277 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 4277 killed at Fri Mar 31 17:08:58 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:08:58 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:08:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:09:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6459: Server never started - PASSED kill -0 4361 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4361 found at Fri Mar 31 17:09:04 UTC 2017 selfserv_9626 with PID 4361 started at Fri Mar 31 17:09:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6460: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 4361 at Fri Mar 31 17:09:04 UTC 2017 kill -USR1 4361 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 4361 killed at Fri Mar 31 17:09:05 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:09:05 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:09:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:09:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6461: Server never started - PASSED kill -0 4442 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4442 found at Fri Mar 31 17:09:11 UTC 2017 selfserv_9626 with PID 4442 started at Fri Mar 31 17:09:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6462: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 4442 at Fri Mar 31 17:09:12 UTC 2017 kill -USR1 4442 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 4442 killed at Fri Mar 31 17:09:12 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:09:12 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:09:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:09:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6463: Server never started - PASSED kill -0 4510 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4510 found at Fri Mar 31 17:09:18 UTC 2017 selfserv_9626 with PID 4510 started at Fri Mar 31 17:09:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6464: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 4510 at Fri Mar 31 17:09:19 UTC 2017 kill -USR1 4510 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 4510 killed at Fri Mar 31 17:09:19 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:09:19 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:09:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:09:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6465: Server never started - PASSED kill -0 4591 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4591 found at Fri Mar 31 17:09:25 UTC 2017 selfserv_9626 with PID 4591 started at Fri Mar 31 17:09:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6466: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 4591 at Fri Mar 31 17:09:26 UTC 2017 kill -USR1 4591 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 4591 killed at Fri Mar 31 17:09:26 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:09:26 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:09:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:09:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6467: Server never started - PASSED kill -0 4659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4659 found at Fri Mar 31 17:09:32 UTC 2017 selfserv_9626 with PID 4659 started at Fri Mar 31 17:09:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6468: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 4659 at Fri Mar 31 17:09:33 UTC 2017 kill -USR1 4659 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 4659 killed at Fri Mar 31 17:09:33 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:09:33 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:09:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:09:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6469: Server never started - PASSED kill -0 4727 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4727 found at Fri Mar 31 17:09:39 UTC 2017 selfserv_9626 with PID 4727 started at Fri Mar 31 17:09:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6470: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 4727 at Fri Mar 31 17:09:40 UTC 2017 kill -USR1 4727 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 4727 killed at Fri Mar 31 17:09:40 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:09:40 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:09:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:09:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6471: Server never started - PASSED kill -0 4808 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4808 found at Fri Mar 31 17:09:46 UTC 2017 selfserv_9626 with PID 4808 started at Fri Mar 31 17:09:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6472: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 4808 at Fri Mar 31 17:09:47 UTC 2017 kill -USR1 4808 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 4808 killed at Fri Mar 31 17:09:47 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:09:48 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:09:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:09:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6473: Server never started - PASSED kill -0 4876 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4876 found at Fri Mar 31 17:09:53 UTC 2017 selfserv_9626 with PID 4876 started at Fri Mar 31 17:09:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6474: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 4876 at Fri Mar 31 17:09:54 UTC 2017 kill -USR1 4876 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 4876 killed at Fri Mar 31 17:09:54 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:09:55 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:09:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:10:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6475: Server never started - PASSED kill -0 4944 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4944 found at Fri Mar 31 17:10:01 UTC 2017 selfserv_9626 with PID 4944 started at Fri Mar 31 17:10:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6476: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 4944 at Fri Mar 31 17:10:01 UTC 2017 kill -USR1 4944 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 4944 killed at Fri Mar 31 17:10:02 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:10:02 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:10:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:10:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6477: Server never started - PASSED kill -0 5041 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5041 found at Fri Mar 31 17:10:08 UTC 2017 selfserv_9626 with PID 5041 started at Fri Mar 31 17:10:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6478: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 5041 at Fri Mar 31 17:10:08 UTC 2017 kill -USR1 5041 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5041 killed at Fri Mar 31 17:10:09 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:10:09 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:10:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:10:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6479: Server never started - PASSED kill -0 5109 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5109 found at Fri Mar 31 17:10:15 UTC 2017 selfserv_9626 with PID 5109 started at Fri Mar 31 17:10:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6480: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 5109 at Fri Mar 31 17:10:15 UTC 2017 kill -USR1 5109 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5109 killed at Fri Mar 31 17:10:16 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:10:16 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:10:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:10:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6481: Server never started - PASSED kill -0 5178 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5178 found at Fri Mar 31 17:10:22 UTC 2017 selfserv_9626 with PID 5178 started at Fri Mar 31 17:10:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6482: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 5178 at Fri Mar 31 17:10:22 UTC 2017 kill -USR1 5178 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5178 killed at Fri Mar 31 17:10:23 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:10:23 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:10:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:10:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6483: Server never started - PASSED kill -0 5258 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5258 found at Fri Mar 31 17:10:29 UTC 2017 selfserv_9626 with PID 5258 started at Fri Mar 31 17:10:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6484: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 5258 at Fri Mar 31 17:10:30 UTC 2017 kill -USR1 5258 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5258 killed at Fri Mar 31 17:10:30 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:10:30 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:10:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:10:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6485: Server never started - PASSED kill -0 5326 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5326 found at Fri Mar 31 17:10:36 UTC 2017 selfserv_9626 with PID 5326 started at Fri Mar 31 17:10:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6486: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 5326 at Fri Mar 31 17:10:37 UTC 2017 kill -USR1 5326 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5326 killed at Fri Mar 31 17:10:37 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:10:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:10:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:10:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6487: Server never started - PASSED kill -0 5395 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5395 found at Fri Mar 31 17:10:43 UTC 2017 selfserv_9626 with PID 5395 started at Fri Mar 31 17:10:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6488: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 5395 at Fri Mar 31 17:10:44 UTC 2017 kill -USR1 5395 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5395 killed at Fri Mar 31 17:10:44 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:10:44 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:10:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:10:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6489: Server never started - PASSED kill -0 5475 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5475 found at Fri Mar 31 17:10:50 UTC 2017 selfserv_9626 with PID 5475 started at Fri Mar 31 17:10:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6490: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 5475 at Fri Mar 31 17:10:51 UTC 2017 kill -USR1 5475 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5475 killed at Fri Mar 31 17:10:51 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:10:51 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:10:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:10:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6491: Server never started - PASSED kill -0 5543 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5543 found at Fri Mar 31 17:10:57 UTC 2017 selfserv_9626 with PID 5543 started at Fri Mar 31 17:10:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6492: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 5543 at Fri Mar 31 17:10:58 UTC 2017 kill -USR1 5543 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5543 killed at Fri Mar 31 17:10:58 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:10:58 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:10:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:11:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6493: Server never started - PASSED kill -0 5615 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5615 found at Fri Mar 31 17:11:04 UTC 2017 selfserv_9626 with PID 5615 started at Fri Mar 31 17:11:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6494: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 5615 at Fri Mar 31 17:11:05 UTC 2017 kill -USR1 5615 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5615 killed at Fri Mar 31 17:11:05 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:11:06 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:11:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:11:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6495: Server never started - PASSED kill -0 5709 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5709 found at Fri Mar 31 17:11:12 UTC 2017 selfserv_9626 with PID 5709 started at Fri Mar 31 17:11:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6496: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 5709 at Fri Mar 31 17:11:12 UTC 2017 kill -USR1 5709 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5709 killed at Fri Mar 31 17:11:13 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:11:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:11:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:11:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6497: Server never started - PASSED kill -0 5777 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5777 found at Fri Mar 31 17:11:19 UTC 2017 selfserv_9626 with PID 5777 started at Fri Mar 31 17:11:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6498: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 5777 at Fri Mar 31 17:11:19 UTC 2017 kill -USR1 5777 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5777 killed at Fri Mar 31 17:11:20 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:11:20 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:11:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:11:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6499: Server never started - PASSED kill -0 5846 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5846 found at Fri Mar 31 17:11:26 UTC 2017 selfserv_9626 with PID 5846 started at Fri Mar 31 17:11:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6500: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 5846 at Fri Mar 31 17:11:26 UTC 2017 kill -USR1 5846 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5846 killed at Fri Mar 31 17:11:27 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:11:27 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:11:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:11:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6501: Server never started - PASSED kill -0 5926 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5926 found at Fri Mar 31 17:11:33 UTC 2017 selfserv_9626 with PID 5926 started at Fri Mar 31 17:11:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6502: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 5926 at Fri Mar 31 17:11:33 UTC 2017 kill -USR1 5926 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5926 killed at Fri Mar 31 17:11:34 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:11:34 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:11:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:11:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6503: Server never started - PASSED kill -0 5994 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 5994 found at Fri Mar 31 17:11:40 UTC 2017 selfserv_9626 with PID 5994 started at Fri Mar 31 17:11:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6504: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 5994 at Fri Mar 31 17:11:40 UTC 2017 kill -USR1 5994 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 5994 killed at Fri Mar 31 17:11:41 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:11:41 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:11:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:11:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6505: Server never started - PASSED kill -0 6063 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6063 found at Fri Mar 31 17:11:47 UTC 2017 selfserv_9626 with PID 6063 started at Fri Mar 31 17:11:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6506: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 6063 at Fri Mar 31 17:11:48 UTC 2017 kill -USR1 6063 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6063 killed at Fri Mar 31 17:11:48 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:11:48 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:11:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:11:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6507: Server never started - PASSED kill -0 6143 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6143 found at Fri Mar 31 17:11:54 UTC 2017 selfserv_9626 with PID 6143 started at Fri Mar 31 17:11:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6508: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 6143 at Fri Mar 31 17:11:55 UTC 2017 kill -USR1 6143 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6143 killed at Fri Mar 31 17:11:55 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:11:55 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:11:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:12:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6509: Server never started - PASSED kill -0 6211 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6211 found at Fri Mar 31 17:12:01 UTC 2017 selfserv_9626 with PID 6211 started at Fri Mar 31 17:12:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6510: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 6211 at Fri Mar 31 17:12:02 UTC 2017 kill -USR1 6211 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6211 killed at Fri Mar 31 17:12:02 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:12:02 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:12:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:12:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6511: Server never started - PASSED kill -0 6297 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6297 found at Fri Mar 31 17:12:08 UTC 2017 selfserv_9626 with PID 6297 started at Fri Mar 31 17:12:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6512: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 6297 at Fri Mar 31 17:12:09 UTC 2017 kill -USR1 6297 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6297 killed at Fri Mar 31 17:12:09 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:12:09 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:12:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:12:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6513: Server never started - PASSED kill -0 6377 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6377 found at Fri Mar 31 17:12:15 UTC 2017 selfserv_9626 with PID 6377 started at Fri Mar 31 17:12:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6514: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 6377 at Fri Mar 31 17:12:16 UTC 2017 kill -USR1 6377 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6377 killed at Fri Mar 31 17:12:16 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:12:17 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:12:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:12:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6515: Server never started - PASSED kill -0 6445 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6445 found at Fri Mar 31 17:12:22 UTC 2017 selfserv_9626 with PID 6445 started at Fri Mar 31 17:12:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6516: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 6445 at Fri Mar 31 17:12:23 UTC 2017 kill -USR1 6445 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6445 killed at Fri Mar 31 17:12:23 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:12:24 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:12:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:12:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6517: Server never started - PASSED kill -0 6514 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6514 found at Fri Mar 31 17:12:30 UTC 2017 selfserv_9626 with PID 6514 started at Fri Mar 31 17:12:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6518: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 6514 at Fri Mar 31 17:12:30 UTC 2017 kill -USR1 6514 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6514 killed at Fri Mar 31 17:12:31 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:12:31 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:12:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:12:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6519: Server never started - PASSED kill -0 6594 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6594 found at Fri Mar 31 17:12:37 UTC 2017 selfserv_9626 with PID 6594 started at Fri Mar 31 17:12:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6520: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 6594 at Fri Mar 31 17:12:37 UTC 2017 kill -USR1 6594 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6594 killed at Fri Mar 31 17:12:38 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:12:38 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:12:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:12:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6521: Server never started - PASSED kill -0 6662 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6662 found at Fri Mar 31 17:12:44 UTC 2017 selfserv_9626 with PID 6662 started at Fri Mar 31 17:12:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6522: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 6662 at Fri Mar 31 17:12:44 UTC 2017 kill -USR1 6662 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6662 killed at Fri Mar 31 17:12:45 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:12:45 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:12:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:12:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6523: Server never started - PASSED kill -0 6731 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6731 found at Fri Mar 31 17:12:51 UTC 2017 selfserv_9626 with PID 6731 started at Fri Mar 31 17:12:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6524: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 6731 at Fri Mar 31 17:12:51 UTC 2017 kill -USR1 6731 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6731 killed at Fri Mar 31 17:12:52 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:12:52 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:12:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:12:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6525: Server never started - PASSED kill -0 6811 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6811 found at Fri Mar 31 17:12:58 UTC 2017 selfserv_9626 with PID 6811 started at Fri Mar 31 17:12:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6526: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 6811 at Fri Mar 31 17:12:59 UTC 2017 kill -USR1 6811 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6811 killed at Fri Mar 31 17:12:59 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:12:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:12:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:13:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6527: Server never started - PASSED kill -0 6882 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6882 found at Fri Mar 31 17:13:05 UTC 2017 selfserv_9626 with PID 6882 started at Fri Mar 31 17:13:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6528: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 6882 at Fri Mar 31 17:13:06 UTC 2017 kill -USR1 6882 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6882 killed at Fri Mar 31 17:13:06 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:13:06 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:13:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:13:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6529: Server never started - PASSED kill -0 6964 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6964 found at Fri Mar 31 17:13:12 UTC 2017 selfserv_9626 with PID 6964 started at Fri Mar 31 17:13:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6530: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 6964 at Fri Mar 31 17:13:13 UTC 2017 kill -USR1 6964 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6964 killed at Fri Mar 31 17:13:13 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:13:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:13:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:13:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6531: Server never started - PASSED kill -0 7044 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7044 found at Fri Mar 31 17:13:19 UTC 2017 selfserv_9626 with PID 7044 started at Fri Mar 31 17:13:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6532: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 7044 at Fri Mar 31 17:13:20 UTC 2017 kill -USR1 7044 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7044 killed at Fri Mar 31 17:13:20 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:13:20 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:13:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:13:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6533: Server never started - PASSED kill -0 7113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7113 found at Fri Mar 31 17:13:26 UTC 2017 selfserv_9626 with PID 7113 started at Fri Mar 31 17:13:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6534: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 7113 at Fri Mar 31 17:13:27 UTC 2017 kill -USR1 7113 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7113 killed at Fri Mar 31 17:13:27 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:13:27 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:13:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:13:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6535: Server never started - PASSED kill -0 7181 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7181 found at Fri Mar 31 17:13:33 UTC 2017 selfserv_9626 with PID 7181 started at Fri Mar 31 17:13:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6536: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 7181 at Fri Mar 31 17:13:34 UTC 2017 kill -USR1 7181 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7181 killed at Fri Mar 31 17:13:34 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:13:35 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:13:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:13:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6537: Server never started - PASSED kill -0 7261 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7261 found at Fri Mar 31 17:13:41 UTC 2017 selfserv_9626 with PID 7261 started at Fri Mar 31 17:13:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6538: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 7261 at Fri Mar 31 17:13:41 UTC 2017 kill -USR1 7261 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7261 killed at Fri Mar 31 17:13:42 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:13:42 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:13:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:13:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6539: Server never started - PASSED kill -0 7330 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7330 found at Fri Mar 31 17:13:48 UTC 2017 selfserv_9626 with PID 7330 started at Fri Mar 31 17:13:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6540: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 7330 at Fri Mar 31 17:13:48 UTC 2017 kill -USR1 7330 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7330 killed at Fri Mar 31 17:13:49 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:13:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:13:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:13:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6541: Server never started - PASSED kill -0 7398 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7398 found at Fri Mar 31 17:13:55 UTC 2017 selfserv_9626 with PID 7398 started at Fri Mar 31 17:13:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6542: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 7398 at Fri Mar 31 17:13:55 UTC 2017 kill -USR1 7398 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7398 killed at Fri Mar 31 17:13:56 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:13:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:13:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:14:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6543: Server never started - PASSED kill -0 7478 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7478 found at Fri Mar 31 17:14:02 UTC 2017 selfserv_9626 with PID 7478 started at Fri Mar 31 17:14:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6544: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 7478 at Fri Mar 31 17:14:02 UTC 2017 kill -USR1 7478 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7478 killed at Fri Mar 31 17:14:03 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:14:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:14:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:14:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6545: Server never started - PASSED kill -0 7563 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7563 found at Fri Mar 31 17:14:09 UTC 2017 selfserv_9626 with PID 7563 started at Fri Mar 31 17:14:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6546: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 7563 at Fri Mar 31 17:14:09 UTC 2017 kill -USR1 7563 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7563 killed at Fri Mar 31 17:14:10 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:14:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:14:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:14:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6547: Server never started - PASSED kill -0 7631 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7631 found at Fri Mar 31 17:14:16 UTC 2017 selfserv_9626 with PID 7631 started at Fri Mar 31 17:14:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6548: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 7631 at Fri Mar 31 17:14:16 UTC 2017 kill -USR1 7631 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7631 killed at Fri Mar 31 17:14:17 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:14:17 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:14:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:14:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6549: Server never started - PASSED kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 17:14:23 UTC 2017 selfserv_9626 with PID 7711 started at Fri Mar 31 17:14:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6550: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 7711 at Fri Mar 31 17:14:24 UTC 2017 kill -USR1 7711 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7711 killed at Fri Mar 31 17:14:24 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:14:24 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:14:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:14:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6551: Server never started - PASSED kill -0 7780 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7780 found at Fri Mar 31 17:14:30 UTC 2017 selfserv_9626 with PID 7780 started at Fri Mar 31 17:14:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6552: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 7780 at Fri Mar 31 17:14:31 UTC 2017 kill -USR1 7780 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7780 killed at Fri Mar 31 17:14:31 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:14:31 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:14:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:14:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6553: Server never started - PASSED kill -0 7848 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7848 found at Fri Mar 31 17:14:37 UTC 2017 selfserv_9626 with PID 7848 started at Fri Mar 31 17:14:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6554: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 7848 at Fri Mar 31 17:14:38 UTC 2017 kill -USR1 7848 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7848 killed at Fri Mar 31 17:14:38 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:14:38 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:14:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:14:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6555: Server never started - PASSED kill -0 7928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7928 found at Fri Mar 31 17:14:44 UTC 2017 selfserv_9626 with PID 7928 started at Fri Mar 31 17:14:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6556: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 7928 at Fri Mar 31 17:14:45 UTC 2017 kill -USR1 7928 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7928 killed at Fri Mar 31 17:14:45 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:14:45 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:14:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:14:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6557: Server never started - PASSED kill -0 7997 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7997 found at Fri Mar 31 17:14:51 UTC 2017 selfserv_9626 with PID 7997 started at Fri Mar 31 17:14:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6558: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 7997 at Fri Mar 31 17:14:52 UTC 2017 kill -USR1 7997 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7997 killed at Fri Mar 31 17:14:52 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 17:14:52 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:14:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:14:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6559: Server never started - PASSED kill -0 8065 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8065 found at Fri Mar 31 17:14:58 UTC 2017 selfserv_9626 with PID 8065 started at Fri Mar 31 17:14:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6560: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 8065 at Fri Mar 31 17:14:59 UTC 2017 kill -USR1 8065 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8065 killed at Fri Mar 31 17:14:59 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:15:00 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:15:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:15:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6561: Server never started - PASSED kill -0 8148 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8148 found at Fri Mar 31 17:15:06 UTC 2017 selfserv_9626 with PID 8148 started at Fri Mar 31 17:15:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6562: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 8148 at Fri Mar 31 17:15:06 UTC 2017 kill -USR1 8148 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8148 killed at Fri Mar 31 17:15:07 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:15:07 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:15:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:15:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6563: Server never started - PASSED kill -0 8231 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8231 found at Fri Mar 31 17:15:13 UTC 2017 selfserv_9626 with PID 8231 started at Fri Mar 31 17:15:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6564: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 8231 at Fri Mar 31 17:15:13 UTC 2017 kill -USR1 8231 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8231 killed at Fri Mar 31 17:15:14 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:15:14 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:15:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:15:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6565: Server never started - PASSED kill -0 8299 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8299 found at Fri Mar 31 17:15:20 UTC 2017 selfserv_9626 with PID 8299 started at Fri Mar 31 17:15:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6566: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 8299 at Fri Mar 31 17:15:20 UTC 2017 kill -USR1 8299 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8299 killed at Fri Mar 31 17:15:21 UTC 2017 ssl.sh: Cache CRL SSL Client Tests - with ECC =============================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/authin.tl.tmp 0 selfserv_9626 starting at Fri Mar 31 17:15:21 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:15:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:15:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6567: Server never started - PASSED kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:27 UTC 2017 selfserv_9626 with PID 8374 started at Fri Mar 31 17:15:27 UTC 2017 Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:27 UTC 2017 ssl.sh: #6568: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:28 UTC 2017 ssl.sh: #6569: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:29 UTC 2017 ssl.sh: #6570: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:29 UTC 2017 ssl.sh: #6571: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:30 UTC 2017 ssl.sh: #6572: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:31 UTC 2017 ssl.sh: #6573: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:31 UTC 2017 ssl.sh: #6574: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:32 UTC 2017 ssl.sh: #6575: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:32 UTC 2017 ssl.sh: #6576: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:33 UTC 2017 ssl.sh: #6577: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:34 UTC 2017 ssl.sh: #6578: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:34 UTC 2017 ssl.sh: #6579: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:35 UTC 2017 ssl.sh: #6580: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:36 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #6581: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:36 UTC 2017 ssl.sh: #6582: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:37 UTC 2017 ssl.sh: #6583: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:38 UTC 2017 ssl.sh: #6584: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:38 UTC 2017 ssl.sh: #6585: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:39 UTC 2017 ssl.sh: #6586: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:39 UTC 2017 ssl.sh: #6587: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:40 UTC 2017 ssl.sh: #6588: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:41 UTC 2017 ssl.sh: #6589: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:41 UTC 2017 ssl.sh: #6590: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:42 UTC 2017 ssl.sh: #6591: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:43 UTC 2017 ssl.sh: #6592: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:43 UTC 2017 ssl.sh: #6593: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:44 UTC 2017 ssl.sh: #6594: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:45 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #6595: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:45 UTC 2017 ssl.sh: #6596: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:46 UTC 2017 ssl.sh: #6597: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:46 UTC 2017 ssl.sh: #6598: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:47 UTC 2017 ssl.sh: #6599: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:48 UTC 2017 ssl.sh: #6600: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:48 UTC 2017 ssl.sh: #6601: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:49 UTC 2017 ssl.sh: #6602: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:50 UTC 2017 ssl.sh: #6603: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:50 UTC 2017 ssl.sh: #6604: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:51 UTC 2017 ssl.sh: #6605: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:52 UTC 2017 ssl.sh: #6606: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:52 UTC 2017 ssl.sh: #6607: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 8374 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8374 found at Fri Mar 31 17:15:53 UTC 2017 ssl.sh: #6608: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 8374 at Fri Mar 31 17:15:53 UTC 2017 kill -USR1 8374 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8374 killed at Fri Mar 31 17:15:53 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:15:53 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:15:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:15:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6609: Server never started - PASSED kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:15:59 UTC 2017 selfserv_9626 with PID 9810 started at Fri Mar 31 17:15:59 UTC 2017 Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:00 UTC 2017 ssl.sh: #6610: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:01 UTC 2017 ssl.sh: #6611: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:01 UTC 2017 ssl.sh: #6612: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:02 UTC 2017 ssl.sh: #6613: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:03 UTC 2017 ssl.sh: #6614: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:03 UTC 2017 ssl.sh: #6615: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:04 UTC 2017 ssl.sh: #6616: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:05 UTC 2017 ssl.sh: #6617: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:05 UTC 2017 ssl.sh: #6618: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:06 UTC 2017 ssl.sh: #6619: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:06 UTC 2017 ssl.sh: #6620: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:07 UTC 2017 ssl.sh: #6621: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:08 UTC 2017 ssl.sh: #6622: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:08 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #6623: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:09 UTC 2017 ssl.sh: #6624: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:10 UTC 2017 ssl.sh: #6625: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:10 UTC 2017 ssl.sh: #6626: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:11 UTC 2017 ssl.sh: #6627: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:11 UTC 2017 ssl.sh: #6628: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:12 UTC 2017 ssl.sh: #6629: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:13 UTC 2017 ssl.sh: #6630: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:13 UTC 2017 ssl.sh: #6631: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:14 UTC 2017 ssl.sh: #6632: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:15 UTC 2017 ssl.sh: #6633: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:15 UTC 2017 ssl.sh: #6634: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:16 UTC 2017 ssl.sh: #6635: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:17 UTC 2017 ssl.sh: #6636: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:17 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #6637: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:18 UTC 2017 ssl.sh: #6638: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:18 UTC 2017 ssl.sh: #6639: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:19 UTC 2017 ssl.sh: #6640: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:20 UTC 2017 ssl.sh: #6641: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:20 UTC 2017 ssl.sh: #6642: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:21 UTC 2017 ssl.sh: #6643: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:22 UTC 2017 ssl.sh: #6644: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:22 UTC 2017 ssl.sh: #6645: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:23 UTC 2017 ssl.sh: #6646: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:24 UTC 2017 ssl.sh: #6647: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:24 UTC 2017 ssl.sh: #6648: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:25 UTC 2017 ssl.sh: #6649: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9810 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9810 found at Fri Mar 31 17:16:26 UTC 2017 ssl.sh: #6650: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 9810 at Fri Mar 31 17:16:26 UTC 2017 kill -USR1 9810 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9810 killed at Fri Mar 31 17:16:26 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:16:26 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:16:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:16:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6651: Server never started - PASSED kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:32 UTC 2017 selfserv_9626 with PID 11264 started at Fri Mar 31 17:16:32 UTC 2017 Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:33 UTC 2017 ssl.sh: #6652: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:33 UTC 2017 ssl.sh: #6653: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:34 UTC 2017 ssl.sh: #6654: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:35 UTC 2017 ssl.sh: #6655: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:35 UTC 2017 ssl.sh: #6656: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:36 UTC 2017 ssl.sh: #6657: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:37 UTC 2017 ssl.sh: #6658: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:37 UTC 2017 ssl.sh: #6659: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:38 UTC 2017 ssl.sh: #6660: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:38 UTC 2017 ssl.sh: #6661: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:39 UTC 2017 ssl.sh: #6662: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:40 UTC 2017 ssl.sh: #6663: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:40 UTC 2017 ssl.sh: #6664: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:41 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #6665: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:42 UTC 2017 ssl.sh: #6666: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:42 UTC 2017 ssl.sh: #6667: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:43 UTC 2017 ssl.sh: #6668: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:43 UTC 2017 ssl.sh: #6669: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:44 UTC 2017 ssl.sh: #6670: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:45 UTC 2017 ssl.sh: #6671: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:45 UTC 2017 ssl.sh: #6672: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:46 UTC 2017 ssl.sh: #6673: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:47 UTC 2017 ssl.sh: #6674: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:47 UTC 2017 ssl.sh: #6675: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:48 UTC 2017 ssl.sh: #6676: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:49 UTC 2017 ssl.sh: #6677: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:49 UTC 2017 ssl.sh: #6678: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:50 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #6679: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:51 UTC 2017 ssl.sh: #6680: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:51 UTC 2017 ssl.sh: #6681: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:52 UTC 2017 ssl.sh: #6682: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:52 UTC 2017 ssl.sh: #6683: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:53 UTC 2017 ssl.sh: #6684: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:54 UTC 2017 ssl.sh: #6685: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:54 UTC 2017 ssl.sh: #6686: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:55 UTC 2017 ssl.sh: #6687: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:56 UTC 2017 ssl.sh: #6688: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:56 UTC 2017 ssl.sh: #6689: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:57 UTC 2017 ssl.sh: #6690: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:58 UTC 2017 ssl.sh: #6691: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 11264 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11264 found at Fri Mar 31 17:16:58 UTC 2017 ssl.sh: #6692: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 11264 at Fri Mar 31 17:16:58 UTC 2017 kill -USR1 11264 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 11264 killed at Fri Mar 31 17:16:59 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:16:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:16:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:17:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6693: Server never started - PASSED kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:05 UTC 2017 selfserv_9626 with PID 12702 started at Fri Mar 31 17:17:05 UTC 2017 Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:05 UTC 2017 ssl.sh: #6694: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:06 UTC 2017 ssl.sh: #6695: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:07 UTC 2017 ssl.sh: #6696: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:07 UTC 2017 ssl.sh: #6697: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:08 UTC 2017 ssl.sh: #6698: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:09 UTC 2017 ssl.sh: #6699: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:09 UTC 2017 ssl.sh: #6700: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:10 UTC 2017 ssl.sh: #6701: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:10 UTC 2017 ssl.sh: #6702: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:11 UTC 2017 ssl.sh: #6703: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:12 UTC 2017 ssl.sh: #6704: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:12 UTC 2017 ssl.sh: #6705: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:13 UTC 2017 ssl.sh: #6706: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:14 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #6707: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:14 UTC 2017 ssl.sh: #6708: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:15 UTC 2017 ssl.sh: #6709: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:16 UTC 2017 ssl.sh: #6710: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:16 UTC 2017 ssl.sh: #6711: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:17 UTC 2017 ssl.sh: #6712: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:17 UTC 2017 ssl.sh: #6713: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:18 UTC 2017 ssl.sh: #6714: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:19 UTC 2017 ssl.sh: #6715: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:19 UTC 2017 ssl.sh: #6716: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:20 UTC 2017 ssl.sh: #6717: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:21 UTC 2017 ssl.sh: #6718: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:21 UTC 2017 ssl.sh: #6719: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:22 UTC 2017 ssl.sh: #6720: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:23 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #6721: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:23 UTC 2017 ssl.sh: #6722: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:24 UTC 2017 ssl.sh: #6723: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:24 UTC 2017 ssl.sh: #6724: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:25 UTC 2017 ssl.sh: #6725: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:26 UTC 2017 ssl.sh: #6726: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:26 UTC 2017 ssl.sh: #6727: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:27 UTC 2017 ssl.sh: #6728: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:28 UTC 2017 ssl.sh: #6729: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:28 UTC 2017 ssl.sh: #6730: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:29 UTC 2017 ssl.sh: #6731: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:30 UTC 2017 ssl.sh: #6732: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:30 UTC 2017 ssl.sh: #6733: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12702 found at Fri Mar 31 17:17:31 UTC 2017 ssl.sh: #6734: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 12702 at Fri Mar 31 17:17:31 UTC 2017 kill -USR1 12702 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12702 killed at Fri Mar 31 17:17:31 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:17:32 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:17:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:17:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6735: Server never started - PASSED kill -0 14152 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14152 found at Fri Mar 31 17:17:38 UTC 2017 selfserv_9626 with PID 14152 started at Fri Mar 31 17:17:38 UTC 2017 trying to kill selfserv_9626 with PID 14152 at Fri Mar 31 17:17:38 UTC 2017 kill -USR1 14152 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14152 killed at Fri Mar 31 17:17:38 UTC 2017 selfserv_9626 starting at Fri Mar 31 17:17:38 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:17:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:17:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6736: Server never started - PASSED kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:44 UTC 2017 selfserv_9626 with PID 14206 started at Fri Mar 31 17:17:44 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:45 UTC 2017 ssl.sh: #6737: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:45 UTC 2017 ssl.sh: #6738: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:46 UTC 2017 ssl.sh: #6739: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:47 UTC 2017 ssl.sh: #6740: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:47 UTC 2017 ssl.sh: #6741: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:48 UTC 2017 ssl.sh: #6742: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:48 UTC 2017 ssl.sh: #6743: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:49 UTC 2017 ssl.sh: #6744: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:50 UTC 2017 ssl.sh: #6745: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:50 UTC 2017 ssl.sh: #6746: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:51 UTC 2017 ssl.sh: #6747: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:52 UTC 2017 ssl.sh: #6748: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:52 UTC 2017 ssl.sh: #6749: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:53 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #6750: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:54 UTC 2017 ssl.sh: #6751: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:54 UTC 2017 ssl.sh: #6752: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:55 UTC 2017 ssl.sh: #6753: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:55 UTC 2017 ssl.sh: #6754: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:56 UTC 2017 ssl.sh: #6755: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:57 UTC 2017 ssl.sh: #6756: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:57 UTC 2017 ssl.sh: #6757: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:58 UTC 2017 ssl.sh: #6758: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:59 UTC 2017 ssl.sh: #6759: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:17:59 UTC 2017 ssl.sh: #6760: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:18:00 UTC 2017 ssl.sh: #6761: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:18:01 UTC 2017 ssl.sh: #6762: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:18:01 UTC 2017 ssl.sh: #6763: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:18:02 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #6764: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:18:03 UTC 2017 ssl.sh: #6765: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:18:03 UTC 2017 ssl.sh: #6766: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:18:04 UTC 2017 ssl.sh: #6767: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:18:04 UTC 2017 ssl.sh: #6768: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:18:05 UTC 2017 ssl.sh: #6769: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:18:06 UTC 2017 ssl.sh: #6770: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:18:06 UTC 2017 ssl.sh: #6771: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:18:07 UTC 2017 ssl.sh: #6772: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:18:08 UTC 2017 ssl.sh: #6773: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:18:08 UTC 2017 ssl.sh: #6774: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:18:09 UTC 2017 ssl.sh: #6775: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:18:10 UTC 2017 ssl.sh: #6776: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14206 found at Fri Mar 31 17:18:10 UTC 2017 ssl.sh: #6777: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 14206 at Fri Mar 31 17:18:10 UTC 2017 kill -USR1 14206 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14206 killed at Fri Mar 31 17:18:11 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:18:11 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:18:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:18:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6778: Server never started - PASSED kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:17 UTC 2017 selfserv_9626 with PID 15659 started at Fri Mar 31 17:18:17 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:17 UTC 2017 ssl.sh: #6779: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:18 UTC 2017 ssl.sh: #6780: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:19 UTC 2017 ssl.sh: #6781: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:19 UTC 2017 ssl.sh: #6782: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:20 UTC 2017 ssl.sh: #6783: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:21 UTC 2017 ssl.sh: #6784: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:21 UTC 2017 ssl.sh: #6785: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:22 UTC 2017 ssl.sh: #6786: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:22 UTC 2017 ssl.sh: #6787: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:23 UTC 2017 ssl.sh: #6788: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:24 UTC 2017 ssl.sh: #6789: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:25 UTC 2017 ssl.sh: #6790: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:25 UTC 2017 ssl.sh: #6791: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:26 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #6792: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:26 UTC 2017 ssl.sh: #6793: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:27 UTC 2017 ssl.sh: #6794: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:28 UTC 2017 ssl.sh: #6795: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:28 UTC 2017 ssl.sh: #6796: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:29 UTC 2017 ssl.sh: #6797: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:29 UTC 2017 ssl.sh: #6798: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:30 UTC 2017 ssl.sh: #6799: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:31 UTC 2017 ssl.sh: #6800: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:31 UTC 2017 ssl.sh: #6801: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:32 UTC 2017 ssl.sh: #6802: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:33 UTC 2017 ssl.sh: #6803: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:33 UTC 2017 ssl.sh: #6804: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:34 UTC 2017 ssl.sh: #6805: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:35 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #6806: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:35 UTC 2017 ssl.sh: #6807: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:36 UTC 2017 ssl.sh: #6808: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:36 UTC 2017 ssl.sh: #6809: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:37 UTC 2017 ssl.sh: #6810: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:38 UTC 2017 ssl.sh: #6811: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:38 UTC 2017 ssl.sh: #6812: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:39 UTC 2017 ssl.sh: #6813: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:40 UTC 2017 ssl.sh: #6814: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:40 UTC 2017 ssl.sh: #6815: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:41 UTC 2017 ssl.sh: #6816: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:42 UTC 2017 ssl.sh: #6817: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:42 UTC 2017 ssl.sh: #6818: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 15659 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15659 found at Fri Mar 31 17:18:43 UTC 2017 ssl.sh: #6819: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 15659 at Fri Mar 31 17:18:43 UTC 2017 kill -USR1 15659 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15659 killed at Fri Mar 31 17:18:44 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:18:44 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:18:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:18:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6820: Server never started - PASSED kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:18:50 UTC 2017 selfserv_9626 with PID 17094 started at Fri Mar 31 17:18:50 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:18:50 UTC 2017 ssl.sh: #6821: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:18:51 UTC 2017 ssl.sh: #6822: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:18:51 UTC 2017 ssl.sh: #6823: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:18:52 UTC 2017 ssl.sh: #6824: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:18:53 UTC 2017 ssl.sh: #6825: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:18:53 UTC 2017 ssl.sh: #6826: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:18:54 UTC 2017 ssl.sh: #6827: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:18:55 UTC 2017 ssl.sh: #6828: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:18:55 UTC 2017 ssl.sh: #6829: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:18:56 UTC 2017 ssl.sh: #6830: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:18:57 UTC 2017 ssl.sh: #6831: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:18:57 UTC 2017 ssl.sh: #6832: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:18:58 UTC 2017 ssl.sh: #6833: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:18:58 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #6834: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:18:59 UTC 2017 ssl.sh: #6835: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:00 UTC 2017 ssl.sh: #6836: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:00 UTC 2017 ssl.sh: #6837: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:01 UTC 2017 ssl.sh: #6838: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:02 UTC 2017 ssl.sh: #6839: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:02 UTC 2017 ssl.sh: #6840: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:03 UTC 2017 ssl.sh: #6841: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:04 UTC 2017 ssl.sh: #6842: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:04 UTC 2017 ssl.sh: #6843: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:05 UTC 2017 ssl.sh: #6844: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:06 UTC 2017 ssl.sh: #6845: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:06 UTC 2017 ssl.sh: #6846: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:07 UTC 2017 ssl.sh: #6847: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:07 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #6848: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:08 UTC 2017 ssl.sh: #6849: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:09 UTC 2017 ssl.sh: #6850: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:09 UTC 2017 ssl.sh: #6851: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:10 UTC 2017 ssl.sh: #6852: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:11 UTC 2017 ssl.sh: #6853: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:11 UTC 2017 ssl.sh: #6854: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:12 UTC 2017 ssl.sh: #6855: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:12 UTC 2017 ssl.sh: #6856: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:13 UTC 2017 ssl.sh: #6857: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:14 UTC 2017 ssl.sh: #6858: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:14 UTC 2017 ssl.sh: #6859: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:15 UTC 2017 ssl.sh: #6860: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17094 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17094 found at Fri Mar 31 17:19:16 UTC 2017 ssl.sh: #6861: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 17094 at Fri Mar 31 17:19:16 UTC 2017 kill -USR1 17094 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17094 killed at Fri Mar 31 17:19:16 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:19:16 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:19:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:19:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6862: Server never started - PASSED kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:22 UTC 2017 selfserv_9626 with PID 18546 started at Fri Mar 31 17:19:22 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:23 UTC 2017 ssl.sh: #6863: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:24 UTC 2017 ssl.sh: #6864: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:24 UTC 2017 ssl.sh: #6865: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:25 UTC 2017 ssl.sh: #6866: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:26 UTC 2017 ssl.sh: #6867: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:26 UTC 2017 ssl.sh: #6868: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:27 UTC 2017 ssl.sh: #6869: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:27 UTC 2017 ssl.sh: #6870: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:28 UTC 2017 ssl.sh: #6871: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:29 UTC 2017 ssl.sh: #6872: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:29 UTC 2017 ssl.sh: #6873: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:30 UTC 2017 ssl.sh: #6874: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:31 UTC 2017 ssl.sh: #6875: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:31 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #6876: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:32 UTC 2017 ssl.sh: #6877: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:33 UTC 2017 ssl.sh: #6878: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:33 UTC 2017 ssl.sh: #6879: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:34 UTC 2017 ssl.sh: #6880: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:34 UTC 2017 ssl.sh: #6881: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:35 UTC 2017 ssl.sh: #6882: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:36 UTC 2017 ssl.sh: #6883: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:36 UTC 2017 ssl.sh: #6884: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:37 UTC 2017 ssl.sh: #6885: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:38 UTC 2017 ssl.sh: #6886: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:38 UTC 2017 ssl.sh: #6887: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:39 UTC 2017 ssl.sh: #6888: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:40 UTC 2017 ssl.sh: #6889: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:40 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #6890: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:41 UTC 2017 ssl.sh: #6891: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:41 UTC 2017 ssl.sh: #6892: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:42 UTC 2017 ssl.sh: #6893: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:43 UTC 2017 ssl.sh: #6894: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:43 UTC 2017 ssl.sh: #6895: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:44 UTC 2017 ssl.sh: #6896: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:45 UTC 2017 ssl.sh: #6897: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:45 UTC 2017 ssl.sh: #6898: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:46 UTC 2017 ssl.sh: #6899: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:47 UTC 2017 ssl.sh: #6900: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:47 UTC 2017 ssl.sh: #6901: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:48 UTC 2017 ssl.sh: #6902: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18546 found at Fri Mar 31 17:19:49 UTC 2017 ssl.sh: #6903: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 18546 at Fri Mar 31 17:19:49 UTC 2017 kill -USR1 18546 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18546 killed at Fri Mar 31 17:19:49 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:19:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:19:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:19:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6904: Server never started - PASSED kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:19:55 UTC 2017 selfserv_9626 with PID 19981 started at Fri Mar 31 17:19:55 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:19:56 UTC 2017 ssl.sh: #6905: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:19:56 UTC 2017 ssl.sh: #6906: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:19:57 UTC 2017 ssl.sh: #6907: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:19:58 UTC 2017 ssl.sh: #6908: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:19:58 UTC 2017 ssl.sh: #6909: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:19:59 UTC 2017 ssl.sh: #6910: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:00 UTC 2017 ssl.sh: #6911: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:00 UTC 2017 ssl.sh: #6912: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:01 UTC 2017 ssl.sh: #6913: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:02 UTC 2017 ssl.sh: #6914: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:02 UTC 2017 ssl.sh: #6915: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:03 UTC 2017 ssl.sh: #6916: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:04 UTC 2017 ssl.sh: #6917: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:04 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #6918: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:05 UTC 2017 ssl.sh: #6919: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:05 UTC 2017 ssl.sh: #6920: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:06 UTC 2017 ssl.sh: #6921: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:07 UTC 2017 ssl.sh: #6922: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:07 UTC 2017 ssl.sh: #6923: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:08 UTC 2017 ssl.sh: #6924: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:09 UTC 2017 ssl.sh: #6925: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:09 UTC 2017 ssl.sh: #6926: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:10 UTC 2017 ssl.sh: #6927: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:11 UTC 2017 ssl.sh: #6928: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:11 UTC 2017 ssl.sh: #6929: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:12 UTC 2017 ssl.sh: #6930: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:13 UTC 2017 ssl.sh: #6931: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:13 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #6932: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:14 UTC 2017 ssl.sh: #6933: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:14 UTC 2017 ssl.sh: #6934: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:15 UTC 2017 ssl.sh: #6935: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:16 UTC 2017 ssl.sh: #6936: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:16 UTC 2017 ssl.sh: #6937: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:17 UTC 2017 ssl.sh: #6938: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:18 UTC 2017 ssl.sh: #6939: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:18 UTC 2017 ssl.sh: #6940: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:19 UTC 2017 ssl.sh: #6941: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:19 UTC 2017 ssl.sh: #6942: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:20 UTC 2017 ssl.sh: #6943: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:21 UTC 2017 ssl.sh: #6944: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19981 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19981 found at Fri Mar 31 17:20:22 UTC 2017 ssl.sh: #6945: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 19981 at Fri Mar 31 17:20:22 UTC 2017 kill -USR1 19981 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19981 killed at Fri Mar 31 17:20:22 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:20:22 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:20:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:20:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6946: Server never started - PASSED kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:28 UTC 2017 selfserv_9626 with PID 21434 started at Fri Mar 31 17:20:28 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:29 UTC 2017 ssl.sh: #6947: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:29 UTC 2017 ssl.sh: #6948: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:30 UTC 2017 ssl.sh: #6949: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:31 UTC 2017 ssl.sh: #6950: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:31 UTC 2017 ssl.sh: #6951: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:32 UTC 2017 ssl.sh: #6952: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:32 UTC 2017 ssl.sh: #6953: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:33 UTC 2017 ssl.sh: #6954: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:34 UTC 2017 ssl.sh: #6955: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:34 UTC 2017 ssl.sh: #6956: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:35 UTC 2017 ssl.sh: #6957: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:36 UTC 2017 ssl.sh: #6958: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:36 UTC 2017 ssl.sh: #6959: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:37 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #6960: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:38 UTC 2017 ssl.sh: #6961: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:38 UTC 2017 ssl.sh: #6962: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:39 UTC 2017 ssl.sh: #6963: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:39 UTC 2017 ssl.sh: #6964: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:40 UTC 2017 ssl.sh: #6965: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:41 UTC 2017 ssl.sh: #6966: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:41 UTC 2017 ssl.sh: #6967: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:42 UTC 2017 ssl.sh: #6968: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:43 UTC 2017 ssl.sh: #6969: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:43 UTC 2017 ssl.sh: #6970: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:44 UTC 2017 ssl.sh: #6971: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:45 UTC 2017 ssl.sh: #6972: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:45 UTC 2017 ssl.sh: #6973: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:46 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #6974: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:47 UTC 2017 ssl.sh: #6975: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:47 UTC 2017 ssl.sh: #6976: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:48 UTC 2017 ssl.sh: #6977: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:48 UTC 2017 ssl.sh: #6978: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:49 UTC 2017 ssl.sh: #6979: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:50 UTC 2017 ssl.sh: #6980: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:50 UTC 2017 ssl.sh: #6981: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:51 UTC 2017 ssl.sh: #6982: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:52 UTC 2017 ssl.sh: #6983: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:52 UTC 2017 ssl.sh: #6984: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:53 UTC 2017 ssl.sh: #6985: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:54 UTC 2017 ssl.sh: #6986: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21434 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21434 found at Fri Mar 31 17:20:54 UTC 2017 ssl.sh: #6987: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 21434 at Fri Mar 31 17:20:54 UTC 2017 kill -USR1 21434 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21434 killed at Fri Mar 31 17:20:55 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:20:55 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:20:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:21:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6988: Server never started - PASSED kill -0 22870 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22870 found at Fri Mar 31 17:21:01 UTC 2017 selfserv_9626 with PID 22870 started at Fri Mar 31 17:21:01 UTC 2017 trying to kill selfserv_9626 with PID 22870 at Fri Mar 31 17:21:01 UTC 2017 kill -USR1 22870 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22870 killed at Fri Mar 31 17:21:01 UTC 2017 selfserv_9626 starting at Fri Mar 31 17:21:02 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:21:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:21:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #6989: Server never started - PASSED kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:08 UTC 2017 selfserv_9626 with PID 22940 started at Fri Mar 31 17:21:08 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:08 UTC 2017 ssl.sh: #6990: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:09 UTC 2017 ssl.sh: #6991: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:09 UTC 2017 ssl.sh: #6992: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:10 UTC 2017 ssl.sh: #6993: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:11 UTC 2017 ssl.sh: #6994: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:11 UTC 2017 ssl.sh: #6995: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:12 UTC 2017 ssl.sh: #6996: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:13 UTC 2017 ssl.sh: #6997: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:13 UTC 2017 ssl.sh: #6998: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:14 UTC 2017 ssl.sh: #6999: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:15 UTC 2017 ssl.sh: #7000: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:15 UTC 2017 ssl.sh: #7001: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:16 UTC 2017 ssl.sh: #7002: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:16 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #7003: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:17 UTC 2017 ssl.sh: #7004: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:18 UTC 2017 ssl.sh: #7005: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:18 UTC 2017 ssl.sh: #7006: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:19 UTC 2017 ssl.sh: #7007: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:20 UTC 2017 ssl.sh: #7008: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:20 UTC 2017 ssl.sh: #7009: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:21 UTC 2017 ssl.sh: #7010: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:22 UTC 2017 ssl.sh: #7011: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:22 UTC 2017 ssl.sh: #7012: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:23 UTC 2017 ssl.sh: #7013: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:24 UTC 2017 ssl.sh: #7014: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:24 UTC 2017 ssl.sh: #7015: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:25 UTC 2017 ssl.sh: #7016: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:25 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #7017: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:26 UTC 2017 ssl.sh: #7018: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:27 UTC 2017 ssl.sh: #7019: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:27 UTC 2017 ssl.sh: #7020: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:28 UTC 2017 ssl.sh: #7021: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:29 UTC 2017 ssl.sh: #7022: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:29 UTC 2017 ssl.sh: #7023: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:30 UTC 2017 ssl.sh: #7024: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:30 UTC 2017 ssl.sh: #7025: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:31 UTC 2017 ssl.sh: #7026: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:32 UTC 2017 ssl.sh: #7027: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:32 UTC 2017 ssl.sh: #7028: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:33 UTC 2017 ssl.sh: #7029: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22940 found at Fri Mar 31 17:21:34 UTC 2017 ssl.sh: #7030: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 22940 at Fri Mar 31 17:21:34 UTC 2017 kill -USR1 22940 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22940 killed at Fri Mar 31 17:21:34 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:21:34 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:21:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:21:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7031: Server never started - PASSED kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:40 UTC 2017 selfserv_9626 with PID 24376 started at Fri Mar 31 17:21:40 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:41 UTC 2017 ssl.sh: #7032: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:42 UTC 2017 ssl.sh: #7033: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:42 UTC 2017 ssl.sh: #7034: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:43 UTC 2017 ssl.sh: #7035: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:44 UTC 2017 ssl.sh: #7036: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:44 UTC 2017 ssl.sh: #7037: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:45 UTC 2017 ssl.sh: #7038: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:45 UTC 2017 ssl.sh: #7039: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:46 UTC 2017 ssl.sh: #7040: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:47 UTC 2017 ssl.sh: #7041: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:47 UTC 2017 ssl.sh: #7042: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:48 UTC 2017 ssl.sh: #7043: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:49 UTC 2017 ssl.sh: #7044: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:49 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #7045: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:50 UTC 2017 ssl.sh: #7046: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:51 UTC 2017 ssl.sh: #7047: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:51 UTC 2017 ssl.sh: #7048: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:52 UTC 2017 ssl.sh: #7049: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:52 UTC 2017 ssl.sh: #7050: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:53 UTC 2017 ssl.sh: #7051: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:54 UTC 2017 ssl.sh: #7052: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:54 UTC 2017 ssl.sh: #7053: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:55 UTC 2017 ssl.sh: #7054: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:56 UTC 2017 ssl.sh: #7055: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:56 UTC 2017 ssl.sh: #7056: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:57 UTC 2017 ssl.sh: #7057: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:58 UTC 2017 ssl.sh: #7058: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:58 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #7059: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:21:59 UTC 2017 ssl.sh: #7060: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:22:00 UTC 2017 ssl.sh: #7061: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:22:00 UTC 2017 ssl.sh: #7062: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:22:01 UTC 2017 ssl.sh: #7063: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:22:02 UTC 2017 ssl.sh: #7064: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:22:02 UTC 2017 ssl.sh: #7065: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:22:03 UTC 2017 ssl.sh: #7066: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:22:03 UTC 2017 ssl.sh: #7067: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:22:04 UTC 2017 ssl.sh: #7068: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:22:05 UTC 2017 ssl.sh: #7069: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:22:05 UTC 2017 ssl.sh: #7070: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:22:06 UTC 2017 ssl.sh: #7071: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24376 found at Fri Mar 31 17:22:07 UTC 2017 ssl.sh: #7072: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 24376 at Fri Mar 31 17:22:07 UTC 2017 kill -USR1 24376 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24376 killed at Fri Mar 31 17:22:07 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:22:07 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:22:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:22:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7073: Server never started - PASSED kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:13 UTC 2017 selfserv_9626 with PID 25827 started at Fri Mar 31 17:22:13 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:14 UTC 2017 ssl.sh: #7074: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:15 UTC 2017 ssl.sh: #7075: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:15 UTC 2017 ssl.sh: #7076: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:16 UTC 2017 ssl.sh: #7077: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:16 UTC 2017 ssl.sh: #7078: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:17 UTC 2017 ssl.sh: #7079: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:18 UTC 2017 ssl.sh: #7080: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:18 UTC 2017 ssl.sh: #7081: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:19 UTC 2017 ssl.sh: #7082: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:20 UTC 2017 ssl.sh: #7083: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:20 UTC 2017 ssl.sh: #7084: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:21 UTC 2017 ssl.sh: #7085: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:22 UTC 2017 ssl.sh: #7086: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:22 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #7087: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:23 UTC 2017 ssl.sh: #7088: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:24 UTC 2017 ssl.sh: #7089: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:24 UTC 2017 ssl.sh: #7090: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:25 UTC 2017 ssl.sh: #7091: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:25 UTC 2017 ssl.sh: #7092: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:26 UTC 2017 ssl.sh: #7093: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:27 UTC 2017 ssl.sh: #7094: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:27 UTC 2017 ssl.sh: #7095: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:28 UTC 2017 ssl.sh: #7096: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:29 UTC 2017 ssl.sh: #7097: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:29 UTC 2017 ssl.sh: #7098: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:30 UTC 2017 ssl.sh: #7099: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:31 UTC 2017 ssl.sh: #7100: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:31 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #7101: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:32 UTC 2017 ssl.sh: #7102: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:32 UTC 2017 ssl.sh: #7103: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:33 UTC 2017 ssl.sh: #7104: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:34 UTC 2017 ssl.sh: #7105: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:34 UTC 2017 ssl.sh: #7106: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:35 UTC 2017 ssl.sh: #7107: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:36 UTC 2017 ssl.sh: #7108: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:36 UTC 2017 ssl.sh: #7109: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:37 UTC 2017 ssl.sh: #7110: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:38 UTC 2017 ssl.sh: #7111: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:38 UTC 2017 ssl.sh: #7112: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:39 UTC 2017 ssl.sh: #7113: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25827 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25827 found at Fri Mar 31 17:22:40 UTC 2017 ssl.sh: #7114: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 25827 at Fri Mar 31 17:22:40 UTC 2017 kill -USR1 25827 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25827 killed at Fri Mar 31 17:22:40 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:22:40 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:22:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:22:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7115: Server never started - PASSED kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:46 UTC 2017 selfserv_9626 with PID 27266 started at Fri Mar 31 17:22:46 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:47 UTC 2017 ssl.sh: #7116: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:47 UTC 2017 ssl.sh: #7117: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:48 UTC 2017 ssl.sh: #7118: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:49 UTC 2017 ssl.sh: #7119: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:49 UTC 2017 ssl.sh: #7120: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:50 UTC 2017 ssl.sh: #7121: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:51 UTC 2017 ssl.sh: #7122: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:51 UTC 2017 ssl.sh: #7123: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:52 UTC 2017 ssl.sh: #7124: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:53 UTC 2017 ssl.sh: #7125: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:53 UTC 2017 ssl.sh: #7126: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:54 UTC 2017 ssl.sh: #7127: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:55 UTC 2017 ssl.sh: #7128: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:55 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #7129: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:56 UTC 2017 ssl.sh: #7130: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:56 UTC 2017 ssl.sh: #7131: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:57 UTC 2017 ssl.sh: #7132: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:58 UTC 2017 ssl.sh: #7133: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:58 UTC 2017 ssl.sh: #7134: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:22:59 UTC 2017 ssl.sh: #7135: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:00 UTC 2017 ssl.sh: #7136: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:00 UTC 2017 ssl.sh: #7137: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:01 UTC 2017 ssl.sh: #7138: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:02 UTC 2017 ssl.sh: #7139: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:02 UTC 2017 ssl.sh: #7140: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:03 UTC 2017 ssl.sh: #7141: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:04 UTC 2017 ssl.sh: #7142: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:04 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #7143: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:05 UTC 2017 ssl.sh: #7144: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:05 UTC 2017 ssl.sh: #7145: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:06 UTC 2017 ssl.sh: #7146: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:07 UTC 2017 ssl.sh: #7147: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:07 UTC 2017 ssl.sh: #7148: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:08 UTC 2017 ssl.sh: #7149: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:09 UTC 2017 ssl.sh: #7150: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:09 UTC 2017 ssl.sh: #7151: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:10 UTC 2017 ssl.sh: #7152: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:11 UTC 2017 ssl.sh: #7153: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:11 UTC 2017 ssl.sh: #7154: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:12 UTC 2017 ssl.sh: #7155: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 27266 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27266 found at Fri Mar 31 17:23:13 UTC 2017 ssl.sh: #7156: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 27266 at Fri Mar 31 17:23:13 UTC 2017 kill -USR1 27266 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 27266 killed at Fri Mar 31 17:23:13 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:23:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:23:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:23:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7157: Server never started - PASSED kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:19 UTC 2017 selfserv_9626 with PID 28717 started at Fri Mar 31 17:23:19 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:20 UTC 2017 ssl.sh: #7158: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:20 UTC 2017 ssl.sh: #7159: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:21 UTC 2017 ssl.sh: #7160: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:22 UTC 2017 ssl.sh: #7161: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:22 UTC 2017 ssl.sh: #7162: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:23 UTC 2017 ssl.sh: #7163: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:24 UTC 2017 ssl.sh: #7164: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:24 UTC 2017 ssl.sh: #7165: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:25 UTC 2017 ssl.sh: #7166: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:26 UTC 2017 ssl.sh: #7167: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:26 UTC 2017 ssl.sh: #7168: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:27 UTC 2017 ssl.sh: #7169: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:28 UTC 2017 ssl.sh: #7170: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:28 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #7171: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:29 UTC 2017 ssl.sh: #7172: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:29 UTC 2017 ssl.sh: #7173: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:30 UTC 2017 ssl.sh: #7174: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:31 UTC 2017 ssl.sh: #7175: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:31 UTC 2017 ssl.sh: #7176: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:32 UTC 2017 ssl.sh: #7177: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:32 UTC 2017 ssl.sh: #7178: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:33 UTC 2017 ssl.sh: #7179: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:34 UTC 2017 ssl.sh: #7180: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:34 UTC 2017 ssl.sh: #7181: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:35 UTC 2017 ssl.sh: #7182: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:36 UTC 2017 ssl.sh: #7183: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:36 UTC 2017 ssl.sh: #7184: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:37 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #7185: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:38 UTC 2017 ssl.sh: #7186: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:38 UTC 2017 ssl.sh: #7187: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:39 UTC 2017 ssl.sh: #7188: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:40 UTC 2017 ssl.sh: #7189: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:40 UTC 2017 ssl.sh: #7190: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:41 UTC 2017 ssl.sh: #7191: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:41 UTC 2017 ssl.sh: #7192: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:42 UTC 2017 ssl.sh: #7193: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:43 UTC 2017 ssl.sh: #7194: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:43 UTC 2017 ssl.sh: #7195: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:44 UTC 2017 ssl.sh: #7196: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:45 UTC 2017 ssl.sh: #7197: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28717 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28717 found at Fri Mar 31 17:23:45 UTC 2017 ssl.sh: #7198: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 28717 at Fri Mar 31 17:23:46 UTC 2017 kill -USR1 28717 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28717 killed at Fri Mar 31 17:23:46 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:23:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:23:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:23:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7199: Server never started - PASSED kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:23:52 UTC 2017 selfserv_9626 with PID 30155 started at Fri Mar 31 17:23:52 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:23:53 UTC 2017 ssl.sh: #7200: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:23:53 UTC 2017 ssl.sh: #7201: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:23:54 UTC 2017 ssl.sh: #7202: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:23:54 UTC 2017 ssl.sh: #7203: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:23:55 UTC 2017 ssl.sh: #7204: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:23:56 UTC 2017 ssl.sh: #7205: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:23:56 UTC 2017 ssl.sh: #7206: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:23:57 UTC 2017 ssl.sh: #7207: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:23:58 UTC 2017 ssl.sh: #7208: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:23:58 UTC 2017 ssl.sh: #7209: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:23:59 UTC 2017 ssl.sh: #7210: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:00 UTC 2017 ssl.sh: #7211: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:00 UTC 2017 ssl.sh: #7212: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:01 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #7213: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:02 UTC 2017 ssl.sh: #7214: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:02 UTC 2017 ssl.sh: #7215: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:03 UTC 2017 ssl.sh: #7216: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:04 UTC 2017 ssl.sh: #7217: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:04 UTC 2017 ssl.sh: #7218: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:05 UTC 2017 ssl.sh: #7219: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:05 UTC 2017 ssl.sh: #7220: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:06 UTC 2017 ssl.sh: #7221: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:07 UTC 2017 ssl.sh: #7222: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:07 UTC 2017 ssl.sh: #7223: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:08 UTC 2017 ssl.sh: #7224: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:09 UTC 2017 ssl.sh: #7225: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:09 UTC 2017 ssl.sh: #7226: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:10 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #7227: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:11 UTC 2017 ssl.sh: #7228: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:11 UTC 2017 ssl.sh: #7229: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:12 UTC 2017 ssl.sh: #7230: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:12 UTC 2017 ssl.sh: #7231: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:13 UTC 2017 ssl.sh: #7232: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:14 UTC 2017 ssl.sh: #7233: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:14 UTC 2017 ssl.sh: #7234: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:15 UTC 2017 ssl.sh: #7235: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:16 UTC 2017 ssl.sh: #7236: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:16 UTC 2017 ssl.sh: #7237: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:17 UTC 2017 ssl.sh: #7238: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:18 UTC 2017 ssl.sh: #7239: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 30155 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30155 found at Fri Mar 31 17:24:18 UTC 2017 ssl.sh: #7240: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 30155 at Fri Mar 31 17:24:19 UTC 2017 kill -USR1 30155 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30155 killed at Fri Mar 31 17:24:19 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 17:24:19 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 17:24:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 17:24:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #7241: Server never started - PASSED kill -0 31612 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31612 found at Fri Mar 31 17:24:25 UTC 2017 selfserv_9626 with PID 31612 started at Fri Mar 31 17:24:25 UTC 2017 trying to kill selfserv_9626 with PID 31612 at Fri Mar 31 17:24:25 UTC 2017 kill -USR1 31612 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31612 killed at Fri Mar 31 17:24:25 UTC 2017 TIMESTAMP ssl END: Fri Mar 31 17:24:26 UTC 2017 Running tests for ocsp TIMESTAMP ocsp BEGIN: Fri Mar 31 17:24:26 UTC 2017 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Fri Mar 31 17:24:26 UTC 2017 Running tests for pkits TIMESTAMP pkits BEGIN: Fri Mar 31 17:24:26 UTC 2017 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Fri Mar 31 17:24:26 UTC 2017 Running tests for chains TIMESTAMP chains BEGIN: Fri Mar 31 17:24:26 UTC 2017 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #7242: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172427 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7243: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #7244: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #7245: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #7246: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7247: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7248: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7249: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #7250: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #7251: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7252: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7253: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7254: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #7255: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #7256: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7257: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9637 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7258: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7259: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #7260: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #7261: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7262: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7263: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7264: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #7265: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7266: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7267: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7268: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #7269: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7270: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7271: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7272: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #7273: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7274: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7275: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7276: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #7277: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7278: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9637 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7279: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7280: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #7281: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7282: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7283: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7284: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #7285: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7286: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7287: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7288: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #7289: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7290: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9637 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7291: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7292: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #7293: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7294: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7295: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7296: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #7297: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7298: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7299: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7300: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #7301: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7302: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9637 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7303: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7304: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20170331172816Z nextupdate=20180331172816Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Mar 31 17:28:16 2017 Next Update: Sat Mar 31 17:28:16 2018 CRL Extensions: chains.sh: #7305: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20170331172817Z addcert 2 20170331172817Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Mar 31 17:28:17 2017 Next Update: Sat Mar 31 17:28:16 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 17:28:17 2017 CRL Extensions: chains.sh: #7306: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20170331172817Z nextupdate=20180331172817Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Mar 31 17:28:17 2017 Next Update: Sat Mar 31 17:28:17 2018 CRL Extensions: chains.sh: #7307: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20170331172818Z addcert 2 20170331172818Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Mar 31 17:28:18 2017 Next Update: Sat Mar 31 17:28:17 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 17:28:18 2017 CRL Extensions: chains.sh: #7308: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20170331172819Z addcert 4 20170331172819Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Mar 31 17:28:19 2017 Next Update: Sat Mar 31 17:28:17 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 17:28:18 2017 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Fri Mar 31 17:28:19 2017 CRL Extensions: chains.sh: #7309: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20170331172819Z nextupdate=20180331172819Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Mar 31 17:28:19 2017 Next Update: Sat Mar 31 17:28:19 2018 CRL Extensions: chains.sh: #7310: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20170331172820Z addcert 2 20170331172820Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Mar 31 17:28:20 2017 Next Update: Sat Mar 31 17:28:19 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 17:28:20 2017 CRL Extensions: chains.sh: #7311: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20170331172821Z addcert 3 20170331172821Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Mar 31 17:28:21 2017 Next Update: Sat Mar 31 17:28:19 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 17:28:20 2017 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Mar 31 17:28:21 2017 CRL Extensions: chains.sh: #7312: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20170331172821Z nextupdate=20180331172822Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Mar 31 17:28:21 2017 Next Update: Sat Mar 31 17:28:22 2018 CRL Extensions: chains.sh: #7313: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20170331172822Z addcert 2 20170331172822Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Mar 31 17:28:22 2017 Next Update: Sat Mar 31 17:28:22 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 17:28:22 2017 CRL Extensions: chains.sh: #7314: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20170331172823Z addcert 3 20170331172823Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Mar 31 17:28:23 2017 Next Update: Sat Mar 31 17:28:22 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 17:28:22 2017 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Mar 31 17:28:23 2017 CRL Extensions: chains.sh: #7315: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #7316: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #7317: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #7318: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #7319: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #7320: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #7321: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #7322: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #7323: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #7324: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #7325: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #7326: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #7327: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #7328: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #7329: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #7330: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #7331: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #7332: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #7333: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #7334: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #7335: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #7336: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #7337: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #7338: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #7339: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED httpserv starting at Fri Mar 31 17:28:38 UTC 2017 httpserv -D -p 9636 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/aiahttp/http_pid.2460 & trying to connect to httpserv at Fri Mar 31 17:28:38 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 retrying to connect to httpserv at Fri Mar 31 17:28:44 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 chains.sh: #7340: Waiting for Server - FAILED kill -0 672 >/dev/null 2>/dev/null httpserv with PID 672 found at Fri Mar 31 17:28:44 UTC 2017 httpserv with PID 672 started at Fri Mar 31 17:28:44 UTC 2017 tstclnt -h localhost.localdomain -p 9636 -q -t 20 tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #7341: Test that OCSP server is reachable - FAILED trying to kill httpserv with PID 672 at Fri Mar 31 17:28:46 UTC 2017 kill -USR1 672 httpserv: normal termination httpserv -b -p 9636 2>/dev/null; httpserv with PID 672 killed at Fri Mar 31 17:28:46 UTC 2017 httpserv starting at Fri Mar 31 17:28:46 UTC 2017 httpserv -D -p 9636 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/aiahttp/http_pid.2460 & trying to connect to httpserv at Fri Mar 31 17:28:46 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 retrying to connect to httpserv at Fri Mar 31 17:28:52 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 chains.sh: #7342: Waiting for Server - FAILED kill -0 758 >/dev/null 2>/dev/null httpserv with PID 758 found at Fri Mar 31 17:28:52 UTC 2017 httpserv with PID 758 started at Fri Mar 31 17:28:52 UTC 2017 tstclnt -h localhost.localdomain -p 9636 -q -t 20 tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #7343: Test that OCSP server is reachable - FAILED trying to kill httpserv with PID 758 at Fri Mar 31 17:28:54 UTC 2017 kill -USR1 758 httpserv: normal termination httpserv -b -p 9636 2>/dev/null; httpserv with PID 758 killed at Fri Mar 31 17:28:54 UTC 2017 httpserv starting at Fri Mar 31 17:28:54 UTC 2017 httpserv -D -p 9636 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/aiahttp/http_pid.2460 & trying to connect to httpserv at Fri Mar 31 17:28:54 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 retrying to connect to httpserv at Fri Mar 31 17:29:00 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 chains.sh: #7344: Waiting for Server - FAILED kill -0 843 >/dev/null 2>/dev/null httpserv with PID 843 found at Fri Mar 31 17:29:00 UTC 2017 httpserv with PID 843 started at Fri Mar 31 17:29:00 UTC 2017 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #7345: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172428 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7346: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #7347: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #7348: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172429 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7349: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #7350: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #7351: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7352: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 331172430 -7 Bridge@Army < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7353: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7354: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 331172431 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7355: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7356: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #7357: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #7358: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7359: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 331172432 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7360: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7361: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7362: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #7363: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #7364: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172429 (0x13bd4a4d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 17:29:16 2017 Not After : Thu Mar 31 17:29:16 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:93:77:56:83:5a:1f:c3:60:7e:0b:16:a7:22:0c:ab: ed:d7:34:fe:b6:03:03:db:44:e8:a0:88:bb:c2:70:c4: 73:0d:fd:10:10:a2:eb:3b:9e:64:e9:f1:e9:16:ee:d4: 3e:6d:a7:82:74:0a:23:e5:22:2c:90:b8:65:3b:86:86: 94:49:42:07:30:0a:e0:76:74:23:d5:c2:60:c4:ac:4d: f7:a2:1e:54:b4:72:1f:fe:e0:bb:2e:80:fb:c2:bf:5e: 7a:fd:3c:5f:d6:ba:ff:2a:45:f4:a7:51:72:ae:bc:e6: f4:96:6f:5a:8e:3e:54:1d:06:04:9c:31:c9:e8:57:e1: 3c:dc:fa:43:6c:05:39:39:a8:86:f5:1c:6c:33:1a:93: ec:c4:b3:8d:b8:ed:15:d6:0c:46:81:39:cd:06:42:17: 87:a9:b0:9d:47:c7:4a:af:2a:b7:83:6c:60:23:1f:91: c1:e1:0f:c6:55:7c:4b:fb:e4:61:a6:40:a0:71:9b:cd: 77:bd:d0:b7:2b:f2:13:b2:14:a7:99:c2:a3:7a:dd:f1: 86:98:9f:42:89:d0:5b:aa:4c:1b:61:42:8c:93:fd:8e: d1:14:f9:d0:3e:27:0c:70:6d:7e:90:7c:9d:0f:4d:a1: 73:2b:22:c8:e1:2f:fe:3a:91:5f:3b:ac:1b:c8:b8:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:a9:5e:50:78:ec:be:d3:92:66:ea:e1:03:a2:d4:e8: 22:42:59:7c:b3:6e:24:11:66:83:48:ca:6f:bd:a1:05: bf:3f:ba:1f:61:31:00:c0:70:d4:f7:55:05:75:ff:7e: 57:96:6c:5e:8d:5a:5e:5c:a4:9b:9b:da:90:c9:96:a2: 40:45:9c:67:a1:7a:fd:47:f5:c3:12:32:48:2a:5d:f9: cb:f2:57:f3:27:aa:bb:58:25:08:2d:97:01:5d:5c:ed: 62:4d:57:28:6d:97:8d:94:f0:e2:33:08:4a:ad:ad:bf: 67:61:fc:7f:b5:21:eb:ce:36:9c:c4:16:c7:cb:c4:cd: 3e:5e:4e:2e:53:c4:e0:cc:f3:8b:cf:39:27:f6:3e:57: ac:38:93:58:7f:08:16:54:aa:82:55:75:99:4f:89:c9: 3b:da:3f:72:2d:73:30:ab:ed:b5:91:05:7d:b6:24:96: ea:2b:37:f1:df:0f:ad:1f:27:9a:0e:2f:16:85:94:2d: bf:29:3d:3d:00:19:b6:77:62:d2:7c:e0:cc:d6:f7:17: 1c:61:e0:e5:40:a4:a3:8e:91:93:6c:18:d6:9e:c2:ef: e3:f9:dc:56:ed:67:7d:57:b2:59:1d:52:53:51:9f:43: 69:21:91:42:5f:af:2c:8f:7a:f1:4c:73:28:e4:3f:05 Fingerprint (SHA-256): EF:5B:FB:7D:37:E2:1E:E6:C8:72:48:B4:B3:8E:6A:B7:87:61:1C:F4:D7:34:84:5F:CE:DA:5C:FF:4F:22:F3:8F Fingerprint (SHA1): 73:43:E6:76:52:7A:80:13:C9:62:F0:6A:51:09:B1:97:CD:E3:49:3F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7365: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172428 (0x13bd4a4c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 17:29:05 2017 Not After : Thu Mar 31 17:29:05 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:0d:f8:7a:ef:46:f6:83:f3:08:a4:a8:f4:f6:d2:a1: d0:4a:3d:c8:11:20:9e:b8:a9:b3:1b:aa:5e:f7:07:0a: f2:bd:d3:da:7a:72:f5:2a:38:a5:30:6a:4c:4c:c2:fd: 34:e9:07:67:c6:cc:e4:49:75:5c:91:ea:cb:c3:e0:5c: 8d:98:f3:22:55:68:42:44:73:70:d0:98:e7:ff:bf:dc: 34:dd:39:14:d8:64:fe:b4:ff:3a:d5:a1:4f:47:01:44: a2:f8:b9:5f:e0:07:e4:99:dc:3a:18:2f:c1:6c:c7:39: 5d:c9:78:bb:83:a4:8a:60:50:5b:68:ea:39:69:34:6f: db:de:b3:f3:49:7e:a8:c4:fb:59:16:6e:06:52:fa:6e: 6c:90:2d:41:8a:a6:33:56:64:0d:6f:66:f4:d1:50:71: 4e:74:d4:af:27:26:d9:63:e9:61:e3:5e:da:f8:69:22: cc:48:2b:cf:9b:1c:9e:0e:1d:ba:27:20:b5:7d:6d:b7: 8b:9b:cc:6e:8e:25:b0:a6:8e:71:6a:09:2b:5a:ca:e6: dd:30:69:59:8d:1e:81:66:1a:c6:3a:be:aa:4d:5e:c4: 71:ce:61:17:34:f8:05:7d:f5:ee:fd:b0:60:6d:50:ec: 5e:05:ab:16:80:83:47:cd:c0:45:2b:23:89:c0:90:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:9b:70:f8:1f:3d:32:e4:f9:17:21:04:d1:59:2d:5d: 4f:cd:b7:de:c8:b0:dc:61:13:cf:7b:a8:3d:6a:2c:6e: b0:5c:05:fb:23:7b:7d:d4:14:30:b0:f7:7a:af:e9:5a: 61:bc:07:71:b9:3b:fc:89:fc:61:ad:97:2f:4c:54:f2: cd:a9:d7:80:7c:b4:62:59:ec:1d:29:e1:e3:cc:df:55: 97:61:39:fc:89:be:27:02:c3:9a:43:c2:3c:96:23:1f: 7f:22:00:89:6e:87:a8:b3:50:aa:3a:9d:fb:55:05:0d: 58:53:cf:bb:f8:ac:f2:76:68:69:d7:ee:cc:32:ff:b2: 1d:7e:00:e0:cb:0b:0e:71:52:28:13:a2:1d:78:72:a6: 17:11:85:40:f6:66:4f:bf:19:b0:a1:45:c3:1e:ff:97: 33:ef:6d:9d:eb:3d:0b:b8:7b:8d:bb:65:17:d8:b6:aa: 7a:7d:a3:4e:22:68:b2:6d:0e:5f:87:22:93:ce:c1:38: 9c:78:2a:91:de:ae:d3:80:54:ec:72:c4:fd:94:09:c9: 03:3e:0f:1a:19:01:1b:b1:45:8c:62:3b:ff:cd:18:79: f0:d4:57:8f:27:41:42:59:b0:67:cf:15:fa:21:17:cb: fc:31:ad:88:7e:08:d8:27:66:a4:e6:ab:cc:01:c0:dc Fingerprint (SHA-256): 80:48:50:FF:98:FA:6C:1E:FD:0A:CC:5B:E3:E6:A4:28:4D:85:0D:C8:1F:F2:D3:0C:1B:46:07:E0:93:FD:BC:06 Fingerprint (SHA1): 86:99:23:F9:59:BB:50:55:8B:5A:00:09:B9:69:25:89:B6:5C:46:5E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7366: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #7367: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #7368: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #7369: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172428 (0x13bd4a4c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 17:29:05 2017 Not After : Thu Mar 31 17:29:05 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:0d:f8:7a:ef:46:f6:83:f3:08:a4:a8:f4:f6:d2:a1: d0:4a:3d:c8:11:20:9e:b8:a9:b3:1b:aa:5e:f7:07:0a: f2:bd:d3:da:7a:72:f5:2a:38:a5:30:6a:4c:4c:c2:fd: 34:e9:07:67:c6:cc:e4:49:75:5c:91:ea:cb:c3:e0:5c: 8d:98:f3:22:55:68:42:44:73:70:d0:98:e7:ff:bf:dc: 34:dd:39:14:d8:64:fe:b4:ff:3a:d5:a1:4f:47:01:44: a2:f8:b9:5f:e0:07:e4:99:dc:3a:18:2f:c1:6c:c7:39: 5d:c9:78:bb:83:a4:8a:60:50:5b:68:ea:39:69:34:6f: db:de:b3:f3:49:7e:a8:c4:fb:59:16:6e:06:52:fa:6e: 6c:90:2d:41:8a:a6:33:56:64:0d:6f:66:f4:d1:50:71: 4e:74:d4:af:27:26:d9:63:e9:61:e3:5e:da:f8:69:22: cc:48:2b:cf:9b:1c:9e:0e:1d:ba:27:20:b5:7d:6d:b7: 8b:9b:cc:6e:8e:25:b0:a6:8e:71:6a:09:2b:5a:ca:e6: dd:30:69:59:8d:1e:81:66:1a:c6:3a:be:aa:4d:5e:c4: 71:ce:61:17:34:f8:05:7d:f5:ee:fd:b0:60:6d:50:ec: 5e:05:ab:16:80:83:47:cd:c0:45:2b:23:89:c0:90:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:9b:70:f8:1f:3d:32:e4:f9:17:21:04:d1:59:2d:5d: 4f:cd:b7:de:c8:b0:dc:61:13:cf:7b:a8:3d:6a:2c:6e: b0:5c:05:fb:23:7b:7d:d4:14:30:b0:f7:7a:af:e9:5a: 61:bc:07:71:b9:3b:fc:89:fc:61:ad:97:2f:4c:54:f2: cd:a9:d7:80:7c:b4:62:59:ec:1d:29:e1:e3:cc:df:55: 97:61:39:fc:89:be:27:02:c3:9a:43:c2:3c:96:23:1f: 7f:22:00:89:6e:87:a8:b3:50:aa:3a:9d:fb:55:05:0d: 58:53:cf:bb:f8:ac:f2:76:68:69:d7:ee:cc:32:ff:b2: 1d:7e:00:e0:cb:0b:0e:71:52:28:13:a2:1d:78:72:a6: 17:11:85:40:f6:66:4f:bf:19:b0:a1:45:c3:1e:ff:97: 33:ef:6d:9d:eb:3d:0b:b8:7b:8d:bb:65:17:d8:b6:aa: 7a:7d:a3:4e:22:68:b2:6d:0e:5f:87:22:93:ce:c1:38: 9c:78:2a:91:de:ae:d3:80:54:ec:72:c4:fd:94:09:c9: 03:3e:0f:1a:19:01:1b:b1:45:8c:62:3b:ff:cd:18:79: f0:d4:57:8f:27:41:42:59:b0:67:cf:15:fa:21:17:cb: fc:31:ad:88:7e:08:d8:27:66:a4:e6:ab:cc:01:c0:dc Fingerprint (SHA-256): 80:48:50:FF:98:FA:6C:1E:FD:0A:CC:5B:E3:E6:A4:28:4D:85:0D:C8:1F:F2:D3:0C:1B:46:07:E0:93:FD:BC:06 Fingerprint (SHA1): 86:99:23:F9:59:BB:50:55:8B:5A:00:09:B9:69:25:89:B6:5C:46:5E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7370: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172429 (0x13bd4a4d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 17:29:16 2017 Not After : Thu Mar 31 17:29:16 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:93:77:56:83:5a:1f:c3:60:7e:0b:16:a7:22:0c:ab: ed:d7:34:fe:b6:03:03:db:44:e8:a0:88:bb:c2:70:c4: 73:0d:fd:10:10:a2:eb:3b:9e:64:e9:f1:e9:16:ee:d4: 3e:6d:a7:82:74:0a:23:e5:22:2c:90:b8:65:3b:86:86: 94:49:42:07:30:0a:e0:76:74:23:d5:c2:60:c4:ac:4d: f7:a2:1e:54:b4:72:1f:fe:e0:bb:2e:80:fb:c2:bf:5e: 7a:fd:3c:5f:d6:ba:ff:2a:45:f4:a7:51:72:ae:bc:e6: f4:96:6f:5a:8e:3e:54:1d:06:04:9c:31:c9:e8:57:e1: 3c:dc:fa:43:6c:05:39:39:a8:86:f5:1c:6c:33:1a:93: ec:c4:b3:8d:b8:ed:15:d6:0c:46:81:39:cd:06:42:17: 87:a9:b0:9d:47:c7:4a:af:2a:b7:83:6c:60:23:1f:91: c1:e1:0f:c6:55:7c:4b:fb:e4:61:a6:40:a0:71:9b:cd: 77:bd:d0:b7:2b:f2:13:b2:14:a7:99:c2:a3:7a:dd:f1: 86:98:9f:42:89:d0:5b:aa:4c:1b:61:42:8c:93:fd:8e: d1:14:f9:d0:3e:27:0c:70:6d:7e:90:7c:9d:0f:4d:a1: 73:2b:22:c8:e1:2f:fe:3a:91:5f:3b:ac:1b:c8:b8:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:a9:5e:50:78:ec:be:d3:92:66:ea:e1:03:a2:d4:e8: 22:42:59:7c:b3:6e:24:11:66:83:48:ca:6f:bd:a1:05: bf:3f:ba:1f:61:31:00:c0:70:d4:f7:55:05:75:ff:7e: 57:96:6c:5e:8d:5a:5e:5c:a4:9b:9b:da:90:c9:96:a2: 40:45:9c:67:a1:7a:fd:47:f5:c3:12:32:48:2a:5d:f9: cb:f2:57:f3:27:aa:bb:58:25:08:2d:97:01:5d:5c:ed: 62:4d:57:28:6d:97:8d:94:f0:e2:33:08:4a:ad:ad:bf: 67:61:fc:7f:b5:21:eb:ce:36:9c:c4:16:c7:cb:c4:cd: 3e:5e:4e:2e:53:c4:e0:cc:f3:8b:cf:39:27:f6:3e:57: ac:38:93:58:7f:08:16:54:aa:82:55:75:99:4f:89:c9: 3b:da:3f:72:2d:73:30:ab:ed:b5:91:05:7d:b6:24:96: ea:2b:37:f1:df:0f:ad:1f:27:9a:0e:2f:16:85:94:2d: bf:29:3d:3d:00:19:b6:77:62:d2:7c:e0:cc:d6:f7:17: 1c:61:e0:e5:40:a4:a3:8e:91:93:6c:18:d6:9e:c2:ef: e3:f9:dc:56:ed:67:7d:57:b2:59:1d:52:53:51:9f:43: 69:21:91:42:5f:af:2c:8f:7a:f1:4c:73:28:e4:3f:05 Fingerprint (SHA-256): EF:5B:FB:7D:37:E2:1E:E6:C8:72:48:B4:B3:8E:6A:B7:87:61:1C:F4:D7:34:84:5F:CE:DA:5C:FF:4F:22:F3:8F Fingerprint (SHA1): 73:43:E6:76:52:7A:80:13:C9:62:F0:6A:51:09:B1:97:CD:E3:49:3F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7371: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #7372: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #7373: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #7374: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #7375: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #7376: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172429 (0x13bd4a4d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 17:29:16 2017 Not After : Thu Mar 31 17:29:16 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:93:77:56:83:5a:1f:c3:60:7e:0b:16:a7:22:0c:ab: ed:d7:34:fe:b6:03:03:db:44:e8:a0:88:bb:c2:70:c4: 73:0d:fd:10:10:a2:eb:3b:9e:64:e9:f1:e9:16:ee:d4: 3e:6d:a7:82:74:0a:23:e5:22:2c:90:b8:65:3b:86:86: 94:49:42:07:30:0a:e0:76:74:23:d5:c2:60:c4:ac:4d: f7:a2:1e:54:b4:72:1f:fe:e0:bb:2e:80:fb:c2:bf:5e: 7a:fd:3c:5f:d6:ba:ff:2a:45:f4:a7:51:72:ae:bc:e6: f4:96:6f:5a:8e:3e:54:1d:06:04:9c:31:c9:e8:57:e1: 3c:dc:fa:43:6c:05:39:39:a8:86:f5:1c:6c:33:1a:93: ec:c4:b3:8d:b8:ed:15:d6:0c:46:81:39:cd:06:42:17: 87:a9:b0:9d:47:c7:4a:af:2a:b7:83:6c:60:23:1f:91: c1:e1:0f:c6:55:7c:4b:fb:e4:61:a6:40:a0:71:9b:cd: 77:bd:d0:b7:2b:f2:13:b2:14:a7:99:c2:a3:7a:dd:f1: 86:98:9f:42:89:d0:5b:aa:4c:1b:61:42:8c:93:fd:8e: d1:14:f9:d0:3e:27:0c:70:6d:7e:90:7c:9d:0f:4d:a1: 73:2b:22:c8:e1:2f:fe:3a:91:5f:3b:ac:1b:c8:b8:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:a9:5e:50:78:ec:be:d3:92:66:ea:e1:03:a2:d4:e8: 22:42:59:7c:b3:6e:24:11:66:83:48:ca:6f:bd:a1:05: bf:3f:ba:1f:61:31:00:c0:70:d4:f7:55:05:75:ff:7e: 57:96:6c:5e:8d:5a:5e:5c:a4:9b:9b:da:90:c9:96:a2: 40:45:9c:67:a1:7a:fd:47:f5:c3:12:32:48:2a:5d:f9: cb:f2:57:f3:27:aa:bb:58:25:08:2d:97:01:5d:5c:ed: 62:4d:57:28:6d:97:8d:94:f0:e2:33:08:4a:ad:ad:bf: 67:61:fc:7f:b5:21:eb:ce:36:9c:c4:16:c7:cb:c4:cd: 3e:5e:4e:2e:53:c4:e0:cc:f3:8b:cf:39:27:f6:3e:57: ac:38:93:58:7f:08:16:54:aa:82:55:75:99:4f:89:c9: 3b:da:3f:72:2d:73:30:ab:ed:b5:91:05:7d:b6:24:96: ea:2b:37:f1:df:0f:ad:1f:27:9a:0e:2f:16:85:94:2d: bf:29:3d:3d:00:19:b6:77:62:d2:7c:e0:cc:d6:f7:17: 1c:61:e0:e5:40:a4:a3:8e:91:93:6c:18:d6:9e:c2:ef: e3:f9:dc:56:ed:67:7d:57:b2:59:1d:52:53:51:9f:43: 69:21:91:42:5f:af:2c:8f:7a:f1:4c:73:28:e4:3f:05 Fingerprint (SHA-256): EF:5B:FB:7D:37:E2:1E:E6:C8:72:48:B4:B3:8E:6A:B7:87:61:1C:F4:D7:34:84:5F:CE:DA:5C:FF:4F:22:F3:8F Fingerprint (SHA1): 73:43:E6:76:52:7A:80:13:C9:62:F0:6A:51:09:B1:97:CD:E3:49:3F Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7377: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172429 (0x13bd4a4d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 17:29:16 2017 Not After : Thu Mar 31 17:29:16 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:93:77:56:83:5a:1f:c3:60:7e:0b:16:a7:22:0c:ab: ed:d7:34:fe:b6:03:03:db:44:e8:a0:88:bb:c2:70:c4: 73:0d:fd:10:10:a2:eb:3b:9e:64:e9:f1:e9:16:ee:d4: 3e:6d:a7:82:74:0a:23:e5:22:2c:90:b8:65:3b:86:86: 94:49:42:07:30:0a:e0:76:74:23:d5:c2:60:c4:ac:4d: f7:a2:1e:54:b4:72:1f:fe:e0:bb:2e:80:fb:c2:bf:5e: 7a:fd:3c:5f:d6:ba:ff:2a:45:f4:a7:51:72:ae:bc:e6: f4:96:6f:5a:8e:3e:54:1d:06:04:9c:31:c9:e8:57:e1: 3c:dc:fa:43:6c:05:39:39:a8:86:f5:1c:6c:33:1a:93: ec:c4:b3:8d:b8:ed:15:d6:0c:46:81:39:cd:06:42:17: 87:a9:b0:9d:47:c7:4a:af:2a:b7:83:6c:60:23:1f:91: c1:e1:0f:c6:55:7c:4b:fb:e4:61:a6:40:a0:71:9b:cd: 77:bd:d0:b7:2b:f2:13:b2:14:a7:99:c2:a3:7a:dd:f1: 86:98:9f:42:89:d0:5b:aa:4c:1b:61:42:8c:93:fd:8e: d1:14:f9:d0:3e:27:0c:70:6d:7e:90:7c:9d:0f:4d:a1: 73:2b:22:c8:e1:2f:fe:3a:91:5f:3b:ac:1b:c8:b8:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:a9:5e:50:78:ec:be:d3:92:66:ea:e1:03:a2:d4:e8: 22:42:59:7c:b3:6e:24:11:66:83:48:ca:6f:bd:a1:05: bf:3f:ba:1f:61:31:00:c0:70:d4:f7:55:05:75:ff:7e: 57:96:6c:5e:8d:5a:5e:5c:a4:9b:9b:da:90:c9:96:a2: 40:45:9c:67:a1:7a:fd:47:f5:c3:12:32:48:2a:5d:f9: cb:f2:57:f3:27:aa:bb:58:25:08:2d:97:01:5d:5c:ed: 62:4d:57:28:6d:97:8d:94:f0:e2:33:08:4a:ad:ad:bf: 67:61:fc:7f:b5:21:eb:ce:36:9c:c4:16:c7:cb:c4:cd: 3e:5e:4e:2e:53:c4:e0:cc:f3:8b:cf:39:27:f6:3e:57: ac:38:93:58:7f:08:16:54:aa:82:55:75:99:4f:89:c9: 3b:da:3f:72:2d:73:30:ab:ed:b5:91:05:7d:b6:24:96: ea:2b:37:f1:df:0f:ad:1f:27:9a:0e:2f:16:85:94:2d: bf:29:3d:3d:00:19:b6:77:62:d2:7c:e0:cc:d6:f7:17: 1c:61:e0:e5:40:a4:a3:8e:91:93:6c:18:d6:9e:c2:ef: e3:f9:dc:56:ed:67:7d:57:b2:59:1d:52:53:51:9f:43: 69:21:91:42:5f:af:2c:8f:7a:f1:4c:73:28:e4:3f:05 Fingerprint (SHA-256): EF:5B:FB:7D:37:E2:1E:E6:C8:72:48:B4:B3:8E:6A:B7:87:61:1C:F4:D7:34:84:5F:CE:DA:5C:FF:4F:22:F3:8F Fingerprint (SHA1): 73:43:E6:76:52:7A:80:13:C9:62:F0:6A:51:09:B1:97:CD:E3:49:3F Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7378: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #7379: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #7380: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #7381: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #7382: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #7383: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172428 (0x13bd4a4c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 17:29:05 2017 Not After : Thu Mar 31 17:29:05 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:0d:f8:7a:ef:46:f6:83:f3:08:a4:a8:f4:f6:d2:a1: d0:4a:3d:c8:11:20:9e:b8:a9:b3:1b:aa:5e:f7:07:0a: f2:bd:d3:da:7a:72:f5:2a:38:a5:30:6a:4c:4c:c2:fd: 34:e9:07:67:c6:cc:e4:49:75:5c:91:ea:cb:c3:e0:5c: 8d:98:f3:22:55:68:42:44:73:70:d0:98:e7:ff:bf:dc: 34:dd:39:14:d8:64:fe:b4:ff:3a:d5:a1:4f:47:01:44: a2:f8:b9:5f:e0:07:e4:99:dc:3a:18:2f:c1:6c:c7:39: 5d:c9:78:bb:83:a4:8a:60:50:5b:68:ea:39:69:34:6f: db:de:b3:f3:49:7e:a8:c4:fb:59:16:6e:06:52:fa:6e: 6c:90:2d:41:8a:a6:33:56:64:0d:6f:66:f4:d1:50:71: 4e:74:d4:af:27:26:d9:63:e9:61:e3:5e:da:f8:69:22: cc:48:2b:cf:9b:1c:9e:0e:1d:ba:27:20:b5:7d:6d:b7: 8b:9b:cc:6e:8e:25:b0:a6:8e:71:6a:09:2b:5a:ca:e6: dd:30:69:59:8d:1e:81:66:1a:c6:3a:be:aa:4d:5e:c4: 71:ce:61:17:34:f8:05:7d:f5:ee:fd:b0:60:6d:50:ec: 5e:05:ab:16:80:83:47:cd:c0:45:2b:23:89:c0:90:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:9b:70:f8:1f:3d:32:e4:f9:17:21:04:d1:59:2d:5d: 4f:cd:b7:de:c8:b0:dc:61:13:cf:7b:a8:3d:6a:2c:6e: b0:5c:05:fb:23:7b:7d:d4:14:30:b0:f7:7a:af:e9:5a: 61:bc:07:71:b9:3b:fc:89:fc:61:ad:97:2f:4c:54:f2: cd:a9:d7:80:7c:b4:62:59:ec:1d:29:e1:e3:cc:df:55: 97:61:39:fc:89:be:27:02:c3:9a:43:c2:3c:96:23:1f: 7f:22:00:89:6e:87:a8:b3:50:aa:3a:9d:fb:55:05:0d: 58:53:cf:bb:f8:ac:f2:76:68:69:d7:ee:cc:32:ff:b2: 1d:7e:00:e0:cb:0b:0e:71:52:28:13:a2:1d:78:72:a6: 17:11:85:40:f6:66:4f:bf:19:b0:a1:45:c3:1e:ff:97: 33:ef:6d:9d:eb:3d:0b:b8:7b:8d:bb:65:17:d8:b6:aa: 7a:7d:a3:4e:22:68:b2:6d:0e:5f:87:22:93:ce:c1:38: 9c:78:2a:91:de:ae:d3:80:54:ec:72:c4:fd:94:09:c9: 03:3e:0f:1a:19:01:1b:b1:45:8c:62:3b:ff:cd:18:79: f0:d4:57:8f:27:41:42:59:b0:67:cf:15:fa:21:17:cb: fc:31:ad:88:7e:08:d8:27:66:a4:e6:ab:cc:01:c0:dc Fingerprint (SHA-256): 80:48:50:FF:98:FA:6C:1E:FD:0A:CC:5B:E3:E6:A4:28:4D:85:0D:C8:1F:F2:D3:0C:1B:46:07:E0:93:FD:BC:06 Fingerprint (SHA1): 86:99:23:F9:59:BB:50:55:8B:5A:00:09:B9:69:25:89:B6:5C:46:5E Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7384: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172428 (0x13bd4a4c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 17:29:05 2017 Not After : Thu Mar 31 17:29:05 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:0d:f8:7a:ef:46:f6:83:f3:08:a4:a8:f4:f6:d2:a1: d0:4a:3d:c8:11:20:9e:b8:a9:b3:1b:aa:5e:f7:07:0a: f2:bd:d3:da:7a:72:f5:2a:38:a5:30:6a:4c:4c:c2:fd: 34:e9:07:67:c6:cc:e4:49:75:5c:91:ea:cb:c3:e0:5c: 8d:98:f3:22:55:68:42:44:73:70:d0:98:e7:ff:bf:dc: 34:dd:39:14:d8:64:fe:b4:ff:3a:d5:a1:4f:47:01:44: a2:f8:b9:5f:e0:07:e4:99:dc:3a:18:2f:c1:6c:c7:39: 5d:c9:78:bb:83:a4:8a:60:50:5b:68:ea:39:69:34:6f: db:de:b3:f3:49:7e:a8:c4:fb:59:16:6e:06:52:fa:6e: 6c:90:2d:41:8a:a6:33:56:64:0d:6f:66:f4:d1:50:71: 4e:74:d4:af:27:26:d9:63:e9:61:e3:5e:da:f8:69:22: cc:48:2b:cf:9b:1c:9e:0e:1d:ba:27:20:b5:7d:6d:b7: 8b:9b:cc:6e:8e:25:b0:a6:8e:71:6a:09:2b:5a:ca:e6: dd:30:69:59:8d:1e:81:66:1a:c6:3a:be:aa:4d:5e:c4: 71:ce:61:17:34:f8:05:7d:f5:ee:fd:b0:60:6d:50:ec: 5e:05:ab:16:80:83:47:cd:c0:45:2b:23:89:c0:90:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:9b:70:f8:1f:3d:32:e4:f9:17:21:04:d1:59:2d:5d: 4f:cd:b7:de:c8:b0:dc:61:13:cf:7b:a8:3d:6a:2c:6e: b0:5c:05:fb:23:7b:7d:d4:14:30:b0:f7:7a:af:e9:5a: 61:bc:07:71:b9:3b:fc:89:fc:61:ad:97:2f:4c:54:f2: cd:a9:d7:80:7c:b4:62:59:ec:1d:29:e1:e3:cc:df:55: 97:61:39:fc:89:be:27:02:c3:9a:43:c2:3c:96:23:1f: 7f:22:00:89:6e:87:a8:b3:50:aa:3a:9d:fb:55:05:0d: 58:53:cf:bb:f8:ac:f2:76:68:69:d7:ee:cc:32:ff:b2: 1d:7e:00:e0:cb:0b:0e:71:52:28:13:a2:1d:78:72:a6: 17:11:85:40:f6:66:4f:bf:19:b0:a1:45:c3:1e:ff:97: 33:ef:6d:9d:eb:3d:0b:b8:7b:8d:bb:65:17:d8:b6:aa: 7a:7d:a3:4e:22:68:b2:6d:0e:5f:87:22:93:ce:c1:38: 9c:78:2a:91:de:ae:d3:80:54:ec:72:c4:fd:94:09:c9: 03:3e:0f:1a:19:01:1b:b1:45:8c:62:3b:ff:cd:18:79: f0:d4:57:8f:27:41:42:59:b0:67:cf:15:fa:21:17:cb: fc:31:ad:88:7e:08:d8:27:66:a4:e6:ab:cc:01:c0:dc Fingerprint (SHA-256): 80:48:50:FF:98:FA:6C:1E:FD:0A:CC:5B:E3:E6:A4:28:4D:85:0D:C8:1F:F2:D3:0C:1B:46:07:E0:93:FD:BC:06 Fingerprint (SHA1): 86:99:23:F9:59:BB:50:55:8B:5A:00:09:B9:69:25:89:B6:5C:46:5E Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7385: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #7386: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172433 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7387: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #7388: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #7389: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172434 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7390: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #7391: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #7392: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172435 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7393: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #7394: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #7395: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172436 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7396: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #7397: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #7398: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172437 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7399: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #7400: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #7401: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172438 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7402: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #7403: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #7404: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172439 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7405: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #7406: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #7407: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172440 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7408: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #7409: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #7410: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172441 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7411: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #7412: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #7413: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7414: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 331172442 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7415: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7416: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 331172443 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7417: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7418: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 331172444 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7419: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7420: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #7421: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #7422: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7423: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 331172445 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7424: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7425: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 331172446 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7426: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7427: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 331172447 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7428: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7429: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #7430: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #7431: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7432: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 331172448 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7433: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7434: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 331172449 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7435: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7436: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 331172450 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7437: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7438: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #7439: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #7440: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7441: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 331172451 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7442: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7443: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 331172452 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7444: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7445: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 331172453 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7446: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7447: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #7448: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7449: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7450: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 331172454 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7451: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7452: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7453: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7454: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331172455 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7455: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7456: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172433 (0x13bd4a51) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Mar 31 17:30:27 2017 Not After : Thu Mar 31 17:30:27 2067 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:d6:98:26:56:16:de:27:eb:6b:b9:6e:1f:1d:e0:42: 64:6d:36:76:a2:43:56:7e:b2:12:88:5e:48:4d:f9:7e: 3c:b8:3e:4a:6a:4e:0c:6a:4c:a1:fb:db:05:d9:c0:49: 5b:56:19:2c:82:5e:82:96:78:0d:a5:2a:b5:1b:9c:c7: 83:53:5d:d1:c1:12:9e:09:2c:ab:45:4b:00:60:a1:71: 7f:5f:e1:0f:f2:55:16:b8:4a:16:3a:3d:51:5e:fd:e7: 7c:10:3a:ef:de:40:6a:a7:35:5b:f9:01:10:3b:e6:5d: af:63:3e:e2:62:42:ee:75:27:f1:ad:0c:63:de:08:a8: ee:58:3c:14:ef:6f:48:6c:a9:9e:88:ff:cc:98:94:05: 6a:aa:ba:b9:7d:ba:70:dd:5d:ad:a1:44:ba:c9:c5:9a: c1:c9:15:86:19:9c:29:25:6a:c7:2b:ff:0d:f7:b9:c7: 3d:15:85:10:fb:01:68:f4:74:f0:d0:38:1c:21:7a:f2: a1:35:8a:d3:8d:ae:28:bc:80:cb:6c:0e:ed:a7:63:6a: 92:f1:5f:a5:40:1e:bc:a8:29:27:ee:24:20:ce:9c:84: 72:74:24:8c:69:34:3c:3c:79:fe:da:e4:c1:8c:8f:9b: 28:93:42:df:be:d9:8a:c8:7c:81:22:f5:93:b6:96:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c2:fa:1e:42:84:1e:2d:4b:2b:9c:13:d2:10:62:ce:78: c1:24:c4:81:e8:93:45:48:63:f3:8b:2d:5b:1a:80:21: 9c:d0:8c:88:21:e3:da:91:5a:c9:68:b5:8b:67:f4:49: 42:74:3f:bc:43:2c:64:5e:05:26:37:63:9a:d6:71:bd: ca:05:99:45:df:94:2a:c7:35:75:90:87:3c:1e:4d:cf: b1:71:cd:22:b6:dc:7b:43:32:8f:5f:92:4e:36:62:20: f7:51:1b:23:4b:ff:73:c7:3f:ca:ef:32:0f:0d:6c:38: 99:c0:f8:15:1e:3e:35:09:25:05:eb:7d:59:af:0c:78: 45:e6:f3:57:3c:f8:d4:21:78:2c:7b:23:38:ab:66:ba: 70:8a:ac:47:82:b1:59:f9:9f:ca:c3:86:10:29:5a:9c: 2c:de:a7:08:5b:d3:c5:29:76:02:39:b9:69:20:91:a6: 82:08:6b:b9:05:76:9c:1a:df:b9:09:6d:96:90:91:dc: 3a:21:69:1d:96:13:53:94:03:13:71:bd:6a:39:6e:7d: 5a:b3:69:6c:79:5b:6c:6b:9b:0e:a1:db:06:37:3c:97: bc:fd:e6:7e:e1:1a:7c:fb:67:68:58:c1:a0:64:75:f3: 8d:60:a5:11:e4:f5:e1:50:9f:2c:26:39:09:dc:89:cf Fingerprint (SHA-256): 06:CC:5E:F6:63:5B:75:0F:91:20:92:E2:F7:8C:EA:0C:AB:54:5A:D4:50:92:32:51:F6:A5:57:A3:60:9D:E2:E7 Fingerprint (SHA1): 88:84:FC:2E:04:C6:A6:13:48:38:48:1E:4E:DF:9C:63:F8:6F:29:79 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #7457: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172434 (0x13bd4a52) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Mar 31 17:30:35 2017 Not After : Thu Mar 31 17:30:35 2067 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:3e:68:c2:5a:f2:26:a5:3e:e5:fb:70:bc:ef:9f:67: 77:79:7e:79:a1:5a:2b:b2:c4:53:46:f7:dd:25:f1:48: e9:84:48:64:d9:b4:d4:4a:c1:6e:08:47:e4:be:03:ff: 4f:67:82:73:18:55:a4:ae:de:22:6d:e1:54:21:0e:99: 04:32:00:ca:c5:39:ca:89:9d:f7:75:18:5c:5a:97:2f: 8a:bd:85:ce:4f:b6:32:f6:5d:f2:15:8f:42:b1:37:2a: 56:85:a2:4a:f8:52:cb:7f:ca:40:87:8e:44:10:b5:ed: 77:73:b3:c6:35:a2:8e:97:b8:42:f4:07:e0:45:28:ff: 70:5a:10:b2:93:77:77:29:6f:45:58:68:55:b1:cf:6e: 97:37:33:22:cc:b6:7f:98:98:9c:1e:5e:1c:8f:d7:ab: 3a:e6:ae:8b:e4:22:cd:88:a0:84:f6:fc:33:3f:66:57: 4d:2e:cf:fb:6f:48:12:71:f5:79:f7:95:b3:e6:3c:21: e7:1e:22:49:ea:92:f5:f4:dd:ca:8a:83:c9:44:2e:5e: 8c:75:a3:8f:2b:3c:61:e8:cc:ac:a2:97:04:fe:e5:37: 7d:73:30:1a:79:db:09:db:11:64:ff:a0:2c:2e:05:69: aa:fd:97:5f:72:df:45:91:2d:9f:17:6b:d0:a5:2d:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 99:a0:52:b8:73:ef:ed:16:a9:93:58:35:45:e1:93:ac: 4b:6c:ef:2d:b6:d2:14:5e:53:95:dc:e6:95:7b:c0:88: d1:e5:6c:d1:d7:4d:4a:8d:5a:1d:a6:52:5e:32:6c:7e: be:ad:28:0d:f8:7c:a6:bb:eb:85:65:69:f7:62:66:37: 24:0b:a4:d7:cb:a0:a2:94:b2:7b:05:ad:86:93:19:c9: 50:3c:42:82:5b:6f:40:b6:fe:86:c0:60:00:bd:06:24: 77:e9:46:3f:25:73:d6:08:39:c3:95:2b:0b:56:af:80: e3:95:de:79:40:96:0b:2e:14:e3:5c:61:35:c0:1a:85: a8:aa:4a:0a:34:2f:b4:13:a4:89:99:5c:f6:3e:c1:7f: f8:2a:5e:64:3d:49:ac:4d:3a:6c:3b:d8:b2:f9:80:de: 1e:25:e2:2a:56:ca:6f:c1:9b:04:65:8e:8f:1a:8d:d3: 5d:d7:0f:1b:32:75:d2:2e:59:92:76:7c:0a:ea:73:84: a8:c5:1f:3d:1a:c6:c9:49:f3:b5:30:63:b8:e7:51:b4: c2:5b:df:52:ef:4e:fe:ed:b6:88:f7:2c:06:8c:0a:b9: cc:a1:f2:94:5c:7e:da:1b:24:1c:9d:d3:2f:e1:88:b9: 50:a6:3c:39:7e:a5:f0:31:60:fb:34:56:1b:8c:47:15 Fingerprint (SHA-256): A4:F2:8B:66:06:D0:E1:35:E3:B3:2F:4D:85:C5:CD:72:F1:F9:9A:C5:CE:A5:CA:B8:1E:90:3C:D8:C8:7D:ED:85 Fingerprint (SHA1): 92:E9:DD:9A:17:50:B9:50:C5:8C:D3:7D:63:AC:C3:65:76:F4:3B:BD Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #7458: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172435 (0x13bd4a53) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Mar 31 17:30:44 2017 Not After : Thu Mar 31 17:30:44 2067 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:be:be:04:9e:cb:b7:44:de:9c:00:f5:5f:a2:a6:f8: 29:32:37:98:ec:1f:7b:e8:43:23:ee:8b:cc:b2:5c:cc: a2:5a:94:50:f0:45:cb:1b:3c:8c:b6:67:cc:0e:1f:6a: 05:b6:7e:76:bc:3b:40:6c:f1:0d:ba:4f:da:07:1b:5e: f0:31:52:23:19:a1:c8:39:83:ab:f0:8e:07:1c:ae:71: e0:dd:7c:52:e3:86:aa:3d:9c:13:13:4d:4b:78:18:90: 86:83:21:5e:99:b6:14:41:8d:6b:f1:dd:70:6d:c5:0f: 8d:69:40:7f:7d:5b:2e:01:32:e0:a6:b3:aa:ea:f9:8d: 49:e8:f0:03:20:fc:06:a1:6e:89:0a:d7:9f:be:dd:73: 33:3a:ca:f6:f0:07:69:a5:9f:83:b2:8c:46:67:3d:6e: 63:ef:3c:8d:23:bc:77:d1:ab:f2:92:6f:37:3b:41:17: 51:32:0d:86:84:72:89:93:90:82:27:74:62:42:73:cd: a4:c3:49:87:51:ea:9f:38:c7:48:5a:05:2f:a1:29:78: 1c:c3:68:dc:4c:8c:dc:aa:48:3a:b6:d3:d4:11:fc:48: bc:ba:32:44:6d:f2:5f:d3:6a:b4:26:16:33:81:0d:33: c9:e5:8b:9f:77:b0:ec:46:25:89:4b:59:4e:e3:21:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:eb:14:17:93:2d:7b:9b:d5:d1:ac:97:bb:dc:bb:7d: 52:18:83:e8:a9:34:44:65:4d:b6:a0:be:3e:96:a2:79: a4:50:7c:6c:f5:7d:85:6e:32:56:fd:4d:de:85:28:1f: c7:61:e4:1c:04:6e:f6:63:dd:3d:00:2f:22:7f:57:20: 8c:30:36:d2:1c:f4:2f:9a:b1:00:f4:1c:8c:51:a6:27: 7b:69:49:fa:58:ee:a8:e6:34:1d:cf:f5:50:68:cc:03: e3:e7:c4:87:f7:17:6d:9c:ac:13:bb:b0:ed:45:68:7f: 41:cf:7b:20:4a:90:51:1f:8a:76:fc:f0:4d:c6:6c:f7: bd:01:40:ea:e7:56:45:63:9a:c4:e7:f2:c5:58:ca:31: 4d:b3:98:4f:61:eb:73:3c:07:3d:e8:71:1a:e1:bc:b8: 61:6e:2a:36:b9:44:79:7f:9d:2a:5d:1c:8e:91:ba:b3: 50:14:a9:e0:a5:51:b2:2f:57:4e:95:d2:ce:57:56:72: fa:98:9c:d3:9d:6c:34:01:3d:b9:ed:f9:2a:37:3b:bb: 94:30:d5:ef:fa:36:2a:7e:c7:9e:2a:80:9e:ec:ab:ea: 15:dc:0a:8f:53:98:c9:96:2b:c5:e0:c7:8a:3b:a8:c5: 2b:26:b7:cd:bb:a0:d3:c4:c9:9a:ac:11:a3:9d:8d:13 Fingerprint (SHA-256): 25:A2:15:54:88:37:EE:74:32:B7:85:F2:4C:20:A7:76:AC:45:B0:C1:F6:2B:24:0A:42:75:C4:EC:B0:E2:5E:67 Fingerprint (SHA1): F0:4C:B8:08:32:36:3C:BC:15:7B:C4:1C:A0:F9:F6:0A:AB:0D:4F:48 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #7459: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172436 (0x13bd4a54) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Mar 31 17:30:55 2017 Not After : Thu Mar 31 17:30:55 2067 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:74:72:9f:95:b6:1e:1c:5a:39:9f:54:a7:93:08:5d: 1d:23:de:ca:0a:89:f3:e5:8e:9f:93:5a:b2:c3:4e:5e: ab:fc:31:83:e8:65:a3:2f:59:ff:ec:9b:ad:f3:70:da: 37:b4:b0:8c:d3:8a:bc:1e:72:39:21:1c:3b:f0:96:69: 80:37:ba:9b:bd:93:14:00:9d:a1:39:07:4a:f0:88:fa: 22:af:0d:fc:f4:e8:cf:15:ec:be:2b:0e:e4:ab:d5:4d: c0:f7:e6:f3:e1:5f:96:d5:e0:73:ab:c2:e0:b4:44:45: b8:cb:23:bd:05:76:f6:f6:68:48:76:3d:42:5e:35:3d: 83:a6:d4:52:1a:49:5d:8e:d0:1d:ae:ee:34:f7:e5:36: ff:c9:9a:0c:19:b2:10:20:35:9e:f4:65:a4:a1:b9:b3: b9:9e:9a:74:8c:47:4b:57:a3:62:b4:ae:99:47:f7:a8: f2:97:51:87:d9:21:3e:21:09:2d:0c:a4:3f:31:22:20: fd:ca:56:87:63:b6:e2:e3:5e:20:0e:24:e6:ec:9c:f8: 8a:6f:b9:e8:cc:02:bb:c6:d3:df:4f:50:d0:22:a0:66: d6:93:c6:4d:4b:29:78:f7:1b:47:1e:22:5a:0d:ea:0f: 58:b4:af:f7:37:18:b9:b2:49:d6:d9:58:de:13:18:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:d4:ad:e8:c5:48:7d:9a:a0:d6:b7:71:d5:b9:a9:fe: f1:98:11:bc:19:f7:10:95:be:e9:f0:f5:8f:07:e7:00: 13:d1:4e:ae:1e:64:b0:a0:eb:22:a2:00:2a:ed:9c:e8: 4d:7a:7d:f1:4c:2b:bf:e6:57:5d:99:ae:f3:01:a0:78: 4f:5a:ae:b5:57:64:c8:a0:51:c5:d3:a5:8a:04:8f:f4: d1:ce:f9:76:82:d9:b4:5b:aa:93:7b:9a:f2:77:4b:9b: 66:db:52:15:dc:38:aa:d2:0e:7a:7c:6e:1f:b1:a5:fd: c9:3f:98:4f:f0:5e:66:9a:4e:fb:77:50:99:81:2e:9d: 0c:be:86:54:b7:a5:c0:d9:7a:9a:11:ed:69:b4:9a:30: fe:a7:96:0a:bd:5a:e7:67:05:53:9e:6e:19:4c:ba:71: aa:27:32:4e:89:cb:d0:d0:68:64:f3:67:51:65:f4:86: 6d:07:b5:d4:8d:ff:15:5a:7c:7b:ec:cc:d1:29:99:e7: 30:65:57:72:52:b2:ce:e1:7d:d8:41:b3:21:16:32:f7: 96:8b:52:83:f7:a0:ed:dc:eb:4a:58:f9:60:42:9b:02: 26:82:32:a9:fb:cd:3e:69:fc:80:d2:86:70:87:39:ab: 92:c4:34:5a:5c:e2:f9:3d:7a:de:95:4d:91:ac:96:73 Fingerprint (SHA-256): 13:ED:67:ED:A9:9F:6B:E3:F7:60:87:5F:36:F5:D2:5B:2C:E4:BC:2B:8B:97:F6:F1:E7:EF:08:B8:0C:2C:E0:40 Fingerprint (SHA1): F2:44:7C:BF:08:57:C0:7D:E3:6A:2C:4A:8F:49:0A:18:AE:EE:76:57 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #7460: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172437 (0x13bd4a55) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Mar 31 17:31:09 2017 Not After : Thu Mar 31 17:31:09 2067 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:f4:37:a1:ee:3c:71:a2:6d:56:33:41:4b:8b:80:9c: c6:9d:19:a5:2b:83:5e:b0:c5:95:37:a0:64:d1:e8:4b: 85:86:c3:61:bc:87:c8:42:1d:c7:63:48:51:b0:5a:97: ee:ed:fb:54:d3:39:e2:9e:f6:88:b2:f4:63:61:ba:eb: bd:5a:6d:ca:59:d4:f4:c5:1a:56:72:f4:15:12:59:61: 5d:c4:d6:95:a8:82:31:24:9c:f1:cf:2b:20:ce:f7:88: f0:7c:b4:03:7c:6f:e4:ab:d3:0f:35:07:35:49:42:c8: ff:7d:be:11:e1:49:de:39:85:1e:52:78:a7:5d:de:57: 19:77:38:b7:b1:59:62:1b:20:34:e0:8f:0c:c4:1e:c8: 1b:ac:6d:ae:98:6f:ae:1d:48:ce:b4:5a:5a:3c:9f:d3: 87:e1:0b:a5:aa:f2:a9:28:a8:ca:48:39:89:b6:fd:ee: 5e:9d:b9:ba:7e:59:5b:63:22:1f:e2:35:e5:5a:98:fd: 95:e2:72:88:1f:dc:fb:10:58:54:2a:d3:18:d8:46:71: 5b:7c:33:41:3e:0f:ce:c8:15:89:33:ed:7d:81:88:1a: b8:ed:d7:2f:ec:0a:38:42:91:7b:c3:4f:fb:63:6f:e7: 3c:69:7f:f1:9c:77:34:73:d5:86:29:02:0e:d6:68:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:0f:23:c7:4f:a1:70:ba:4e:32:62:e1:75:2b:fb:77: d6:2f:e1:83:17:fd:31:75:a0:eb:cf:a5:7e:8d:63:b4: a2:c9:76:a5:3a:e8:00:9f:48:46:57:a8:4b:bb:a6:31: 9f:db:68:90:9d:02:31:8d:55:80:d0:8f:20:85:42:6f: 4b:f2:5a:46:1c:e1:e8:39:21:40:e9:81:55:cc:e3:5a: e8:58:c7:08:6a:83:31:85:8d:7c:c7:5c:7e:41:8a:60: 9d:fd:5b:01:d0:3b:45:c1:e3:4b:fa:d9:d5:dd:3c:f0: 41:13:4b:17:d2:9e:6f:5f:d0:43:f5:74:7c:a7:08:34: b6:6b:ca:bb:5a:a3:36:43:45:e7:18:38:5c:53:dc:1c: 5d:c0:75:ec:f5:91:ab:3a:17:cc:a7:f1:fa:d0:84:a0: 12:ef:2e:3e:4b:3e:5e:5b:d1:a9:6e:ae:f1:b1:b4:79: e8:b2:9e:c1:4c:a3:45:b8:a6:9a:24:ae:f9:b3:9e:65: 11:16:80:50:dd:0a:97:47:a8:29:cf:7b:8b:56:b7:9d: 98:ec:eb:6e:f0:7b:8a:48:20:4b:15:b8:2f:d2:72:cb: 66:51:95:00:b9:78:34:f1:87:de:a6:98:a7:63:5d:54: b5:8e:30:51:c8:25:12:3c:5c:fd:ea:8c:07:1b:79:86 Fingerprint (SHA-256): 08:50:32:F7:4C:DB:14:89:96:6D:0A:EE:41:2B:14:5F:60:74:BA:0C:2A:35:97:04:9B:55:1C:F1:C6:61:AF:E6 Fingerprint (SHA1): 92:52:4D:37:BF:3E:D1:DF:B9:21:D0:F2:6E:29:A4:CF:E6:5E:8F:46 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #7461: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172438 (0x13bd4a56) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Mar 31 17:31:29 2017 Not After : Thu Mar 31 17:31:29 2067 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:97:10:0a:e2:f2:8b:29:b3:05:73:f7:44:a6:e0:c3: 81:de:0f:b3:51:11:f3:b1:03:f4:a7:99:d3:55:08:5f: 1a:d7:c0:45:5d:36:2b:a4:af:a1:4b:f2:b5:c9:5d:41: ea:7b:a4:11:e5:7a:cb:df:af:33:12:ea:13:5f:2e:96: 10:f3:2a:3e:80:67:07:ac:9b:4d:cf:d4:5c:90:92:1c: 58:bb:4c:b9:46:24:a0:44:8e:23:ad:e6:6b:35:e4:01: dc:53:40:64:6a:28:20:d6:36:1e:db:d1:ca:ec:b6:fe: b7:c0:71:cb:00:fa:ad:97:bb:41:de:59:81:f9:fe:9d: 23:13:5e:12:d7:c3:85:6e:85:2c:df:2d:ea:19:b9:eb: eb:fb:7b:f7:05:ce:43:1d:7c:20:e7:1f:9e:e8:26:cf: cd:fc:94:60:5e:7a:f0:f1:58:ef:6c:da:fd:ec:13:74: 6d:71:ae:bb:14:84:41:97:a2:cc:47:80:04:4c:cc:10: 2a:c2:81:26:1e:e6:c7:d4:c6:42:ba:cf:f8:d0:fd:30: 49:84:86:25:20:c9:f4:dc:e6:61:80:14:92:16:f9:f4: 1e:0c:64:e5:81:a0:21:cd:71:15:7d:9d:15:65:f0:e6: 46:a6:97:37:44:57:97:84:4b:78:b2:2a:98:f1:80:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a3:35:41:58:de:79:7e:c6:d0:e0:01:dd:02:2a:45:1b: e9:3d:6d:50:3a:5f:cd:c1:c5:8a:06:52:a3:eb:a4:97: 5c:42:11:ce:25:3d:1b:2f:73:87:a9:20:32:60:21:44: 1d:7b:64:e3:20:76:62:7c:28:ac:88:28:48:d4:f3:89: be:71:49:14:15:79:1e:83:16:ce:b6:34:9d:d4:bb:62: b6:50:bf:c5:3d:20:a5:ab:7d:d9:b4:e0:80:a4:25:b4: 10:5a:72:fa:30:b3:92:a4:40:90:11:14:12:5c:c1:0d: 8a:8c:f9:59:24:3b:99:1b:1f:8c:58:33:da:4a:e7:c9: 85:b0:11:4d:ee:93:4a:5a:13:17:08:39:6f:0c:6c:dc: fd:0d:a8:27:b3:f5:8e:1c:c2:60:4e:2b:8b:b7:0c:78: ff:e9:47:21:a6:44:6d:f5:d8:40:43:38:9f:35:1e:30: da:22:fe:58:d5:47:78:90:b9:4a:9c:e0:b0:0b:22:0f: a5:f9:4c:39:14:5a:f5:b3:f6:a1:1a:d5:a8:99:84:06: 0b:2a:a6:da:f6:72:d9:f0:58:bd:f1:f0:cb:00:b3:6c: 40:8e:e1:01:a0:96:15:5f:98:94:ee:bb:d8:b2:9f:07: 16:38:23:cb:90:39:5d:1b:00:b3:31:37:af:d4:d6:f9 Fingerprint (SHA-256): F3:03:9C:66:3C:D0:0F:F8:EB:3C:A6:CD:C5:3C:CD:82:96:27:CF:A1:7D:7C:4C:72:20:46:C8:2B:53:1E:5C:A7 Fingerprint (SHA1): A1:87:0D:2C:A1:D9:CF:D1:B4:DC:9D:D0:26:CB:D6:FA:BB:18:F6:90 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #7462: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172439 (0x13bd4a57) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Mar 31 17:31:38 2017 Not After : Thu Mar 31 17:31:38 2067 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:06:7d:f7:6f:70:95:ca:cb:a2:34:b8:21:92:74:43: 49:e6:66:9e:c4:2f:18:16:4e:b3:0c:e9:c2:68:56:dd: 12:1a:a6:25:a4:71:28:c9:e8:96:a9:e2:08:b5:e9:fa: 77:da:4d:88:ed:75:70:e6:aa:d4:cc:9e:a3:13:f3:a8: 61:53:85:99:73:b8:2a:cd:fe:0b:c1:a5:9a:80:1c:b8: b5:69:af:de:7f:4d:00:d5:49:e3:a4:a8:cb:54:b5:d6: 40:07:54:64:46:1c:c3:f4:0d:73:48:ba:a8:5d:13:61: ad:b9:a8:74:c9:06:3a:b9:7c:40:f4:62:e1:32:3a:07: 8b:5a:70:e2:a6:87:14:24:32:d2:24:a0:fb:c1:21:51: 05:41:8d:c9:3f:97:61:01:ce:0f:2e:c2:cc:db:40:ab: 76:d9:33:a2:67:a2:44:94:79:3e:a2:21:b3:da:6b:73: 7e:64:c0:a5:f9:19:4b:99:c1:8b:c7:d5:21:82:94:58: fb:8c:3c:b1:ea:c9:bc:30:5e:04:ac:82:74:e7:dc:2f: 12:72:e3:16:6b:b1:02:e0:f2:f8:2a:60:bf:1e:3d:44: d4:ad:db:f1:6d:4b:18:ad:9f:02:4f:4f:c4:81:76:42: 88:13:fa:c1:0f:15:1a:50:7f:13:70:2a:7f:d2:a3:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:a6:24:2a:76:f3:be:bc:7f:77:88:a8:bd:ac:8b:85: 20:4a:e1:ed:91:1b:07:d9:dc:73:2d:a0:74:e3:74:f4: fa:58:58:0d:97:84:f5:01:ef:aa:69:58:68:46:99:c9: 18:bc:cd:e8:69:63:e2:c3:7d:4c:f8:38:0d:40:2d:8f: 19:05:e8:90:30:50:b1:c6:43:38:56:0d:c6:e1:9b:9f: c5:37:0c:5a:51:2a:c8:88:b0:29:56:34:07:62:1c:e3: 5b:03:4e:ea:a8:3c:8e:65:25:fd:95:68:de:2c:87:c7: cd:15:2e:8b:fa:4b:64:c9:b5:d3:ee:0f:e6:b3:4f:56: b0:84:6d:31:20:e1:cc:49:91:ac:55:06:d8:3e:4f:58: 09:96:1a:fa:db:29:99:8b:63:56:41:8c:21:92:de:f6: d0:8d:a6:67:d6:b6:a2:17:4d:ba:70:ad:5b:1d:1b:79: 71:43:ff:67:05:84:bf:17:b3:7d:c2:38:cb:18:13:6e: 61:d8:2f:2c:ca:1a:98:a1:3b:4e:b2:dd:2b:e2:87:84: 7f:25:59:2f:ad:39:a1:bc:f4:7c:f6:8b:0c:e0:01:d3: 61:ee:b5:42:8a:72:c4:5d:ff:90:1d:04:b9:52:c2:2d: f1:48:27:07:93:8d:ad:12:7b:42:ff:c7:7e:dc:a5:26 Fingerprint (SHA-256): 1E:CF:E6:C3:90:B8:56:C1:A9:80:F7:4C:1E:C9:9F:2E:5D:AD:90:E8:39:4D:70:97:18:3F:7A:73:2D:EF:05:20 Fingerprint (SHA1): F0:F0:D7:19:49:93:CE:33:2F:FA:27:1A:78:D8:1D:9A:FA:EE:DB:B2 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #7463: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172440 (0x13bd4a58) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Mar 31 17:31:45 2017 Not After : Thu Mar 31 17:31:45 2067 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:7f:df:fa:fe:46:69:c6:22:63:d1:59:a0:32:fd:72: 8b:fb:ad:a3:d4:92:07:ee:54:7e:53:0c:bf:45:a0:36: 51:05:7a:52:03:a1:30:a2:6a:5c:1d:ef:49:34:4c:63: e3:49:dd:27:48:89:ae:29:69:a3:a9:a2:fd:14:9a:6e: 3d:07:c1:4c:f2:bd:c5:85:31:d6:cc:a0:e6:b9:0a:2e: 7f:07:c7:13:3b:ec:e7:88:95:92:95:86:ec:2b:a8:e9: ee:9d:2d:68:82:da:25:78:f8:76:eb:f7:6e:48:f6:8b: 91:57:f9:f7:ce:45:a4:7a:3a:d1:f4:6d:98:23:8a:4e: bb:ec:97:6f:f1:91:56:d1:87:39:9a:73:e2:d9:78:d2: 21:36:3c:2c:f3:e8:c8:0e:6c:b1:be:24:d0:15:ce:18: f3:c7:b9:83:5f:2b:ac:0e:b5:e1:ca:09:c0:ec:12:9b: ee:12:b7:dd:3d:85:77:1d:a8:29:1d:32:5e:a4:b4:d2: d1:b6:2d:6a:11:3f:25:e4:88:f9:de:0c:ad:b7:ed:4d: 38:39:63:58:80:1a:3b:be:5d:1e:5f:92:11:0c:df:a4: 11:cf:c8:12:35:7e:98:34:91:01:3e:b2:b5:09:14:07: 8e:56:e3:53:a4:6a:3f:8a:26:f1:10:31:29:a4:36:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 17:fc:62:50:b1:bb:29:95:0d:0e:07:93:b9:e4:c0:9e: 34:80:12:5f:ba:72:1c:7e:78:83:af:9b:ea:4f:fd:cb: 6e:a8:d4:0b:db:61:cc:0e:4c:95:44:f7:12:a9:25:53: 7b:aa:63:5e:90:20:db:68:cd:75:40:4b:02:f9:18:d7: d1:22:ba:f7:d4:b8:ab:dc:ac:67:fe:96:6b:6d:58:23: a4:58:93:57:f5:e8:e6:ed:ce:f9:47:9c:73:09:72:4f: 48:13:18:03:4d:f5:c2:64:09:72:4a:c7:88:0f:ef:93: e9:4d:37:38:91:13:ef:14:59:e5:fe:98:06:c3:5f:41: 12:f0:06:f3:7d:2f:e8:d6:1d:f6:e2:29:e8:68:02:e4: 9c:b2:5c:7a:3a:c1:95:30:1e:7c:d3:03:6e:54:a8:18: 0b:cd:b9:f7:e0:ff:d7:13:b1:ba:e7:3b:8e:a4:f3:d4: d4:92:94:5d:ab:e0:25:2f:d1:04:c1:b4:12:f4:17:00: af:eb:04:72:3d:6e:67:de:1d:e3:03:2b:72:11:31:02: 60:10:43:75:ce:34:ee:85:a9:89:73:a1:fb:ee:db:71: 6d:ab:bb:75:97:41:43:4e:f2:75:c1:d5:07:44:74:73: ab:70:f3:a7:11:81:5a:43:3e:38:5f:be:37:e6:55:19 Fingerprint (SHA-256): 9B:29:64:9F:66:CB:7A:53:F4:3F:15:26:11:CD:CA:D9:86:FF:AA:C2:EE:1D:F4:87:6E:3E:50:79:77:CD:97:39 Fingerprint (SHA1): EE:B7:50:E0:26:C8:B2:B5:59:5C:1C:30:84:75:A1:7B:7E:E8:3C:CC Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #7464: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172441 (0x13bd4a59) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Mar 31 17:31:49 2017 Not After : Thu Mar 31 17:31:49 2067 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:0e:54:5b:3f:69:2a:a0:71:e6:9a:9b:43:44:eb:ab: d0:de:67:91:1c:f4:4e:ec:e4:a6:91:06:a5:3b:66:e7: 8a:5d:33:65:20:2a:11:dd:9d:04:a4:5e:07:98:51:56: 12:cf:15:c2:d4:8a:d3:1e:9c:77:45:c6:e4:69:95:05: 7d:7e:70:0f:42:c1:57:c0:8c:88:b9:68:cf:2b:d5:b4: 50:bb:6f:5e:cd:11:aa:b4:06:39:76:ce:c5:47:ed:ae: fc:ef:0a:f2:16:68:84:76:59:e5:71:3a:ac:44:17:45: 01:a6:66:c1:a8:b8:a0:1b:cb:02:03:01:62:a8:32:83: a3:9b:34:19:b2:bb:de:20:f4:ab:3a:dc:44:bf:a7:39: 2e:38:10:92:26:58:f3:49:73:5e:ad:66:c1:00:80:a4: d2:f2:47:68:42:a2:e3:48:f9:e4:71:14:74:9b:eb:03: 62:7a:74:b4:37:c7:87:84:d9:84:6e:d7:ef:74:6f:fd: 6b:4a:eb:f5:2a:95:9f:a9:60:cf:26:c8:5c:69:34:8d: 3d:46:f5:d6:32:50:57:90:84:fc:a0:cc:e4:d7:cb:36: db:97:e2:2e:8e:89:af:34:64:73:da:b0:22:a4:6d:2b: d6:92:8b:e6:0e:da:82:15:5c:6b:b3:0b:78:00:f0:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:cb:7d:28:89:81:40:74:09:98:34:53:7f:3d:62:b5: 29:e7:aa:85:7b:d9:7c:21:3c:6d:2e:11:9b:63:c1:53: 1f:a7:56:51:1d:21:38:90:89:09:1a:90:09:59:29:d7: 59:33:27:68:a7:ab:70:af:ad:8d:24:ae:24:22:94:86: b9:67:4d:12:79:b7:01:10:71:4f:ef:93:f3:8e:47:6a: 71:a7:02:5c:0d:87:d0:c6:b2:ec:a6:3b:44:44:fc:dd: dd:10:71:e4:33:56:71:d5:a3:f2:64:37:ac:16:8d:bc: 10:9d:4a:ca:b4:6f:19:fb:e4:5b:d3:cc:2a:cd:9d:c8: c1:80:a0:f2:4f:88:a2:0f:26:2e:c7:2e:16:a2:96:51: 51:c9:ad:a2:f0:8c:7c:71:dd:a3:f3:da:a6:62:b3:3a: 91:b4:aa:1e:86:4a:8b:48:52:74:01:00:b4:9f:ed:13: ac:1f:ff:70:70:d1:bc:b9:ea:ce:21:17:14:e2:4e:fd: 07:7c:fc:60:9f:c8:d0:21:b6:9a:98:28:b6:6b:7d:07: 29:c3:e6:da:79:74:e3:85:a1:67:61:2c:02:e9:14:7f: ac:ef:98:5b:63:ce:69:2a:14:ee:8d:fa:9c:e3:16:f5: a5:34:f9:89:7e:f0:2a:cd:4a:5a:bc:02:d4:e5:d6:98 Fingerprint (SHA-256): 5F:60:DA:11:35:5D:84:D6:70:F5:B2:12:74:E2:39:DD:02:FF:2B:20:3C:E6:D8:57:59:05:E6:F2:CE:35:72:C3 Fingerprint (SHA1): 6B:5D:86:D1:B1:1C:D6:55:D1:00:68:03:0A:7C:19:EB:04:4F:8A:A3 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #7465: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7466: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172456 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7467: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7468: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7469: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7470: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331172457 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7471: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7472: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7473: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7474: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331172458 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7475: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7476: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #7477: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7478: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 331172459 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7479: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7480: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7481: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172456 (0x13bd4a68) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:33:05 2017 Not After : Thu Mar 31 17:33:05 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:11:03:80:b3:fb:84:7e:9d:d8:12:ba:bd:7e:8f:52: 2d:58:05:0e:9f:a7:3f:75:e5:b7:94:9d:88:9a:29:69: 4b:cd:21:c2:70:f6:55:bc:cc:a2:83:e2:ee:5e:85:22: 2f:47:48:32:45:99:77:fe:f0:9c:ba:c0:c9:dd:6a:0a: d0:9f:04:47:3d:f1:bc:ba:9d:e1:35:d7:b9:06:57:1b: 80:de:8c:5b:d5:77:64:8d:fe:92:c9:56:06:0d:ef:1a: 09:38:df:a6:a6:93:84:c3:41:84:52:b0:56:cc:9e:f8: 64:58:df:3d:18:27:c3:67:0d:b4:8a:e0:7f:72:ef:1d: 71:9c:88:fe:91:2a:19:6e:24:e3:0b:5f:7d:7c:22:5c: fb:bf:69:04:55:ae:35:25:29:70:48:9f:db:45:8d:06: b2:7b:e8:59:bf:88:a8:5b:00:a1:50:69:94:63:b9:a5: d2:4e:92:59:cc:06:89:ef:cc:ce:7b:74:56:56:e4:d1: 50:c3:9d:18:44:7f:0b:3d:b3:ba:77:f3:f8:cd:3b:58: a5:97:95:e1:e3:da:73:6f:05:6c:88:b9:57:e2:5a:a7: 5e:fe:9e:26:84:e7:40:78:2e:37:d6:68:27:b8:ca:f9: ac:2e:b6:ec:0a:4d:c0:71:e6:f9:c8:52:28:64:3d:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:a2:bd:0b:f4:38:9d:cd:66:59:68:14:e0:70:d4:e5: 93:93:7c:81:f6:af:6b:f9:9f:4f:c2:4e:05:54:3f:e0: f4:f4:27:c0:82:52:a7:dd:bf:3a:8b:05:cd:61:9f:8d: f6:68:97:b8:f5:c6:79:7a:c9:16:53:41:d4:16:8e:c5: ec:81:1d:88:75:3f:78:3b:d4:7b:7e:bd:50:20:f8:d0: 73:aa:21:d9:38:09:69:92:8d:30:67:01:d9:f1:2e:e9: 49:e3:d1:95:5f:db:68:c1:b5:4d:41:34:2c:a9:7c:f5: 7a:9a:37:34:e9:2c:ff:1f:a5:e4:39:a4:6a:04:2c:39: 9c:18:7a:bd:e9:be:e7:0c:fa:49:8b:61:2b:83:e4:00: db:8b:1b:b8:cb:27:be:6b:93:51:3b:25:0a:44:78:e7: 14:22:50:e4:9a:70:ff:8e:28:9f:fe:45:e4:62:2a:2d: 90:b3:8b:f5:94:04:3c:2d:56:9e:5a:30:72:5f:c7:be: f7:6c:5c:fc:0f:91:f1:e6:01:63:da:b2:03:11:85:42: 77:6d:18:83:19:b3:b8:49:91:4c:05:a5:88:38:01:10: 49:22:32:d5:0f:e4:c3:f0:d3:3b:03:d1:71:c2:1c:ab: ce:72:45:2b:0e:74:b0:bc:23:b9:17:aa:a9:95:1c:05 Fingerprint (SHA-256): DD:3F:B6:B9:3C:69:4A:02:5C:DD:D8:5D:B2:DF:5D:23:7C:BF:7D:84:85:8B:7D:03:41:96:2E:DB:42:2E:81:49 Fingerprint (SHA1): 1B:B5:9A:01:EF:10:F9:1A:BD:3D:8B:5A:9F:0D:5D:EB:16:BD:61:DE Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7482: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7483: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172457 (0x13bd4a69) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:33:17 2017 Not After : Thu Mar 31 17:33:17 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:d1:a3:78:b4:1a:c7:4d:63:0a:2f:96:16:a3:18:13: 57:a9:b7:22:6d:28:91:ae:b4:00:dc:09:10:76:48:16: ad:b5:ec:5f:18:8a:d3:48:59:9e:8e:38:e9:13:6f:3a: b2:df:c2:e2:6b:6a:9c:3d:a9:7d:74:f6:81:34:61:43: 94:cd:f7:e5:38:ed:3d:90:52:6d:0c:e9:3b:36:83:72: e9:47:43:16:73:e3:7f:7e:3e:70:d7:b5:96:c6:db:dd: 41:38:fb:5f:34:e9:53:48:e2:0b:4f:6a:af:0d:28:50: 72:80:6d:1e:a3:54:1c:9a:13:13:d9:6d:d9:b2:8d:f8: 35:59:24:0c:7f:6a:cd:04:eb:a1:70:63:4c:81:67:56: 04:7c:ea:5f:75:d6:f3:cc:f7:16:3b:fc:8c:33:ec:e7: cf:b5:8d:e9:47:ac:c5:90:cb:89:0b:d4:6c:2d:b1:40: 55:7a:e8:84:08:31:68:f0:a1:62:94:00:cd:99:d8:8b: b6:de:2c:67:2c:f6:59:13:f1:8d:74:5d:20:b7:e7:49: f9:fe:a1:90:82:c1:1f:6a:7d:90:21:f2:0f:52:27:9b: 65:55:e3:74:6f:0d:0b:e5:7a:f4:27:79:cb:a4:02:2f: 56:87:7d:74:2e:53:aa:ca:b7:50:09:59:41:d5:6c:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:c2:6e:9b:ed:4c:ca:9f:8d:33:d8:30:4d:02:eb:e9: bd:d3:a3:b2:b7:c3:29:b7:21:26:03:56:68:b0:a0:df: a5:ac:80:74:8d:5c:62:76:3d:19:98:52:30:9b:78:59: b4:af:3a:fa:7c:9f:2f:5d:04:21:04:5e:7b:36:f9:16: 1f:92:57:33:c6:2e:8d:d3:0d:fe:15:b0:32:c8:7a:14: 91:8f:72:57:49:b5:66:1e:7d:97:98:9e:3e:9b:ab:7c: 97:33:e8:06:9c:e5:31:71:87:b9:99:a8:fb:d6:fa:f3: a6:c7:1c:40:00:3f:9f:11:0b:e5:a2:1c:2a:11:b0:fc: 14:01:22:73:50:e5:84:1e:18:b3:ec:b4:f5:f2:f5:1e: 47:ac:ae:f2:5d:57:05:77:43:4d:a0:64:49:e7:2f:42: ca:41:de:a7:a2:41:e4:60:9d:12:ba:fb:3c:06:2f:7c: 7d:5e:70:ac:2d:a8:02:45:aa:b1:39:a7:5f:92:d6:66: 1e:18:90:8f:67:fb:b1:75:3a:1b:f6:8a:77:c0:71:ae: 52:26:1c:a9:e1:53:65:30:1b:9b:b2:f1:9d:4c:3f:ed: d2:b0:39:fb:52:a7:46:68:ab:12:96:5b:90:ec:67:4f: 9e:f2:d4:e2:99:c2:e4:a6:9e:5c:bc:3f:ed:37:5a:a2 Fingerprint (SHA-256): E3:BB:AD:5E:EF:DC:8E:AC:59:BD:BE:8A:0D:40:7D:5A:E7:4B:B9:59:28:4F:07:68:DE:E2:28:83:F0:0A:F6:4C Fingerprint (SHA1): 29:36:60:D6:AE:84:5E:BB:9F:08:82:D7:22:8C:8E:1A:5D:0C:51:0A Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7484: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7485: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172458 (0x13bd4a6a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 17:33:20 2017 Not After : Thu Mar 31 17:33:20 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:65:03:bb:66:b0:89:65:70:62:c5:6a:21:4e:77:91: b2:8f:74:d3:03:d8:4b:3f:ad:b0:b3:bb:fc:31:5a:5f: b5:0b:a5:fa:a0:7a:e6:24:1e:b8:ce:7c:a0:e8:6b:a0: c6:14:ab:00:92:1a:b2:88:27:3e:d4:eb:6a:36:f6:b5: d5:60:3f:2d:f4:06:08:07:5c:9b:b9:a0:1e:4d:19:cf: cb:84:a6:fc:20:d0:e5:e7:3d:a0:46:2c:a6:c8:dd:07: 74:f1:ed:92:a7:73:0c:74:df:1d:40:06:77:41:c0:69: a7:33:9b:fe:0d:5f:c5:ce:4b:69:f5:e7:8d:ea:cb:d5: 59:03:c3:f1:fe:d2:f7:50:89:2c:84:8e:b6:17:0c:49: 77:3c:30:ad:94:b0:77:b5:98:65:e1:03:ae:84:1b:6d: 84:56:a7:31:c5:34:82:dd:0d:98:c4:c1:19:29:5e:55: c8:e6:04:32:54:b4:36:16:31:2b:58:08:c0:47:c4:da: 9a:89:73:8b:c1:31:67:ca:7a:07:97:94:00:af:f8:a8: a3:2d:38:50:13:02:26:ab:04:ab:e7:6d:16:8d:a0:b4: 4f:69:57:06:5f:b3:e6:f9:47:e3:93:e1:aa:32:98:6b: de:bf:db:24:fa:69:0b:5e:8b:f0:65:e4:79:8a:50:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:63:24:25:9f:7e:0a:09:90:02:c5:01:bf:21:8a:19: 4c:01:f1:a4:72:b9:6c:0b:8a:a4:07:f5:9d:b2:70:6c: 4e:6c:e3:f7:ec:dc:56:61:79:64:01:f8:2c:fe:c9:43: 47:a6:d1:e1:22:cb:e2:e5:75:86:9d:28:ac:07:2a:75: 52:fd:e9:13:54:55:95:8e:4c:6f:fa:bb:ef:09:c4:f0: 20:ec:86:70:86:6d:7d:91:74:6c:be:78:65:7c:1b:ed: f8:07:91:71:0c:cb:74:98:62:16:59:df:49:fb:80:ad: 6f:a2:a5:c1:af:16:ac:4d:da:72:ef:eb:16:a3:a3:80: 79:a7:9d:42:10:1e:25:3a:a1:d9:7d:7d:85:cc:98:7c: 14:54:47:11:a5:ea:fc:f0:6e:e5:f6:cd:2a:71:ad:6d: e6:94:0d:15:2e:92:68:78:e9:3b:3e:65:f0:20:21:1b: 0f:ea:ab:a2:00:1e:7e:d6:26:49:c3:a4:0b:07:a9:0b: 67:44:e2:cf:90:96:bb:b7:7c:53:bd:41:cc:13:9a:a4: 6c:7a:46:cb:01:9e:77:56:2d:7c:2b:34:2e:a2:b5:55: a8:60:c8:31:64:84:0f:9d:60:58:84:29:5a:66:9f:92: 31:9b:07:ab:e4:0c:40:98:dc:0f:42:2a:28:a7:17:eb Fingerprint (SHA-256): B8:EE:D6:57:E6:D3:8B:4D:D2:DD:62:BA:D7:AF:4D:9D:FB:06:0A:B7:3D:91:9E:D3:54:89:25:C3:30:22:E7:38 Fingerprint (SHA1): 0E:A3:A9:C1:BE:EA:40:D5:66:B9:3B:FC:FB:66:54:AE:95:14:6A:1C Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #7486: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7487: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #7488: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #7489: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #7490: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172456 (0x13bd4a68) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:33:05 2017 Not After : Thu Mar 31 17:33:05 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:11:03:80:b3:fb:84:7e:9d:d8:12:ba:bd:7e:8f:52: 2d:58:05:0e:9f:a7:3f:75:e5:b7:94:9d:88:9a:29:69: 4b:cd:21:c2:70:f6:55:bc:cc:a2:83:e2:ee:5e:85:22: 2f:47:48:32:45:99:77:fe:f0:9c:ba:c0:c9:dd:6a:0a: d0:9f:04:47:3d:f1:bc:ba:9d:e1:35:d7:b9:06:57:1b: 80:de:8c:5b:d5:77:64:8d:fe:92:c9:56:06:0d:ef:1a: 09:38:df:a6:a6:93:84:c3:41:84:52:b0:56:cc:9e:f8: 64:58:df:3d:18:27:c3:67:0d:b4:8a:e0:7f:72:ef:1d: 71:9c:88:fe:91:2a:19:6e:24:e3:0b:5f:7d:7c:22:5c: fb:bf:69:04:55:ae:35:25:29:70:48:9f:db:45:8d:06: b2:7b:e8:59:bf:88:a8:5b:00:a1:50:69:94:63:b9:a5: d2:4e:92:59:cc:06:89:ef:cc:ce:7b:74:56:56:e4:d1: 50:c3:9d:18:44:7f:0b:3d:b3:ba:77:f3:f8:cd:3b:58: a5:97:95:e1:e3:da:73:6f:05:6c:88:b9:57:e2:5a:a7: 5e:fe:9e:26:84:e7:40:78:2e:37:d6:68:27:b8:ca:f9: ac:2e:b6:ec:0a:4d:c0:71:e6:f9:c8:52:28:64:3d:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:a2:bd:0b:f4:38:9d:cd:66:59:68:14:e0:70:d4:e5: 93:93:7c:81:f6:af:6b:f9:9f:4f:c2:4e:05:54:3f:e0: f4:f4:27:c0:82:52:a7:dd:bf:3a:8b:05:cd:61:9f:8d: f6:68:97:b8:f5:c6:79:7a:c9:16:53:41:d4:16:8e:c5: ec:81:1d:88:75:3f:78:3b:d4:7b:7e:bd:50:20:f8:d0: 73:aa:21:d9:38:09:69:92:8d:30:67:01:d9:f1:2e:e9: 49:e3:d1:95:5f:db:68:c1:b5:4d:41:34:2c:a9:7c:f5: 7a:9a:37:34:e9:2c:ff:1f:a5:e4:39:a4:6a:04:2c:39: 9c:18:7a:bd:e9:be:e7:0c:fa:49:8b:61:2b:83:e4:00: db:8b:1b:b8:cb:27:be:6b:93:51:3b:25:0a:44:78:e7: 14:22:50:e4:9a:70:ff:8e:28:9f:fe:45:e4:62:2a:2d: 90:b3:8b:f5:94:04:3c:2d:56:9e:5a:30:72:5f:c7:be: f7:6c:5c:fc:0f:91:f1:e6:01:63:da:b2:03:11:85:42: 77:6d:18:83:19:b3:b8:49:91:4c:05:a5:88:38:01:10: 49:22:32:d5:0f:e4:c3:f0:d3:3b:03:d1:71:c2:1c:ab: ce:72:45:2b:0e:74:b0:bc:23:b9:17:aa:a9:95:1c:05 Fingerprint (SHA-256): DD:3F:B6:B9:3C:69:4A:02:5C:DD:D8:5D:B2:DF:5D:23:7C:BF:7D:84:85:8B:7D:03:41:96:2E:DB:42:2E:81:49 Fingerprint (SHA1): 1B:B5:9A:01:EF:10:F9:1A:BD:3D:8B:5A:9F:0D:5D:EB:16:BD:61:DE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7491: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7492: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172457 (0x13bd4a69) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:33:17 2017 Not After : Thu Mar 31 17:33:17 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:d1:a3:78:b4:1a:c7:4d:63:0a:2f:96:16:a3:18:13: 57:a9:b7:22:6d:28:91:ae:b4:00:dc:09:10:76:48:16: ad:b5:ec:5f:18:8a:d3:48:59:9e:8e:38:e9:13:6f:3a: b2:df:c2:e2:6b:6a:9c:3d:a9:7d:74:f6:81:34:61:43: 94:cd:f7:e5:38:ed:3d:90:52:6d:0c:e9:3b:36:83:72: e9:47:43:16:73:e3:7f:7e:3e:70:d7:b5:96:c6:db:dd: 41:38:fb:5f:34:e9:53:48:e2:0b:4f:6a:af:0d:28:50: 72:80:6d:1e:a3:54:1c:9a:13:13:d9:6d:d9:b2:8d:f8: 35:59:24:0c:7f:6a:cd:04:eb:a1:70:63:4c:81:67:56: 04:7c:ea:5f:75:d6:f3:cc:f7:16:3b:fc:8c:33:ec:e7: cf:b5:8d:e9:47:ac:c5:90:cb:89:0b:d4:6c:2d:b1:40: 55:7a:e8:84:08:31:68:f0:a1:62:94:00:cd:99:d8:8b: b6:de:2c:67:2c:f6:59:13:f1:8d:74:5d:20:b7:e7:49: f9:fe:a1:90:82:c1:1f:6a:7d:90:21:f2:0f:52:27:9b: 65:55:e3:74:6f:0d:0b:e5:7a:f4:27:79:cb:a4:02:2f: 56:87:7d:74:2e:53:aa:ca:b7:50:09:59:41:d5:6c:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:c2:6e:9b:ed:4c:ca:9f:8d:33:d8:30:4d:02:eb:e9: bd:d3:a3:b2:b7:c3:29:b7:21:26:03:56:68:b0:a0:df: a5:ac:80:74:8d:5c:62:76:3d:19:98:52:30:9b:78:59: b4:af:3a:fa:7c:9f:2f:5d:04:21:04:5e:7b:36:f9:16: 1f:92:57:33:c6:2e:8d:d3:0d:fe:15:b0:32:c8:7a:14: 91:8f:72:57:49:b5:66:1e:7d:97:98:9e:3e:9b:ab:7c: 97:33:e8:06:9c:e5:31:71:87:b9:99:a8:fb:d6:fa:f3: a6:c7:1c:40:00:3f:9f:11:0b:e5:a2:1c:2a:11:b0:fc: 14:01:22:73:50:e5:84:1e:18:b3:ec:b4:f5:f2:f5:1e: 47:ac:ae:f2:5d:57:05:77:43:4d:a0:64:49:e7:2f:42: ca:41:de:a7:a2:41:e4:60:9d:12:ba:fb:3c:06:2f:7c: 7d:5e:70:ac:2d:a8:02:45:aa:b1:39:a7:5f:92:d6:66: 1e:18:90:8f:67:fb:b1:75:3a:1b:f6:8a:77:c0:71:ae: 52:26:1c:a9:e1:53:65:30:1b:9b:b2:f1:9d:4c:3f:ed: d2:b0:39:fb:52:a7:46:68:ab:12:96:5b:90:ec:67:4f: 9e:f2:d4:e2:99:c2:e4:a6:9e:5c:bc:3f:ed:37:5a:a2 Fingerprint (SHA-256): E3:BB:AD:5E:EF:DC:8E:AC:59:BD:BE:8A:0D:40:7D:5A:E7:4B:B9:59:28:4F:07:68:DE:E2:28:83:F0:0A:F6:4C Fingerprint (SHA1): 29:36:60:D6:AE:84:5E:BB:9F:08:82:D7:22:8C:8E:1A:5D:0C:51:0A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7493: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7494: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172458 (0x13bd4a6a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 17:33:20 2017 Not After : Thu Mar 31 17:33:20 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:65:03:bb:66:b0:89:65:70:62:c5:6a:21:4e:77:91: b2:8f:74:d3:03:d8:4b:3f:ad:b0:b3:bb:fc:31:5a:5f: b5:0b:a5:fa:a0:7a:e6:24:1e:b8:ce:7c:a0:e8:6b:a0: c6:14:ab:00:92:1a:b2:88:27:3e:d4:eb:6a:36:f6:b5: d5:60:3f:2d:f4:06:08:07:5c:9b:b9:a0:1e:4d:19:cf: cb:84:a6:fc:20:d0:e5:e7:3d:a0:46:2c:a6:c8:dd:07: 74:f1:ed:92:a7:73:0c:74:df:1d:40:06:77:41:c0:69: a7:33:9b:fe:0d:5f:c5:ce:4b:69:f5:e7:8d:ea:cb:d5: 59:03:c3:f1:fe:d2:f7:50:89:2c:84:8e:b6:17:0c:49: 77:3c:30:ad:94:b0:77:b5:98:65:e1:03:ae:84:1b:6d: 84:56:a7:31:c5:34:82:dd:0d:98:c4:c1:19:29:5e:55: c8:e6:04:32:54:b4:36:16:31:2b:58:08:c0:47:c4:da: 9a:89:73:8b:c1:31:67:ca:7a:07:97:94:00:af:f8:a8: a3:2d:38:50:13:02:26:ab:04:ab:e7:6d:16:8d:a0:b4: 4f:69:57:06:5f:b3:e6:f9:47:e3:93:e1:aa:32:98:6b: de:bf:db:24:fa:69:0b:5e:8b:f0:65:e4:79:8a:50:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:63:24:25:9f:7e:0a:09:90:02:c5:01:bf:21:8a:19: 4c:01:f1:a4:72:b9:6c:0b:8a:a4:07:f5:9d:b2:70:6c: 4e:6c:e3:f7:ec:dc:56:61:79:64:01:f8:2c:fe:c9:43: 47:a6:d1:e1:22:cb:e2:e5:75:86:9d:28:ac:07:2a:75: 52:fd:e9:13:54:55:95:8e:4c:6f:fa:bb:ef:09:c4:f0: 20:ec:86:70:86:6d:7d:91:74:6c:be:78:65:7c:1b:ed: f8:07:91:71:0c:cb:74:98:62:16:59:df:49:fb:80:ad: 6f:a2:a5:c1:af:16:ac:4d:da:72:ef:eb:16:a3:a3:80: 79:a7:9d:42:10:1e:25:3a:a1:d9:7d:7d:85:cc:98:7c: 14:54:47:11:a5:ea:fc:f0:6e:e5:f6:cd:2a:71:ad:6d: e6:94:0d:15:2e:92:68:78:e9:3b:3e:65:f0:20:21:1b: 0f:ea:ab:a2:00:1e:7e:d6:26:49:c3:a4:0b:07:a9:0b: 67:44:e2:cf:90:96:bb:b7:7c:53:bd:41:cc:13:9a:a4: 6c:7a:46:cb:01:9e:77:56:2d:7c:2b:34:2e:a2:b5:55: a8:60:c8:31:64:84:0f:9d:60:58:84:29:5a:66:9f:92: 31:9b:07:ab:e4:0c:40:98:dc:0f:42:2a:28:a7:17:eb Fingerprint (SHA-256): B8:EE:D6:57:E6:D3:8B:4D:D2:DD:62:BA:D7:AF:4D:9D:FB:06:0A:B7:3D:91:9E:D3:54:89:25:C3:30:22:E7:38 Fingerprint (SHA1): 0E:A3:A9:C1:BE:EA:40:D5:66:B9:3B:FC:FB:66:54:AE:95:14:6A:1C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #7495: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7496: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7497: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172460 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7498: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7499: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7500: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7501: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331172461 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7502: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7503: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7504: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7505: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331172462 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7506: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7507: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #7508: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7509: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 331172463 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7510: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7511: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #7512: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7513: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 331172464 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7514: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7515: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7516: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172460 (0x13bd4a6c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:33:48 2017 Not After : Thu Mar 31 17:33:48 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:7b:81:3b:7e:b4:cc:94:2a:14:83:c3:9c:94:eb:4a: b2:da:2a:8d:23:c5:4e:c5:15:6b:3e:5b:5d:66:53:71: 76:1b:2d:62:6c:f1:69:48:73:1b:87:74:b8:29:8d:a1: 4e:fb:30:00:b8:17:b8:dd:56:a2:25:e0:ba:e1:99:d6: f5:58:5e:80:d6:02:7a:5e:b8:bf:d1:dc:a3:f7:98:86: 31:30:04:a8:b7:bb:c6:67:67:8e:e8:9e:e6:2c:aa:26: f0:cd:4e:83:ae:80:1d:0a:b9:09:8a:56:52:68:b6:80: b9:ed:61:b1:07:4f:03:bb:aa:f2:f9:89:68:af:5d:19: e5:32:ee:d0:1b:7f:d3:67:4a:65:bd:70:27:5c:95:21: 40:79:22:47:35:50:55:1c:27:52:2a:51:ca:47:b7:27: f6:5f:10:f0:d2:8f:b7:2e:84:4e:e2:4f:78:c2:01:00: e0:eb:5b:40:a7:e4:4d:02:46:44:01:6a:fb:2c:62:8a: 5b:14:8d:42:ed:a5:94:3a:0d:c6:fb:d7:1d:6d:38:8b: 8f:ff:23:ab:f5:b7:de:03:83:37:7d:eb:d5:2a:a1:e1: 68:6f:cc:1c:fe:13:9f:9c:e0:b3:5a:d5:18:65:eb:53: fb:b3:88:8b:64:f6:cc:eb:e0:99:d7:e9:0e:bd:2f:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:91:a8:6c:53:c3:c5:bc:07:b2:f6:03:80:cf:b7:22: a3:d7:75:9f:19:fd:5b:0d:45:62:cb:b4:4e:da:e8:1f: 59:07:ed:e8:29:f1:64:7b:a4:72:39:da:d9:55:2e:44: 1b:e6:60:f8:d4:9a:47:c6:6b:ad:67:0f:18:a2:4e:51: 78:8d:19:11:84:dd:fe:97:46:3d:4b:2a:27:ea:e4:ff: 90:8d:ba:f8:c3:81:d2:cc:6f:3f:76:c8:ec:4f:7d:be: 17:43:30:d1:37:58:11:cc:38:d8:e5:a5:bc:31:99:4b: 08:71:08:03:60:2f:a8:01:1b:0b:90:fc:55:e2:b2:fb: 0a:9e:f9:b4:2d:fd:b7:14:f3:aa:3d:2b:a1:3a:cd:44: cf:60:f7:ee:f9:79:d7:37:b8:be:93:dc:a4:65:4a:cc: be:0b:6b:9d:14:2f:bd:52:7d:77:98:3c:07:26:5a:22: c1:bc:4a:d4:c6:8a:f9:fb:f6:79:9a:24:95:38:c5:40: f0:3b:a3:c9:63:c5:22:25:30:03:26:3f:b0:cc:aa:8c: 4c:2c:50:9f:6b:1d:6f:f5:a8:2f:a7:8c:9a:d1:d6:a7: 6a:84:22:33:ad:ea:fa:3f:e8:0e:d8:50:ef:5b:23:fa: 95:06:87:85:af:e9:1e:a9:f5:53:58:27:ca:31:0f:3d Fingerprint (SHA-256): 22:48:3F:5E:60:B7:39:3C:D3:99:8A:CB:AA:A4:C3:2B:3C:56:CA:53:F5:AC:79:83:89:27:2B:17:3B:B3:3F:AC Fingerprint (SHA1): 92:5F:BB:EB:0C:B5:B3:8C:40:88:18:06:CA:DB:DD:D3:E5:F5:6E:3D Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7517: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7518: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172461 (0x13bd4a6d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:34:06 2017 Not After : Thu Mar 31 17:34:06 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:71:93:58:eb:ba:2b:55:bf:77:f5:c4:a5:08:37:89: e6:e0:46:2d:b3:a0:13:99:f1:08:2c:e9:a7:72:bc:ca: df:82:78:ef:d2:cb:b0:17:71:1c:6f:55:c5:0f:5e:ed: 83:8b:c0:a4:29:67:ec:81:86:00:38:0c:5a:16:8f:15: 38:5e:35:b9:01:74:a7:4d:15:83:57:2a:fe:04:3f:ae: b3:3f:bf:ec:6e:76:ff:05:08:c2:41:92:46:1e:f3:32: ea:9e:8b:de:d3:2c:d5:85:5b:f2:14:36:b3:fd:97:18: 96:f8:d9:ac:d4:b7:18:42:ec:b4:95:59:a5:dd:ea:96: f9:03:d1:61:90:30:4a:95:42:16:c5:f8:8e:52:b2:b0: 6d:6f:72:a0:3b:bb:ef:3e:ed:20:fa:6c:f3:50:88:7b: 74:9d:f8:5b:a6:a9:69:74:94:03:d9:26:86:66:63:a1: 8c:d6:97:95:d3:ef:77:6e:69:39:12:6f:dc:d5:7a:d4: 2a:59:a4:9e:dd:c1:55:be:98:3f:e9:dc:f7:44:c0:6e: 52:d0:87:07:32:1a:b8:eb:24:52:1e:92:d6:d9:8b:04: 50:1c:27:ae:0f:5f:be:81:56:2b:25:f6:28:f3:ef:d5: 0d:87:a2:bf:02:3f:84:9a:01:20:c9:78:d9:26:a6:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:9e:0d:0b:e5:a0:d6:5c:df:a2:0d:06:cd:0b:e7:e5: 45:01:56:e9:78:13:bf:11:37:34:f3:4a:5f:db:e0:fc: e8:86:4f:c1:b8:0c:de:f4:90:2b:2a:0f:21:1f:f7:31: 21:b4:d1:b2:5c:83:1f:60:c8:bd:cc:1d:c1:c0:c7:33: 38:6c:c9:24:56:ee:ec:54:aa:e0:c6:72:5b:a8:09:2d: fc:2b:92:f8:fe:b2:02:83:c1:29:49:1a:75:29:e6:96: db:ff:24:54:3f:8f:e4:7e:d2:8a:67:62:46:d4:e0:d1: 2c:4e:2e:6f:ff:53:08:77:64:b2:40:87:19:08:24:3a: 64:54:e1:1b:3a:78:e4:22:93:11:a1:4a:3d:54:af:bc: 96:b6:ec:1a:a9:7d:71:7d:1d:b9:80:54:e0:75:b6:e0: 8b:5c:98:2d:21:18:9b:1e:21:0b:b4:fb:4f:6e:1f:41: 7b:37:72:63:7b:48:2d:86:91:d8:62:a1:ff:90:ee:3f: 4e:60:f3:38:42:7d:bb:3a:86:19:86:4e:e1:73:78:c6: db:11:5f:cd:ad:96:11:bb:ce:fa:28:ed:26:9f:ab:ba: 71:6d:12:07:b4:07:fc:0e:7d:84:b8:01:c4:1b:77:aa: f7:d1:d4:f3:6a:b8:12:33:35:5c:d4:30:aa:ca:f8:c5 Fingerprint (SHA-256): 46:FE:23:68:49:0A:CD:37:FE:2D:F2:A3:F9:E3:6C:78:DD:BA:62:32:F0:41:EB:69:06:6A:12:B0:E8:88:29:FD Fingerprint (SHA1): A1:4E:04:16:64:37:A7:D4:E6:25:3F:6B:4B:0E:49:50:94:AF:7B:C1 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7519: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7520: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172462 (0x13bd4a6e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 17:34:10 2017 Not After : Thu Mar 31 17:34:10 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:08:0a:37:54:43:bc:74:07:81:4e:cd:08:e9:3c:60: 85:db:b5:be:63:14:42:62:7b:6f:9f:f4:f4:2c:21:41: 45:0d:59:1d:db:d5:28:37:27:98:50:13:d8:71:f6:77: 3f:66:cf:f0:64:c6:bc:b2:d5:08:b2:54:db:48:09:82: 4e:15:66:03:05:60:74:30:02:1e:3b:82:af:43:84:54: 1b:e2:16:56:95:08:7a:4f:e7:65:ac:48:09:6f:51:1d: 30:66:0c:de:b3:cd:7c:7e:ff:15:38:59:8c:47:3e:a1: b8:4c:9d:8c:e3:01:0a:12:b2:e6:35:ed:5a:f7:fb:6a: 0a:b0:46:aa:3b:c9:62:d3:66:74:36:de:70:97:e9:47: a0:f7:bd:86:0c:7d:60:07:cc:44:f1:e9:c8:24:f0:0c: 8e:21:57:4b:e0:36:90:a8:b5:23:c0:55:06:bd:25:5d: d4:1f:bb:37:3f:0e:ca:05:0c:6b:d0:3c:07:f2:4f:49: 2f:ba:ba:2c:1e:5f:f6:e7:3a:40:bf:b7:e1:9b:a2:d5: 55:4d:75:03:56:90:43:e6:ea:a6:d2:9e:e3:a2:28:24: 5e:28:1b:9d:8c:c3:33:db:05:16:c0:d0:2d:72:92:6f: 03:89:66:ed:37:34:f4:84:35:ed:80:36:6f:dc:9e:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 64:21:6a:4e:84:dc:e6:9a:b6:43:3b:6f:01:b2:5b:32: f3:0e:1c:4d:da:05:6d:6c:ef:68:3e:cb:c0:06:18:d3: 46:e6:46:30:5f:78:d9:ff:ab:36:23:35:55:e0:db:f1: 27:be:dc:a6:c3:90:3d:84:78:09:d2:7f:74:b1:9a:d3: e7:93:b5:5f:e2:38:cc:60:e1:e0:67:13:cb:c0:f5:2e: cd:cc:78:8f:71:90:4d:87:85:93:5b:6c:f4:35:d9:c1: 58:66:3d:71:e7:d7:22:74:2d:f5:d7:e2:98:04:8a:99: 4e:92:43:45:31:4f:bf:f3:56:66:a8:53:08:24:c0:9d: 15:b4:f3:47:5b:ed:c1:f1:d4:db:0a:e4:b2:fd:2d:b2: b2:84:5a:b2:d2:4a:81:d4:b4:2c:20:53:43:59:75:66: 1f:35:e2:34:37:fb:51:4b:5f:65:f3:b9:ad:96:f1:ea: 34:67:8c:01:5b:37:3e:fa:80:6c:13:ca:23:86:a4:9f: 65:f5:3b:2d:58:0f:41:df:ab:e5:16:85:ac:08:79:05: 95:f3:3c:21:84:b1:97:85:b4:2c:7d:28:08:96:6b:c6: e5:8a:cd:e6:93:ec:81:64:3e:5a:9a:87:78:e4:2f:ed: 25:53:e2:8a:21:b5:ef:e2:4b:2c:b2:f1:34:c6:0d:13 Fingerprint (SHA-256): DA:A8:84:00:A4:30:29:8A:0E:C2:1B:23:CF:6B:F6:3E:D2:2F:EC:24:1A:3C:AC:CB:9A:27:F0:F1:14:61:3B:1F Fingerprint (SHA1): 35:E5:46:B5:2B:72:99:AC:76:53:6D:1C:F0:BC:E4:E9:C9:20:0C:AF Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #7521: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7522: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #7523: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #7524: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #7525: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172460 (0x13bd4a6c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:33:48 2017 Not After : Thu Mar 31 17:33:48 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:7b:81:3b:7e:b4:cc:94:2a:14:83:c3:9c:94:eb:4a: b2:da:2a:8d:23:c5:4e:c5:15:6b:3e:5b:5d:66:53:71: 76:1b:2d:62:6c:f1:69:48:73:1b:87:74:b8:29:8d:a1: 4e:fb:30:00:b8:17:b8:dd:56:a2:25:e0:ba:e1:99:d6: f5:58:5e:80:d6:02:7a:5e:b8:bf:d1:dc:a3:f7:98:86: 31:30:04:a8:b7:bb:c6:67:67:8e:e8:9e:e6:2c:aa:26: f0:cd:4e:83:ae:80:1d:0a:b9:09:8a:56:52:68:b6:80: b9:ed:61:b1:07:4f:03:bb:aa:f2:f9:89:68:af:5d:19: e5:32:ee:d0:1b:7f:d3:67:4a:65:bd:70:27:5c:95:21: 40:79:22:47:35:50:55:1c:27:52:2a:51:ca:47:b7:27: f6:5f:10:f0:d2:8f:b7:2e:84:4e:e2:4f:78:c2:01:00: e0:eb:5b:40:a7:e4:4d:02:46:44:01:6a:fb:2c:62:8a: 5b:14:8d:42:ed:a5:94:3a:0d:c6:fb:d7:1d:6d:38:8b: 8f:ff:23:ab:f5:b7:de:03:83:37:7d:eb:d5:2a:a1:e1: 68:6f:cc:1c:fe:13:9f:9c:e0:b3:5a:d5:18:65:eb:53: fb:b3:88:8b:64:f6:cc:eb:e0:99:d7:e9:0e:bd:2f:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:91:a8:6c:53:c3:c5:bc:07:b2:f6:03:80:cf:b7:22: a3:d7:75:9f:19:fd:5b:0d:45:62:cb:b4:4e:da:e8:1f: 59:07:ed:e8:29:f1:64:7b:a4:72:39:da:d9:55:2e:44: 1b:e6:60:f8:d4:9a:47:c6:6b:ad:67:0f:18:a2:4e:51: 78:8d:19:11:84:dd:fe:97:46:3d:4b:2a:27:ea:e4:ff: 90:8d:ba:f8:c3:81:d2:cc:6f:3f:76:c8:ec:4f:7d:be: 17:43:30:d1:37:58:11:cc:38:d8:e5:a5:bc:31:99:4b: 08:71:08:03:60:2f:a8:01:1b:0b:90:fc:55:e2:b2:fb: 0a:9e:f9:b4:2d:fd:b7:14:f3:aa:3d:2b:a1:3a:cd:44: cf:60:f7:ee:f9:79:d7:37:b8:be:93:dc:a4:65:4a:cc: be:0b:6b:9d:14:2f:bd:52:7d:77:98:3c:07:26:5a:22: c1:bc:4a:d4:c6:8a:f9:fb:f6:79:9a:24:95:38:c5:40: f0:3b:a3:c9:63:c5:22:25:30:03:26:3f:b0:cc:aa:8c: 4c:2c:50:9f:6b:1d:6f:f5:a8:2f:a7:8c:9a:d1:d6:a7: 6a:84:22:33:ad:ea:fa:3f:e8:0e:d8:50:ef:5b:23:fa: 95:06:87:85:af:e9:1e:a9:f5:53:58:27:ca:31:0f:3d Fingerprint (SHA-256): 22:48:3F:5E:60:B7:39:3C:D3:99:8A:CB:AA:A4:C3:2B:3C:56:CA:53:F5:AC:79:83:89:27:2B:17:3B:B3:3F:AC Fingerprint (SHA1): 92:5F:BB:EB:0C:B5:B3:8C:40:88:18:06:CA:DB:DD:D3:E5:F5:6E:3D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7526: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7527: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172461 (0x13bd4a6d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:34:06 2017 Not After : Thu Mar 31 17:34:06 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:71:93:58:eb:ba:2b:55:bf:77:f5:c4:a5:08:37:89: e6:e0:46:2d:b3:a0:13:99:f1:08:2c:e9:a7:72:bc:ca: df:82:78:ef:d2:cb:b0:17:71:1c:6f:55:c5:0f:5e:ed: 83:8b:c0:a4:29:67:ec:81:86:00:38:0c:5a:16:8f:15: 38:5e:35:b9:01:74:a7:4d:15:83:57:2a:fe:04:3f:ae: b3:3f:bf:ec:6e:76:ff:05:08:c2:41:92:46:1e:f3:32: ea:9e:8b:de:d3:2c:d5:85:5b:f2:14:36:b3:fd:97:18: 96:f8:d9:ac:d4:b7:18:42:ec:b4:95:59:a5:dd:ea:96: f9:03:d1:61:90:30:4a:95:42:16:c5:f8:8e:52:b2:b0: 6d:6f:72:a0:3b:bb:ef:3e:ed:20:fa:6c:f3:50:88:7b: 74:9d:f8:5b:a6:a9:69:74:94:03:d9:26:86:66:63:a1: 8c:d6:97:95:d3:ef:77:6e:69:39:12:6f:dc:d5:7a:d4: 2a:59:a4:9e:dd:c1:55:be:98:3f:e9:dc:f7:44:c0:6e: 52:d0:87:07:32:1a:b8:eb:24:52:1e:92:d6:d9:8b:04: 50:1c:27:ae:0f:5f:be:81:56:2b:25:f6:28:f3:ef:d5: 0d:87:a2:bf:02:3f:84:9a:01:20:c9:78:d9:26:a6:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:9e:0d:0b:e5:a0:d6:5c:df:a2:0d:06:cd:0b:e7:e5: 45:01:56:e9:78:13:bf:11:37:34:f3:4a:5f:db:e0:fc: e8:86:4f:c1:b8:0c:de:f4:90:2b:2a:0f:21:1f:f7:31: 21:b4:d1:b2:5c:83:1f:60:c8:bd:cc:1d:c1:c0:c7:33: 38:6c:c9:24:56:ee:ec:54:aa:e0:c6:72:5b:a8:09:2d: fc:2b:92:f8:fe:b2:02:83:c1:29:49:1a:75:29:e6:96: db:ff:24:54:3f:8f:e4:7e:d2:8a:67:62:46:d4:e0:d1: 2c:4e:2e:6f:ff:53:08:77:64:b2:40:87:19:08:24:3a: 64:54:e1:1b:3a:78:e4:22:93:11:a1:4a:3d:54:af:bc: 96:b6:ec:1a:a9:7d:71:7d:1d:b9:80:54:e0:75:b6:e0: 8b:5c:98:2d:21:18:9b:1e:21:0b:b4:fb:4f:6e:1f:41: 7b:37:72:63:7b:48:2d:86:91:d8:62:a1:ff:90:ee:3f: 4e:60:f3:38:42:7d:bb:3a:86:19:86:4e:e1:73:78:c6: db:11:5f:cd:ad:96:11:bb:ce:fa:28:ed:26:9f:ab:ba: 71:6d:12:07:b4:07:fc:0e:7d:84:b8:01:c4:1b:77:aa: f7:d1:d4:f3:6a:b8:12:33:35:5c:d4:30:aa:ca:f8:c5 Fingerprint (SHA-256): 46:FE:23:68:49:0A:CD:37:FE:2D:F2:A3:F9:E3:6C:78:DD:BA:62:32:F0:41:EB:69:06:6A:12:B0:E8:88:29:FD Fingerprint (SHA1): A1:4E:04:16:64:37:A7:D4:E6:25:3F:6B:4B:0E:49:50:94:AF:7B:C1 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7528: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7529: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172462 (0x13bd4a6e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 17:34:10 2017 Not After : Thu Mar 31 17:34:10 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:08:0a:37:54:43:bc:74:07:81:4e:cd:08:e9:3c:60: 85:db:b5:be:63:14:42:62:7b:6f:9f:f4:f4:2c:21:41: 45:0d:59:1d:db:d5:28:37:27:98:50:13:d8:71:f6:77: 3f:66:cf:f0:64:c6:bc:b2:d5:08:b2:54:db:48:09:82: 4e:15:66:03:05:60:74:30:02:1e:3b:82:af:43:84:54: 1b:e2:16:56:95:08:7a:4f:e7:65:ac:48:09:6f:51:1d: 30:66:0c:de:b3:cd:7c:7e:ff:15:38:59:8c:47:3e:a1: b8:4c:9d:8c:e3:01:0a:12:b2:e6:35:ed:5a:f7:fb:6a: 0a:b0:46:aa:3b:c9:62:d3:66:74:36:de:70:97:e9:47: a0:f7:bd:86:0c:7d:60:07:cc:44:f1:e9:c8:24:f0:0c: 8e:21:57:4b:e0:36:90:a8:b5:23:c0:55:06:bd:25:5d: d4:1f:bb:37:3f:0e:ca:05:0c:6b:d0:3c:07:f2:4f:49: 2f:ba:ba:2c:1e:5f:f6:e7:3a:40:bf:b7:e1:9b:a2:d5: 55:4d:75:03:56:90:43:e6:ea:a6:d2:9e:e3:a2:28:24: 5e:28:1b:9d:8c:c3:33:db:05:16:c0:d0:2d:72:92:6f: 03:89:66:ed:37:34:f4:84:35:ed:80:36:6f:dc:9e:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 64:21:6a:4e:84:dc:e6:9a:b6:43:3b:6f:01:b2:5b:32: f3:0e:1c:4d:da:05:6d:6c:ef:68:3e:cb:c0:06:18:d3: 46:e6:46:30:5f:78:d9:ff:ab:36:23:35:55:e0:db:f1: 27:be:dc:a6:c3:90:3d:84:78:09:d2:7f:74:b1:9a:d3: e7:93:b5:5f:e2:38:cc:60:e1:e0:67:13:cb:c0:f5:2e: cd:cc:78:8f:71:90:4d:87:85:93:5b:6c:f4:35:d9:c1: 58:66:3d:71:e7:d7:22:74:2d:f5:d7:e2:98:04:8a:99: 4e:92:43:45:31:4f:bf:f3:56:66:a8:53:08:24:c0:9d: 15:b4:f3:47:5b:ed:c1:f1:d4:db:0a:e4:b2:fd:2d:b2: b2:84:5a:b2:d2:4a:81:d4:b4:2c:20:53:43:59:75:66: 1f:35:e2:34:37:fb:51:4b:5f:65:f3:b9:ad:96:f1:ea: 34:67:8c:01:5b:37:3e:fa:80:6c:13:ca:23:86:a4:9f: 65:f5:3b:2d:58:0f:41:df:ab:e5:16:85:ac:08:79:05: 95:f3:3c:21:84:b1:97:85:b4:2c:7d:28:08:96:6b:c6: e5:8a:cd:e6:93:ec:81:64:3e:5a:9a:87:78:e4:2f:ed: 25:53:e2:8a:21:b5:ef:e2:4b:2c:b2:f1:34:c6:0d:13 Fingerprint (SHA-256): DA:A8:84:00:A4:30:29:8A:0E:C2:1B:23:CF:6B:F6:3E:D2:2F:EC:24:1A:3C:AC:CB:9A:27:F0:F1:14:61:3B:1F Fingerprint (SHA1): 35:E5:46:B5:2B:72:99:AC:76:53:6D:1C:F0:BC:E4:E9:C9:20:0C:AF Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #7530: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7531: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172460 (0x13bd4a6c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:33:48 2017 Not After : Thu Mar 31 17:33:48 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:7b:81:3b:7e:b4:cc:94:2a:14:83:c3:9c:94:eb:4a: b2:da:2a:8d:23:c5:4e:c5:15:6b:3e:5b:5d:66:53:71: 76:1b:2d:62:6c:f1:69:48:73:1b:87:74:b8:29:8d:a1: 4e:fb:30:00:b8:17:b8:dd:56:a2:25:e0:ba:e1:99:d6: f5:58:5e:80:d6:02:7a:5e:b8:bf:d1:dc:a3:f7:98:86: 31:30:04:a8:b7:bb:c6:67:67:8e:e8:9e:e6:2c:aa:26: f0:cd:4e:83:ae:80:1d:0a:b9:09:8a:56:52:68:b6:80: b9:ed:61:b1:07:4f:03:bb:aa:f2:f9:89:68:af:5d:19: e5:32:ee:d0:1b:7f:d3:67:4a:65:bd:70:27:5c:95:21: 40:79:22:47:35:50:55:1c:27:52:2a:51:ca:47:b7:27: f6:5f:10:f0:d2:8f:b7:2e:84:4e:e2:4f:78:c2:01:00: e0:eb:5b:40:a7:e4:4d:02:46:44:01:6a:fb:2c:62:8a: 5b:14:8d:42:ed:a5:94:3a:0d:c6:fb:d7:1d:6d:38:8b: 8f:ff:23:ab:f5:b7:de:03:83:37:7d:eb:d5:2a:a1:e1: 68:6f:cc:1c:fe:13:9f:9c:e0:b3:5a:d5:18:65:eb:53: fb:b3:88:8b:64:f6:cc:eb:e0:99:d7:e9:0e:bd:2f:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:91:a8:6c:53:c3:c5:bc:07:b2:f6:03:80:cf:b7:22: a3:d7:75:9f:19:fd:5b:0d:45:62:cb:b4:4e:da:e8:1f: 59:07:ed:e8:29:f1:64:7b:a4:72:39:da:d9:55:2e:44: 1b:e6:60:f8:d4:9a:47:c6:6b:ad:67:0f:18:a2:4e:51: 78:8d:19:11:84:dd:fe:97:46:3d:4b:2a:27:ea:e4:ff: 90:8d:ba:f8:c3:81:d2:cc:6f:3f:76:c8:ec:4f:7d:be: 17:43:30:d1:37:58:11:cc:38:d8:e5:a5:bc:31:99:4b: 08:71:08:03:60:2f:a8:01:1b:0b:90:fc:55:e2:b2:fb: 0a:9e:f9:b4:2d:fd:b7:14:f3:aa:3d:2b:a1:3a:cd:44: cf:60:f7:ee:f9:79:d7:37:b8:be:93:dc:a4:65:4a:cc: be:0b:6b:9d:14:2f:bd:52:7d:77:98:3c:07:26:5a:22: c1:bc:4a:d4:c6:8a:f9:fb:f6:79:9a:24:95:38:c5:40: f0:3b:a3:c9:63:c5:22:25:30:03:26:3f:b0:cc:aa:8c: 4c:2c:50:9f:6b:1d:6f:f5:a8:2f:a7:8c:9a:d1:d6:a7: 6a:84:22:33:ad:ea:fa:3f:e8:0e:d8:50:ef:5b:23:fa: 95:06:87:85:af:e9:1e:a9:f5:53:58:27:ca:31:0f:3d Fingerprint (SHA-256): 22:48:3F:5E:60:B7:39:3C:D3:99:8A:CB:AA:A4:C3:2B:3C:56:CA:53:F5:AC:79:83:89:27:2B:17:3B:B3:3F:AC Fingerprint (SHA1): 92:5F:BB:EB:0C:B5:B3:8C:40:88:18:06:CA:DB:DD:D3:E5:F5:6E:3D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7532: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172460 (0x13bd4a6c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:33:48 2017 Not After : Thu Mar 31 17:33:48 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:7b:81:3b:7e:b4:cc:94:2a:14:83:c3:9c:94:eb:4a: b2:da:2a:8d:23:c5:4e:c5:15:6b:3e:5b:5d:66:53:71: 76:1b:2d:62:6c:f1:69:48:73:1b:87:74:b8:29:8d:a1: 4e:fb:30:00:b8:17:b8:dd:56:a2:25:e0:ba:e1:99:d6: f5:58:5e:80:d6:02:7a:5e:b8:bf:d1:dc:a3:f7:98:86: 31:30:04:a8:b7:bb:c6:67:67:8e:e8:9e:e6:2c:aa:26: f0:cd:4e:83:ae:80:1d:0a:b9:09:8a:56:52:68:b6:80: b9:ed:61:b1:07:4f:03:bb:aa:f2:f9:89:68:af:5d:19: e5:32:ee:d0:1b:7f:d3:67:4a:65:bd:70:27:5c:95:21: 40:79:22:47:35:50:55:1c:27:52:2a:51:ca:47:b7:27: f6:5f:10:f0:d2:8f:b7:2e:84:4e:e2:4f:78:c2:01:00: e0:eb:5b:40:a7:e4:4d:02:46:44:01:6a:fb:2c:62:8a: 5b:14:8d:42:ed:a5:94:3a:0d:c6:fb:d7:1d:6d:38:8b: 8f:ff:23:ab:f5:b7:de:03:83:37:7d:eb:d5:2a:a1:e1: 68:6f:cc:1c:fe:13:9f:9c:e0:b3:5a:d5:18:65:eb:53: fb:b3:88:8b:64:f6:cc:eb:e0:99:d7:e9:0e:bd:2f:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:91:a8:6c:53:c3:c5:bc:07:b2:f6:03:80:cf:b7:22: a3:d7:75:9f:19:fd:5b:0d:45:62:cb:b4:4e:da:e8:1f: 59:07:ed:e8:29:f1:64:7b:a4:72:39:da:d9:55:2e:44: 1b:e6:60:f8:d4:9a:47:c6:6b:ad:67:0f:18:a2:4e:51: 78:8d:19:11:84:dd:fe:97:46:3d:4b:2a:27:ea:e4:ff: 90:8d:ba:f8:c3:81:d2:cc:6f:3f:76:c8:ec:4f:7d:be: 17:43:30:d1:37:58:11:cc:38:d8:e5:a5:bc:31:99:4b: 08:71:08:03:60:2f:a8:01:1b:0b:90:fc:55:e2:b2:fb: 0a:9e:f9:b4:2d:fd:b7:14:f3:aa:3d:2b:a1:3a:cd:44: cf:60:f7:ee:f9:79:d7:37:b8:be:93:dc:a4:65:4a:cc: be:0b:6b:9d:14:2f:bd:52:7d:77:98:3c:07:26:5a:22: c1:bc:4a:d4:c6:8a:f9:fb:f6:79:9a:24:95:38:c5:40: f0:3b:a3:c9:63:c5:22:25:30:03:26:3f:b0:cc:aa:8c: 4c:2c:50:9f:6b:1d:6f:f5:a8:2f:a7:8c:9a:d1:d6:a7: 6a:84:22:33:ad:ea:fa:3f:e8:0e:d8:50:ef:5b:23:fa: 95:06:87:85:af:e9:1e:a9:f5:53:58:27:ca:31:0f:3d Fingerprint (SHA-256): 22:48:3F:5E:60:B7:39:3C:D3:99:8A:CB:AA:A4:C3:2B:3C:56:CA:53:F5:AC:79:83:89:27:2B:17:3B:B3:3F:AC Fingerprint (SHA1): 92:5F:BB:EB:0C:B5:B3:8C:40:88:18:06:CA:DB:DD:D3:E5:F5:6E:3D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7533: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172461 (0x13bd4a6d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:34:06 2017 Not After : Thu Mar 31 17:34:06 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:71:93:58:eb:ba:2b:55:bf:77:f5:c4:a5:08:37:89: e6:e0:46:2d:b3:a0:13:99:f1:08:2c:e9:a7:72:bc:ca: df:82:78:ef:d2:cb:b0:17:71:1c:6f:55:c5:0f:5e:ed: 83:8b:c0:a4:29:67:ec:81:86:00:38:0c:5a:16:8f:15: 38:5e:35:b9:01:74:a7:4d:15:83:57:2a:fe:04:3f:ae: b3:3f:bf:ec:6e:76:ff:05:08:c2:41:92:46:1e:f3:32: ea:9e:8b:de:d3:2c:d5:85:5b:f2:14:36:b3:fd:97:18: 96:f8:d9:ac:d4:b7:18:42:ec:b4:95:59:a5:dd:ea:96: f9:03:d1:61:90:30:4a:95:42:16:c5:f8:8e:52:b2:b0: 6d:6f:72:a0:3b:bb:ef:3e:ed:20:fa:6c:f3:50:88:7b: 74:9d:f8:5b:a6:a9:69:74:94:03:d9:26:86:66:63:a1: 8c:d6:97:95:d3:ef:77:6e:69:39:12:6f:dc:d5:7a:d4: 2a:59:a4:9e:dd:c1:55:be:98:3f:e9:dc:f7:44:c0:6e: 52:d0:87:07:32:1a:b8:eb:24:52:1e:92:d6:d9:8b:04: 50:1c:27:ae:0f:5f:be:81:56:2b:25:f6:28:f3:ef:d5: 0d:87:a2:bf:02:3f:84:9a:01:20:c9:78:d9:26:a6:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:9e:0d:0b:e5:a0:d6:5c:df:a2:0d:06:cd:0b:e7:e5: 45:01:56:e9:78:13:bf:11:37:34:f3:4a:5f:db:e0:fc: e8:86:4f:c1:b8:0c:de:f4:90:2b:2a:0f:21:1f:f7:31: 21:b4:d1:b2:5c:83:1f:60:c8:bd:cc:1d:c1:c0:c7:33: 38:6c:c9:24:56:ee:ec:54:aa:e0:c6:72:5b:a8:09:2d: fc:2b:92:f8:fe:b2:02:83:c1:29:49:1a:75:29:e6:96: db:ff:24:54:3f:8f:e4:7e:d2:8a:67:62:46:d4:e0:d1: 2c:4e:2e:6f:ff:53:08:77:64:b2:40:87:19:08:24:3a: 64:54:e1:1b:3a:78:e4:22:93:11:a1:4a:3d:54:af:bc: 96:b6:ec:1a:a9:7d:71:7d:1d:b9:80:54:e0:75:b6:e0: 8b:5c:98:2d:21:18:9b:1e:21:0b:b4:fb:4f:6e:1f:41: 7b:37:72:63:7b:48:2d:86:91:d8:62:a1:ff:90:ee:3f: 4e:60:f3:38:42:7d:bb:3a:86:19:86:4e:e1:73:78:c6: db:11:5f:cd:ad:96:11:bb:ce:fa:28:ed:26:9f:ab:ba: 71:6d:12:07:b4:07:fc:0e:7d:84:b8:01:c4:1b:77:aa: f7:d1:d4:f3:6a:b8:12:33:35:5c:d4:30:aa:ca:f8:c5 Fingerprint (SHA-256): 46:FE:23:68:49:0A:CD:37:FE:2D:F2:A3:F9:E3:6C:78:DD:BA:62:32:F0:41:EB:69:06:6A:12:B0:E8:88:29:FD Fingerprint (SHA1): A1:4E:04:16:64:37:A7:D4:E6:25:3F:6B:4B:0E:49:50:94:AF:7B:C1 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7534: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172461 (0x13bd4a6d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:34:06 2017 Not After : Thu Mar 31 17:34:06 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:71:93:58:eb:ba:2b:55:bf:77:f5:c4:a5:08:37:89: e6:e0:46:2d:b3:a0:13:99:f1:08:2c:e9:a7:72:bc:ca: df:82:78:ef:d2:cb:b0:17:71:1c:6f:55:c5:0f:5e:ed: 83:8b:c0:a4:29:67:ec:81:86:00:38:0c:5a:16:8f:15: 38:5e:35:b9:01:74:a7:4d:15:83:57:2a:fe:04:3f:ae: b3:3f:bf:ec:6e:76:ff:05:08:c2:41:92:46:1e:f3:32: ea:9e:8b:de:d3:2c:d5:85:5b:f2:14:36:b3:fd:97:18: 96:f8:d9:ac:d4:b7:18:42:ec:b4:95:59:a5:dd:ea:96: f9:03:d1:61:90:30:4a:95:42:16:c5:f8:8e:52:b2:b0: 6d:6f:72:a0:3b:bb:ef:3e:ed:20:fa:6c:f3:50:88:7b: 74:9d:f8:5b:a6:a9:69:74:94:03:d9:26:86:66:63:a1: 8c:d6:97:95:d3:ef:77:6e:69:39:12:6f:dc:d5:7a:d4: 2a:59:a4:9e:dd:c1:55:be:98:3f:e9:dc:f7:44:c0:6e: 52:d0:87:07:32:1a:b8:eb:24:52:1e:92:d6:d9:8b:04: 50:1c:27:ae:0f:5f:be:81:56:2b:25:f6:28:f3:ef:d5: 0d:87:a2:bf:02:3f:84:9a:01:20:c9:78:d9:26:a6:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:9e:0d:0b:e5:a0:d6:5c:df:a2:0d:06:cd:0b:e7:e5: 45:01:56:e9:78:13:bf:11:37:34:f3:4a:5f:db:e0:fc: e8:86:4f:c1:b8:0c:de:f4:90:2b:2a:0f:21:1f:f7:31: 21:b4:d1:b2:5c:83:1f:60:c8:bd:cc:1d:c1:c0:c7:33: 38:6c:c9:24:56:ee:ec:54:aa:e0:c6:72:5b:a8:09:2d: fc:2b:92:f8:fe:b2:02:83:c1:29:49:1a:75:29:e6:96: db:ff:24:54:3f:8f:e4:7e:d2:8a:67:62:46:d4:e0:d1: 2c:4e:2e:6f:ff:53:08:77:64:b2:40:87:19:08:24:3a: 64:54:e1:1b:3a:78:e4:22:93:11:a1:4a:3d:54:af:bc: 96:b6:ec:1a:a9:7d:71:7d:1d:b9:80:54:e0:75:b6:e0: 8b:5c:98:2d:21:18:9b:1e:21:0b:b4:fb:4f:6e:1f:41: 7b:37:72:63:7b:48:2d:86:91:d8:62:a1:ff:90:ee:3f: 4e:60:f3:38:42:7d:bb:3a:86:19:86:4e:e1:73:78:c6: db:11:5f:cd:ad:96:11:bb:ce:fa:28:ed:26:9f:ab:ba: 71:6d:12:07:b4:07:fc:0e:7d:84:b8:01:c4:1b:77:aa: f7:d1:d4:f3:6a:b8:12:33:35:5c:d4:30:aa:ca:f8:c5 Fingerprint (SHA-256): 46:FE:23:68:49:0A:CD:37:FE:2D:F2:A3:F9:E3:6C:78:DD:BA:62:32:F0:41:EB:69:06:6A:12:B0:E8:88:29:FD Fingerprint (SHA1): A1:4E:04:16:64:37:A7:D4:E6:25:3F:6B:4B:0E:49:50:94:AF:7B:C1 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7535: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172462 (0x13bd4a6e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 17:34:10 2017 Not After : Thu Mar 31 17:34:10 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:08:0a:37:54:43:bc:74:07:81:4e:cd:08:e9:3c:60: 85:db:b5:be:63:14:42:62:7b:6f:9f:f4:f4:2c:21:41: 45:0d:59:1d:db:d5:28:37:27:98:50:13:d8:71:f6:77: 3f:66:cf:f0:64:c6:bc:b2:d5:08:b2:54:db:48:09:82: 4e:15:66:03:05:60:74:30:02:1e:3b:82:af:43:84:54: 1b:e2:16:56:95:08:7a:4f:e7:65:ac:48:09:6f:51:1d: 30:66:0c:de:b3:cd:7c:7e:ff:15:38:59:8c:47:3e:a1: b8:4c:9d:8c:e3:01:0a:12:b2:e6:35:ed:5a:f7:fb:6a: 0a:b0:46:aa:3b:c9:62:d3:66:74:36:de:70:97:e9:47: a0:f7:bd:86:0c:7d:60:07:cc:44:f1:e9:c8:24:f0:0c: 8e:21:57:4b:e0:36:90:a8:b5:23:c0:55:06:bd:25:5d: d4:1f:bb:37:3f:0e:ca:05:0c:6b:d0:3c:07:f2:4f:49: 2f:ba:ba:2c:1e:5f:f6:e7:3a:40:bf:b7:e1:9b:a2:d5: 55:4d:75:03:56:90:43:e6:ea:a6:d2:9e:e3:a2:28:24: 5e:28:1b:9d:8c:c3:33:db:05:16:c0:d0:2d:72:92:6f: 03:89:66:ed:37:34:f4:84:35:ed:80:36:6f:dc:9e:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 64:21:6a:4e:84:dc:e6:9a:b6:43:3b:6f:01:b2:5b:32: f3:0e:1c:4d:da:05:6d:6c:ef:68:3e:cb:c0:06:18:d3: 46:e6:46:30:5f:78:d9:ff:ab:36:23:35:55:e0:db:f1: 27:be:dc:a6:c3:90:3d:84:78:09:d2:7f:74:b1:9a:d3: e7:93:b5:5f:e2:38:cc:60:e1:e0:67:13:cb:c0:f5:2e: cd:cc:78:8f:71:90:4d:87:85:93:5b:6c:f4:35:d9:c1: 58:66:3d:71:e7:d7:22:74:2d:f5:d7:e2:98:04:8a:99: 4e:92:43:45:31:4f:bf:f3:56:66:a8:53:08:24:c0:9d: 15:b4:f3:47:5b:ed:c1:f1:d4:db:0a:e4:b2:fd:2d:b2: b2:84:5a:b2:d2:4a:81:d4:b4:2c:20:53:43:59:75:66: 1f:35:e2:34:37:fb:51:4b:5f:65:f3:b9:ad:96:f1:ea: 34:67:8c:01:5b:37:3e:fa:80:6c:13:ca:23:86:a4:9f: 65:f5:3b:2d:58:0f:41:df:ab:e5:16:85:ac:08:79:05: 95:f3:3c:21:84:b1:97:85:b4:2c:7d:28:08:96:6b:c6: e5:8a:cd:e6:93:ec:81:64:3e:5a:9a:87:78:e4:2f:ed: 25:53:e2:8a:21:b5:ef:e2:4b:2c:b2:f1:34:c6:0d:13 Fingerprint (SHA-256): DA:A8:84:00:A4:30:29:8A:0E:C2:1B:23:CF:6B:F6:3E:D2:2F:EC:24:1A:3C:AC:CB:9A:27:F0:F1:14:61:3B:1F Fingerprint (SHA1): 35:E5:46:B5:2B:72:99:AC:76:53:6D:1C:F0:BC:E4:E9:C9:20:0C:AF Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #7536: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172462 (0x13bd4a6e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 17:34:10 2017 Not After : Thu Mar 31 17:34:10 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:08:0a:37:54:43:bc:74:07:81:4e:cd:08:e9:3c:60: 85:db:b5:be:63:14:42:62:7b:6f:9f:f4:f4:2c:21:41: 45:0d:59:1d:db:d5:28:37:27:98:50:13:d8:71:f6:77: 3f:66:cf:f0:64:c6:bc:b2:d5:08:b2:54:db:48:09:82: 4e:15:66:03:05:60:74:30:02:1e:3b:82:af:43:84:54: 1b:e2:16:56:95:08:7a:4f:e7:65:ac:48:09:6f:51:1d: 30:66:0c:de:b3:cd:7c:7e:ff:15:38:59:8c:47:3e:a1: b8:4c:9d:8c:e3:01:0a:12:b2:e6:35:ed:5a:f7:fb:6a: 0a:b0:46:aa:3b:c9:62:d3:66:74:36:de:70:97:e9:47: a0:f7:bd:86:0c:7d:60:07:cc:44:f1:e9:c8:24:f0:0c: 8e:21:57:4b:e0:36:90:a8:b5:23:c0:55:06:bd:25:5d: d4:1f:bb:37:3f:0e:ca:05:0c:6b:d0:3c:07:f2:4f:49: 2f:ba:ba:2c:1e:5f:f6:e7:3a:40:bf:b7:e1:9b:a2:d5: 55:4d:75:03:56:90:43:e6:ea:a6:d2:9e:e3:a2:28:24: 5e:28:1b:9d:8c:c3:33:db:05:16:c0:d0:2d:72:92:6f: 03:89:66:ed:37:34:f4:84:35:ed:80:36:6f:dc:9e:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 64:21:6a:4e:84:dc:e6:9a:b6:43:3b:6f:01:b2:5b:32: f3:0e:1c:4d:da:05:6d:6c:ef:68:3e:cb:c0:06:18:d3: 46:e6:46:30:5f:78:d9:ff:ab:36:23:35:55:e0:db:f1: 27:be:dc:a6:c3:90:3d:84:78:09:d2:7f:74:b1:9a:d3: e7:93:b5:5f:e2:38:cc:60:e1:e0:67:13:cb:c0:f5:2e: cd:cc:78:8f:71:90:4d:87:85:93:5b:6c:f4:35:d9:c1: 58:66:3d:71:e7:d7:22:74:2d:f5:d7:e2:98:04:8a:99: 4e:92:43:45:31:4f:bf:f3:56:66:a8:53:08:24:c0:9d: 15:b4:f3:47:5b:ed:c1:f1:d4:db:0a:e4:b2:fd:2d:b2: b2:84:5a:b2:d2:4a:81:d4:b4:2c:20:53:43:59:75:66: 1f:35:e2:34:37:fb:51:4b:5f:65:f3:b9:ad:96:f1:ea: 34:67:8c:01:5b:37:3e:fa:80:6c:13:ca:23:86:a4:9f: 65:f5:3b:2d:58:0f:41:df:ab:e5:16:85:ac:08:79:05: 95:f3:3c:21:84:b1:97:85:b4:2c:7d:28:08:96:6b:c6: e5:8a:cd:e6:93:ec:81:64:3e:5a:9a:87:78:e4:2f:ed: 25:53:e2:8a:21:b5:ef:e2:4b:2c:b2:f1:34:c6:0d:13 Fingerprint (SHA-256): DA:A8:84:00:A4:30:29:8A:0E:C2:1B:23:CF:6B:F6:3E:D2:2F:EC:24:1A:3C:AC:CB:9A:27:F0:F1:14:61:3B:1F Fingerprint (SHA1): 35:E5:46:B5:2B:72:99:AC:76:53:6D:1C:F0:BC:E4:E9:C9:20:0C:AF Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #7537: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #7538: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172465 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7539: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #7540: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7541: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7542: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 331172466 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7543: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7544: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7545: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7546: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331172467 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #7547: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7548: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #7549: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7550: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 331172468 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7551: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7552: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #7553: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7554: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 331172469 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7555: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7556: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #7557: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7558: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 331172470 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7559: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7560: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #7561: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7562: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 331172471 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7563: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7564: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7565: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #7566: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #7567: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #7568: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #7569: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172465 (0x13bd4a71) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 17:34:46 2017 Not After : Thu Mar 31 17:34:46 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:d5:14:b7:32:1f:c4:0d:3e:f2:87:d8:cc:ed:e5:39: 81:3b:98:54:33:7e:a0:34:1f:de:35:cb:62:7d:53:bd: 17:39:3c:00:03:81:6f:4f:78:82:85:62:be:bf:cc:4a: b8:72:54:79:83:73:c7:b9:1c:96:f3:f8:99:ca:c7:aa: 0c:20:ea:29:14:78:fd:d7:1d:55:6b:b5:22:01:c0:d0: 9f:32:be:bb:e6:cf:62:d9:24:d9:b4:97:6f:ac:23:d9: b0:52:ae:b9:f8:50:4b:4d:06:39:7d:60:bd:6b:11:fa: 7b:0b:e2:76:77:27:22:f4:97:13:52:57:30:0a:b3:9c: e7:ef:03:cf:40:13:9e:87:71:35:fe:a8:e2:51:95:02: 82:f5:5f:12:d3:19:5c:05:45:da:09:70:3c:8c:7c:b8: 12:b8:d2:0b:e1:f2:36:56:90:8b:55:02:f2:83:21:d6: 76:ad:af:a7:21:a1:f5:f8:53:76:7d:28:fc:ca:4e:25: 1d:3c:9e:a3:3e:06:8d:5f:b7:34:59:47:3b:ce:1c:47: d1:c1:db:b0:f8:c1:b9:03:15:84:fa:57:47:f3:6e:3e: 0d:66:f8:c1:cb:22:b8:c3:5a:f4:3d:24:80:54:66:5f: b6:52:12:d8:55:ec:7b:ac:a3:cb:87:08:16:cc:0a:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:53:ff:39:31:a6:ef:f4:b8:83:82:a5:c0:d4:d2:15: e8:eb:a1:6e:4e:38:f8:df:0b:e0:15:ff:91:49:af:eb: c0:6b:cd:fd:d7:df:30:88:a9:c2:07:3e:8f:e6:42:27: c5:1c:09:cf:55:fa:21:4f:3d:ee:7c:9e:c8:fc:a4:b5: 3f:d8:6c:7b:56:c2:35:22:39:fb:c5:38:68:c7:38:07: 0f:64:11:ad:b4:85:89:89:23:db:01:7e:4d:96:90:c6: b0:c1:19:33:f9:0e:44:91:75:58:34:8d:66:1f:85:fb: 45:1f:37:f0:1c:14:57:85:c9:44:45:1f:f4:7f:1a:62: 97:02:91:23:7b:ac:01:5a:cd:b6:11:de:c2:6e:aa:f9: d8:e3:e2:af:a8:33:91:e9:45:b4:10:b9:c1:11:d5:8b: 92:22:3e:e5:39:39:fd:83:2f:11:81:31:3e:fd:54:75: 6d:82:59:ed:05:8d:50:e8:79:59:64:13:7d:e7:dc:f6: 4f:45:48:d3:83:3f:08:1d:75:63:2f:b1:1d:34:8d:09: 2b:97:63:5e:0e:c1:f5:8a:e1:dc:10:51:69:16:67:f1: 6e:9b:6e:58:38:22:25:8b:74:1b:a0:70:3c:32:e3:64: cd:45:75:17:b7:43:d6:ca:f5:9f:64:04:c7:6c:a7:40 Fingerprint (SHA-256): 0C:B3:27:66:09:92:C9:55:25:E5:74:3C:C2:E8:D5:EB:34:E7:4E:10:0A:99:0A:80:C2:60:FD:8A:7A:40:27:63 Fingerprint (SHA1): 35:1E:B2:DC:CD:DA:92:58:39:65:9D:E3:76:33:50:AA:B3:FB:82:62 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7570: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7571: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7572: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7573: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172465 (0x13bd4a71) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 17:34:46 2017 Not After : Thu Mar 31 17:34:46 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:d5:14:b7:32:1f:c4:0d:3e:f2:87:d8:cc:ed:e5:39: 81:3b:98:54:33:7e:a0:34:1f:de:35:cb:62:7d:53:bd: 17:39:3c:00:03:81:6f:4f:78:82:85:62:be:bf:cc:4a: b8:72:54:79:83:73:c7:b9:1c:96:f3:f8:99:ca:c7:aa: 0c:20:ea:29:14:78:fd:d7:1d:55:6b:b5:22:01:c0:d0: 9f:32:be:bb:e6:cf:62:d9:24:d9:b4:97:6f:ac:23:d9: b0:52:ae:b9:f8:50:4b:4d:06:39:7d:60:bd:6b:11:fa: 7b:0b:e2:76:77:27:22:f4:97:13:52:57:30:0a:b3:9c: e7:ef:03:cf:40:13:9e:87:71:35:fe:a8:e2:51:95:02: 82:f5:5f:12:d3:19:5c:05:45:da:09:70:3c:8c:7c:b8: 12:b8:d2:0b:e1:f2:36:56:90:8b:55:02:f2:83:21:d6: 76:ad:af:a7:21:a1:f5:f8:53:76:7d:28:fc:ca:4e:25: 1d:3c:9e:a3:3e:06:8d:5f:b7:34:59:47:3b:ce:1c:47: d1:c1:db:b0:f8:c1:b9:03:15:84:fa:57:47:f3:6e:3e: 0d:66:f8:c1:cb:22:b8:c3:5a:f4:3d:24:80:54:66:5f: b6:52:12:d8:55:ec:7b:ac:a3:cb:87:08:16:cc:0a:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:53:ff:39:31:a6:ef:f4:b8:83:82:a5:c0:d4:d2:15: e8:eb:a1:6e:4e:38:f8:df:0b:e0:15:ff:91:49:af:eb: c0:6b:cd:fd:d7:df:30:88:a9:c2:07:3e:8f:e6:42:27: c5:1c:09:cf:55:fa:21:4f:3d:ee:7c:9e:c8:fc:a4:b5: 3f:d8:6c:7b:56:c2:35:22:39:fb:c5:38:68:c7:38:07: 0f:64:11:ad:b4:85:89:89:23:db:01:7e:4d:96:90:c6: b0:c1:19:33:f9:0e:44:91:75:58:34:8d:66:1f:85:fb: 45:1f:37:f0:1c:14:57:85:c9:44:45:1f:f4:7f:1a:62: 97:02:91:23:7b:ac:01:5a:cd:b6:11:de:c2:6e:aa:f9: d8:e3:e2:af:a8:33:91:e9:45:b4:10:b9:c1:11:d5:8b: 92:22:3e:e5:39:39:fd:83:2f:11:81:31:3e:fd:54:75: 6d:82:59:ed:05:8d:50:e8:79:59:64:13:7d:e7:dc:f6: 4f:45:48:d3:83:3f:08:1d:75:63:2f:b1:1d:34:8d:09: 2b:97:63:5e:0e:c1:f5:8a:e1:dc:10:51:69:16:67:f1: 6e:9b:6e:58:38:22:25:8b:74:1b:a0:70:3c:32:e3:64: cd:45:75:17:b7:43:d6:ca:f5:9f:64:04:c7:6c:a7:40 Fingerprint (SHA-256): 0C:B3:27:66:09:92:C9:55:25:E5:74:3C:C2:E8:D5:EB:34:E7:4E:10:0A:99:0A:80:C2:60:FD:8A:7A:40:27:63 Fingerprint (SHA1): 35:1E:B2:DC:CD:DA:92:58:39:65:9D:E3:76:33:50:AA:B3:FB:82:62 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7574: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7575: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #7576: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172472 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7577: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #7578: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7579: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7580: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 331172473 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #7581: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7582: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #7583: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7584: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 331172474 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7585: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7586: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #7587: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7588: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 331172475 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7589: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7590: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7591: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7592: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 331172476 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7593: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7594: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #7595: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7596: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 331172477 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7597: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7598: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #7599: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7600: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 331172478 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7601: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7602: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #7603: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7604: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 331172479 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7605: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7606: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #7607: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7608: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 331172480 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #7609: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7610: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #7611: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7612: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 331172481 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7613: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7614: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #7615: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7616: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 331172482 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7617: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7618: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #7619: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7620: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 331172483 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7621: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7622: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #7623: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7624: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 331172484 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7625: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7626: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #7627: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7628: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 331172485 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7629: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7630: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #7631: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7632: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 331172486 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7633: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7634: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #7635: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7636: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 331172487 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7637: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7638: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #7639: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7640: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 331172488 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7641: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7642: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #7643: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7644: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 331172489 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #7645: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7646: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #7647: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7648: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 331172490 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7649: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7650: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #7651: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7652: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 331172491 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7653: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7654: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #7655: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7656: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 331172492 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7657: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7658: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #7659: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7660: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 331172493 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7661: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7662: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #7663: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7664: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 331172494 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7665: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7666: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #7667: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7668: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 331172495 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7669: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7670: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #7671: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7672: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 331172496 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7673: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7674: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #7675: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7676: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 331172497 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7677: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7678: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #7679: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7680: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 331172498 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7681: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7682: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #7683: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7684: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 331172499 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7685: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7686: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #7687: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7688: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 331172500 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7689: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7690: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #7691: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7692: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 331172501 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7693: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7694: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7695: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172472 (0x13bd4a78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 17:36:38 2017 Not After : Thu Mar 31 17:36:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:a2:6f:a4:ae:f7:e1:5e:da:b2:f8:95:9a:f9:2f:b2: 7d:a7:f4:dd:ee:97:a3:cf:4e:21:92:7f:27:55:00:44: b0:b3:2d:24:db:e3:2f:dc:db:4f:57:bf:d8:ee:d9:c0: 41:97:3c:5b:04:88:2d:62:96:4a:39:2e:35:27:6b:0f: d0:a8:3d:15:cb:a2:ae:6d:9a:42:8d:45:33:eb:ba:99: 56:14:f5:68:20:b8:78:97:7f:74:77:55:66:db:83:3c: b8:a3:f6:63:ed:47:84:b7:bc:8e:4e:a7:35:04:93:9d: 45:25:d3:4f:e4:b5:7f:a5:ac:62:46:1d:3f:c0:74:e9: 1d:2a:2f:66:79:7c:19:54:2a:81:ad:11:97:75:d3:7d: f1:a8:a0:0b:17:98:3f:a8:7e:22:87:2a:a3:a2:2f:17: 12:31:5e:16:8f:ae:9c:4c:28:99:06:6a:67:dd:5d:be: de:f6:ca:5a:ec:5f:7b:e6:8b:bb:5c:21:a7:d8:62:2b: d7:11:30:d6:5e:65:c8:55:a8:e7:5e:bc:ae:a5:6c:63: ab:97:57:97:13:a1:8b:00:9c:dc:89:01:22:8b:31:73: d4:e6:62:4c:cd:9b:89:74:9d:c3:d4:94:bc:5a:a3:63: 9e:50:1d:2c:f7:01:06:54:4f:a9:19:ec:2d:db:e5:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:3f:55:d4:44:39:1d:52:9f:37:f7:fb:0b:51:86:31: 5f:5d:97:3d:06:ed:3d:6c:f5:da:6e:9a:6b:ec:03:1b: 07:d7:83:3f:f4:41:95:3b:ce:2c:b9:18:6d:4d:71:f1: a5:af:55:40:c5:99:1c:29:d7:6b:bd:8c:ee:7a:7a:ef: 85:a9:21:1e:62:eb:26:61:a8:b2:b3:43:fb:81:24:be: 15:49:7e:86:d2:e4:80:f9:5f:0e:61:cd:ed:cb:22:f5: c6:6b:e8:aa:a2:26:10:d4:f2:9d:19:17:93:53:01:79: 67:98:8d:28:10:db:92:6c:b1:39:1f:1a:5f:dc:cb:f1: 6c:f0:4c:9c:46:7c:d8:ba:b9:7e:92:63:ee:3d:af:3b: 68:b0:2d:77:18:b4:14:c3:bb:44:b3:90:0d:ec:4e:79: f7:8a:d3:c0:21:fc:0c:9a:5e:c2:d8:66:06:36:09:d0: 95:7c:ab:a1:1a:a9:39:ab:d7:f9:a6:50:9b:7d:17:16: 99:50:01:ea:b3:0c:a4:0c:3d:a7:6b:b1:32:bf:45:c1: db:a6:bb:f4:58:70:a1:47:e3:36:e4:06:ff:e2:1d:1f: 7e:85:fe:b7:16:3f:c9:c4:ae:c1:ed:2a:2c:36:35:ca: 74:77:a7:47:24:57:81:e1:fd:98:9c:7d:38:ce:64:1d Fingerprint (SHA-256): C1:4D:3D:C3:0A:60:EE:38:B6:F9:2A:53:79:0C:B6:15:48:8F:2A:32:9F:AF:32:84:80:CB:9B:31:65:B6:3B:A1 Fingerprint (SHA1): AA:2A:ED:75:26:10:C7:BE:51:FF:47:F3:CD:E8:A2:4F:2B:53:B2:7D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7696: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7697: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172472 (0x13bd4a78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 17:36:38 2017 Not After : Thu Mar 31 17:36:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:a2:6f:a4:ae:f7:e1:5e:da:b2:f8:95:9a:f9:2f:b2: 7d:a7:f4:dd:ee:97:a3:cf:4e:21:92:7f:27:55:00:44: b0:b3:2d:24:db:e3:2f:dc:db:4f:57:bf:d8:ee:d9:c0: 41:97:3c:5b:04:88:2d:62:96:4a:39:2e:35:27:6b:0f: d0:a8:3d:15:cb:a2:ae:6d:9a:42:8d:45:33:eb:ba:99: 56:14:f5:68:20:b8:78:97:7f:74:77:55:66:db:83:3c: b8:a3:f6:63:ed:47:84:b7:bc:8e:4e:a7:35:04:93:9d: 45:25:d3:4f:e4:b5:7f:a5:ac:62:46:1d:3f:c0:74:e9: 1d:2a:2f:66:79:7c:19:54:2a:81:ad:11:97:75:d3:7d: f1:a8:a0:0b:17:98:3f:a8:7e:22:87:2a:a3:a2:2f:17: 12:31:5e:16:8f:ae:9c:4c:28:99:06:6a:67:dd:5d:be: de:f6:ca:5a:ec:5f:7b:e6:8b:bb:5c:21:a7:d8:62:2b: d7:11:30:d6:5e:65:c8:55:a8:e7:5e:bc:ae:a5:6c:63: ab:97:57:97:13:a1:8b:00:9c:dc:89:01:22:8b:31:73: d4:e6:62:4c:cd:9b:89:74:9d:c3:d4:94:bc:5a:a3:63: 9e:50:1d:2c:f7:01:06:54:4f:a9:19:ec:2d:db:e5:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:3f:55:d4:44:39:1d:52:9f:37:f7:fb:0b:51:86:31: 5f:5d:97:3d:06:ed:3d:6c:f5:da:6e:9a:6b:ec:03:1b: 07:d7:83:3f:f4:41:95:3b:ce:2c:b9:18:6d:4d:71:f1: a5:af:55:40:c5:99:1c:29:d7:6b:bd:8c:ee:7a:7a:ef: 85:a9:21:1e:62:eb:26:61:a8:b2:b3:43:fb:81:24:be: 15:49:7e:86:d2:e4:80:f9:5f:0e:61:cd:ed:cb:22:f5: c6:6b:e8:aa:a2:26:10:d4:f2:9d:19:17:93:53:01:79: 67:98:8d:28:10:db:92:6c:b1:39:1f:1a:5f:dc:cb:f1: 6c:f0:4c:9c:46:7c:d8:ba:b9:7e:92:63:ee:3d:af:3b: 68:b0:2d:77:18:b4:14:c3:bb:44:b3:90:0d:ec:4e:79: f7:8a:d3:c0:21:fc:0c:9a:5e:c2:d8:66:06:36:09:d0: 95:7c:ab:a1:1a:a9:39:ab:d7:f9:a6:50:9b:7d:17:16: 99:50:01:ea:b3:0c:a4:0c:3d:a7:6b:b1:32:bf:45:c1: db:a6:bb:f4:58:70:a1:47:e3:36:e4:06:ff:e2:1d:1f: 7e:85:fe:b7:16:3f:c9:c4:ae:c1:ed:2a:2c:36:35:ca: 74:77:a7:47:24:57:81:e1:fd:98:9c:7d:38:ce:64:1d Fingerprint (SHA-256): C1:4D:3D:C3:0A:60:EE:38:B6:F9:2A:53:79:0C:B6:15:48:8F:2A:32:9F:AF:32:84:80:CB:9B:31:65:B6:3B:A1 Fingerprint (SHA1): AA:2A:ED:75:26:10:C7:BE:51:FF:47:F3:CD:E8:A2:4F:2B:53:B2:7D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7698: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7699: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7700: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7701: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172472 (0x13bd4a78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 17:36:38 2017 Not After : Thu Mar 31 17:36:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:a2:6f:a4:ae:f7:e1:5e:da:b2:f8:95:9a:f9:2f:b2: 7d:a7:f4:dd:ee:97:a3:cf:4e:21:92:7f:27:55:00:44: b0:b3:2d:24:db:e3:2f:dc:db:4f:57:bf:d8:ee:d9:c0: 41:97:3c:5b:04:88:2d:62:96:4a:39:2e:35:27:6b:0f: d0:a8:3d:15:cb:a2:ae:6d:9a:42:8d:45:33:eb:ba:99: 56:14:f5:68:20:b8:78:97:7f:74:77:55:66:db:83:3c: b8:a3:f6:63:ed:47:84:b7:bc:8e:4e:a7:35:04:93:9d: 45:25:d3:4f:e4:b5:7f:a5:ac:62:46:1d:3f:c0:74:e9: 1d:2a:2f:66:79:7c:19:54:2a:81:ad:11:97:75:d3:7d: f1:a8:a0:0b:17:98:3f:a8:7e:22:87:2a:a3:a2:2f:17: 12:31:5e:16:8f:ae:9c:4c:28:99:06:6a:67:dd:5d:be: de:f6:ca:5a:ec:5f:7b:e6:8b:bb:5c:21:a7:d8:62:2b: d7:11:30:d6:5e:65:c8:55:a8:e7:5e:bc:ae:a5:6c:63: ab:97:57:97:13:a1:8b:00:9c:dc:89:01:22:8b:31:73: d4:e6:62:4c:cd:9b:89:74:9d:c3:d4:94:bc:5a:a3:63: 9e:50:1d:2c:f7:01:06:54:4f:a9:19:ec:2d:db:e5:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:3f:55:d4:44:39:1d:52:9f:37:f7:fb:0b:51:86:31: 5f:5d:97:3d:06:ed:3d:6c:f5:da:6e:9a:6b:ec:03:1b: 07:d7:83:3f:f4:41:95:3b:ce:2c:b9:18:6d:4d:71:f1: a5:af:55:40:c5:99:1c:29:d7:6b:bd:8c:ee:7a:7a:ef: 85:a9:21:1e:62:eb:26:61:a8:b2:b3:43:fb:81:24:be: 15:49:7e:86:d2:e4:80:f9:5f:0e:61:cd:ed:cb:22:f5: c6:6b:e8:aa:a2:26:10:d4:f2:9d:19:17:93:53:01:79: 67:98:8d:28:10:db:92:6c:b1:39:1f:1a:5f:dc:cb:f1: 6c:f0:4c:9c:46:7c:d8:ba:b9:7e:92:63:ee:3d:af:3b: 68:b0:2d:77:18:b4:14:c3:bb:44:b3:90:0d:ec:4e:79: f7:8a:d3:c0:21:fc:0c:9a:5e:c2:d8:66:06:36:09:d0: 95:7c:ab:a1:1a:a9:39:ab:d7:f9:a6:50:9b:7d:17:16: 99:50:01:ea:b3:0c:a4:0c:3d:a7:6b:b1:32:bf:45:c1: db:a6:bb:f4:58:70:a1:47:e3:36:e4:06:ff:e2:1d:1f: 7e:85:fe:b7:16:3f:c9:c4:ae:c1:ed:2a:2c:36:35:ca: 74:77:a7:47:24:57:81:e1:fd:98:9c:7d:38:ce:64:1d Fingerprint (SHA-256): C1:4D:3D:C3:0A:60:EE:38:B6:F9:2A:53:79:0C:B6:15:48:8F:2A:32:9F:AF:32:84:80:CB:9B:31:65:B6:3B:A1 Fingerprint (SHA1): AA:2A:ED:75:26:10:C7:BE:51:FF:47:F3:CD:E8:A2:4F:2B:53:B2:7D Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7702: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7703: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7704: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7705: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172472 (0x13bd4a78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 17:36:38 2017 Not After : Thu Mar 31 17:36:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:a2:6f:a4:ae:f7:e1:5e:da:b2:f8:95:9a:f9:2f:b2: 7d:a7:f4:dd:ee:97:a3:cf:4e:21:92:7f:27:55:00:44: b0:b3:2d:24:db:e3:2f:dc:db:4f:57:bf:d8:ee:d9:c0: 41:97:3c:5b:04:88:2d:62:96:4a:39:2e:35:27:6b:0f: d0:a8:3d:15:cb:a2:ae:6d:9a:42:8d:45:33:eb:ba:99: 56:14:f5:68:20:b8:78:97:7f:74:77:55:66:db:83:3c: b8:a3:f6:63:ed:47:84:b7:bc:8e:4e:a7:35:04:93:9d: 45:25:d3:4f:e4:b5:7f:a5:ac:62:46:1d:3f:c0:74:e9: 1d:2a:2f:66:79:7c:19:54:2a:81:ad:11:97:75:d3:7d: f1:a8:a0:0b:17:98:3f:a8:7e:22:87:2a:a3:a2:2f:17: 12:31:5e:16:8f:ae:9c:4c:28:99:06:6a:67:dd:5d:be: de:f6:ca:5a:ec:5f:7b:e6:8b:bb:5c:21:a7:d8:62:2b: d7:11:30:d6:5e:65:c8:55:a8:e7:5e:bc:ae:a5:6c:63: ab:97:57:97:13:a1:8b:00:9c:dc:89:01:22:8b:31:73: d4:e6:62:4c:cd:9b:89:74:9d:c3:d4:94:bc:5a:a3:63: 9e:50:1d:2c:f7:01:06:54:4f:a9:19:ec:2d:db:e5:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:3f:55:d4:44:39:1d:52:9f:37:f7:fb:0b:51:86:31: 5f:5d:97:3d:06:ed:3d:6c:f5:da:6e:9a:6b:ec:03:1b: 07:d7:83:3f:f4:41:95:3b:ce:2c:b9:18:6d:4d:71:f1: a5:af:55:40:c5:99:1c:29:d7:6b:bd:8c:ee:7a:7a:ef: 85:a9:21:1e:62:eb:26:61:a8:b2:b3:43:fb:81:24:be: 15:49:7e:86:d2:e4:80:f9:5f:0e:61:cd:ed:cb:22:f5: c6:6b:e8:aa:a2:26:10:d4:f2:9d:19:17:93:53:01:79: 67:98:8d:28:10:db:92:6c:b1:39:1f:1a:5f:dc:cb:f1: 6c:f0:4c:9c:46:7c:d8:ba:b9:7e:92:63:ee:3d:af:3b: 68:b0:2d:77:18:b4:14:c3:bb:44:b3:90:0d:ec:4e:79: f7:8a:d3:c0:21:fc:0c:9a:5e:c2:d8:66:06:36:09:d0: 95:7c:ab:a1:1a:a9:39:ab:d7:f9:a6:50:9b:7d:17:16: 99:50:01:ea:b3:0c:a4:0c:3d:a7:6b:b1:32:bf:45:c1: db:a6:bb:f4:58:70:a1:47:e3:36:e4:06:ff:e2:1d:1f: 7e:85:fe:b7:16:3f:c9:c4:ae:c1:ed:2a:2c:36:35:ca: 74:77:a7:47:24:57:81:e1:fd:98:9c:7d:38:ce:64:1d Fingerprint (SHA-256): C1:4D:3D:C3:0A:60:EE:38:B6:F9:2A:53:79:0C:B6:15:48:8F:2A:32:9F:AF:32:84:80:CB:9B:31:65:B6:3B:A1 Fingerprint (SHA1): AA:2A:ED:75:26:10:C7:BE:51:FF:47:F3:CD:E8:A2:4F:2B:53:B2:7D Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7706: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172472 (0x13bd4a78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 17:36:38 2017 Not After : Thu Mar 31 17:36:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:a2:6f:a4:ae:f7:e1:5e:da:b2:f8:95:9a:f9:2f:b2: 7d:a7:f4:dd:ee:97:a3:cf:4e:21:92:7f:27:55:00:44: b0:b3:2d:24:db:e3:2f:dc:db:4f:57:bf:d8:ee:d9:c0: 41:97:3c:5b:04:88:2d:62:96:4a:39:2e:35:27:6b:0f: d0:a8:3d:15:cb:a2:ae:6d:9a:42:8d:45:33:eb:ba:99: 56:14:f5:68:20:b8:78:97:7f:74:77:55:66:db:83:3c: b8:a3:f6:63:ed:47:84:b7:bc:8e:4e:a7:35:04:93:9d: 45:25:d3:4f:e4:b5:7f:a5:ac:62:46:1d:3f:c0:74:e9: 1d:2a:2f:66:79:7c:19:54:2a:81:ad:11:97:75:d3:7d: f1:a8:a0:0b:17:98:3f:a8:7e:22:87:2a:a3:a2:2f:17: 12:31:5e:16:8f:ae:9c:4c:28:99:06:6a:67:dd:5d:be: de:f6:ca:5a:ec:5f:7b:e6:8b:bb:5c:21:a7:d8:62:2b: d7:11:30:d6:5e:65:c8:55:a8:e7:5e:bc:ae:a5:6c:63: ab:97:57:97:13:a1:8b:00:9c:dc:89:01:22:8b:31:73: d4:e6:62:4c:cd:9b:89:74:9d:c3:d4:94:bc:5a:a3:63: 9e:50:1d:2c:f7:01:06:54:4f:a9:19:ec:2d:db:e5:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:3f:55:d4:44:39:1d:52:9f:37:f7:fb:0b:51:86:31: 5f:5d:97:3d:06:ed:3d:6c:f5:da:6e:9a:6b:ec:03:1b: 07:d7:83:3f:f4:41:95:3b:ce:2c:b9:18:6d:4d:71:f1: a5:af:55:40:c5:99:1c:29:d7:6b:bd:8c:ee:7a:7a:ef: 85:a9:21:1e:62:eb:26:61:a8:b2:b3:43:fb:81:24:be: 15:49:7e:86:d2:e4:80:f9:5f:0e:61:cd:ed:cb:22:f5: c6:6b:e8:aa:a2:26:10:d4:f2:9d:19:17:93:53:01:79: 67:98:8d:28:10:db:92:6c:b1:39:1f:1a:5f:dc:cb:f1: 6c:f0:4c:9c:46:7c:d8:ba:b9:7e:92:63:ee:3d:af:3b: 68:b0:2d:77:18:b4:14:c3:bb:44:b3:90:0d:ec:4e:79: f7:8a:d3:c0:21:fc:0c:9a:5e:c2:d8:66:06:36:09:d0: 95:7c:ab:a1:1a:a9:39:ab:d7:f9:a6:50:9b:7d:17:16: 99:50:01:ea:b3:0c:a4:0c:3d:a7:6b:b1:32:bf:45:c1: db:a6:bb:f4:58:70:a1:47:e3:36:e4:06:ff:e2:1d:1f: 7e:85:fe:b7:16:3f:c9:c4:ae:c1:ed:2a:2c:36:35:ca: 74:77:a7:47:24:57:81:e1:fd:98:9c:7d:38:ce:64:1d Fingerprint (SHA-256): C1:4D:3D:C3:0A:60:EE:38:B6:F9:2A:53:79:0C:B6:15:48:8F:2A:32:9F:AF:32:84:80:CB:9B:31:65:B6:3B:A1 Fingerprint (SHA1): AA:2A:ED:75:26:10:C7:BE:51:FF:47:F3:CD:E8:A2:4F:2B:53:B2:7D Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7707: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7708: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172472 (0x13bd4a78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 17:36:38 2017 Not After : Thu Mar 31 17:36:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:a2:6f:a4:ae:f7:e1:5e:da:b2:f8:95:9a:f9:2f:b2: 7d:a7:f4:dd:ee:97:a3:cf:4e:21:92:7f:27:55:00:44: b0:b3:2d:24:db:e3:2f:dc:db:4f:57:bf:d8:ee:d9:c0: 41:97:3c:5b:04:88:2d:62:96:4a:39:2e:35:27:6b:0f: d0:a8:3d:15:cb:a2:ae:6d:9a:42:8d:45:33:eb:ba:99: 56:14:f5:68:20:b8:78:97:7f:74:77:55:66:db:83:3c: b8:a3:f6:63:ed:47:84:b7:bc:8e:4e:a7:35:04:93:9d: 45:25:d3:4f:e4:b5:7f:a5:ac:62:46:1d:3f:c0:74:e9: 1d:2a:2f:66:79:7c:19:54:2a:81:ad:11:97:75:d3:7d: f1:a8:a0:0b:17:98:3f:a8:7e:22:87:2a:a3:a2:2f:17: 12:31:5e:16:8f:ae:9c:4c:28:99:06:6a:67:dd:5d:be: de:f6:ca:5a:ec:5f:7b:e6:8b:bb:5c:21:a7:d8:62:2b: d7:11:30:d6:5e:65:c8:55:a8:e7:5e:bc:ae:a5:6c:63: ab:97:57:97:13:a1:8b:00:9c:dc:89:01:22:8b:31:73: d4:e6:62:4c:cd:9b:89:74:9d:c3:d4:94:bc:5a:a3:63: 9e:50:1d:2c:f7:01:06:54:4f:a9:19:ec:2d:db:e5:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:3f:55:d4:44:39:1d:52:9f:37:f7:fb:0b:51:86:31: 5f:5d:97:3d:06:ed:3d:6c:f5:da:6e:9a:6b:ec:03:1b: 07:d7:83:3f:f4:41:95:3b:ce:2c:b9:18:6d:4d:71:f1: a5:af:55:40:c5:99:1c:29:d7:6b:bd:8c:ee:7a:7a:ef: 85:a9:21:1e:62:eb:26:61:a8:b2:b3:43:fb:81:24:be: 15:49:7e:86:d2:e4:80:f9:5f:0e:61:cd:ed:cb:22:f5: c6:6b:e8:aa:a2:26:10:d4:f2:9d:19:17:93:53:01:79: 67:98:8d:28:10:db:92:6c:b1:39:1f:1a:5f:dc:cb:f1: 6c:f0:4c:9c:46:7c:d8:ba:b9:7e:92:63:ee:3d:af:3b: 68:b0:2d:77:18:b4:14:c3:bb:44:b3:90:0d:ec:4e:79: f7:8a:d3:c0:21:fc:0c:9a:5e:c2:d8:66:06:36:09:d0: 95:7c:ab:a1:1a:a9:39:ab:d7:f9:a6:50:9b:7d:17:16: 99:50:01:ea:b3:0c:a4:0c:3d:a7:6b:b1:32:bf:45:c1: db:a6:bb:f4:58:70:a1:47:e3:36:e4:06:ff:e2:1d:1f: 7e:85:fe:b7:16:3f:c9:c4:ae:c1:ed:2a:2c:36:35:ca: 74:77:a7:47:24:57:81:e1:fd:98:9c:7d:38:ce:64:1d Fingerprint (SHA-256): C1:4D:3D:C3:0A:60:EE:38:B6:F9:2A:53:79:0C:B6:15:48:8F:2A:32:9F:AF:32:84:80:CB:9B:31:65:B6:3B:A1 Fingerprint (SHA1): AA:2A:ED:75:26:10:C7:BE:51:FF:47:F3:CD:E8:A2:4F:2B:53:B2:7D Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7709: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7710: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7711: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7712: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172472 (0x13bd4a78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 17:36:38 2017 Not After : Thu Mar 31 17:36:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:a2:6f:a4:ae:f7:e1:5e:da:b2:f8:95:9a:f9:2f:b2: 7d:a7:f4:dd:ee:97:a3:cf:4e:21:92:7f:27:55:00:44: b0:b3:2d:24:db:e3:2f:dc:db:4f:57:bf:d8:ee:d9:c0: 41:97:3c:5b:04:88:2d:62:96:4a:39:2e:35:27:6b:0f: d0:a8:3d:15:cb:a2:ae:6d:9a:42:8d:45:33:eb:ba:99: 56:14:f5:68:20:b8:78:97:7f:74:77:55:66:db:83:3c: b8:a3:f6:63:ed:47:84:b7:bc:8e:4e:a7:35:04:93:9d: 45:25:d3:4f:e4:b5:7f:a5:ac:62:46:1d:3f:c0:74:e9: 1d:2a:2f:66:79:7c:19:54:2a:81:ad:11:97:75:d3:7d: f1:a8:a0:0b:17:98:3f:a8:7e:22:87:2a:a3:a2:2f:17: 12:31:5e:16:8f:ae:9c:4c:28:99:06:6a:67:dd:5d:be: de:f6:ca:5a:ec:5f:7b:e6:8b:bb:5c:21:a7:d8:62:2b: d7:11:30:d6:5e:65:c8:55:a8:e7:5e:bc:ae:a5:6c:63: ab:97:57:97:13:a1:8b:00:9c:dc:89:01:22:8b:31:73: d4:e6:62:4c:cd:9b:89:74:9d:c3:d4:94:bc:5a:a3:63: 9e:50:1d:2c:f7:01:06:54:4f:a9:19:ec:2d:db:e5:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:3f:55:d4:44:39:1d:52:9f:37:f7:fb:0b:51:86:31: 5f:5d:97:3d:06:ed:3d:6c:f5:da:6e:9a:6b:ec:03:1b: 07:d7:83:3f:f4:41:95:3b:ce:2c:b9:18:6d:4d:71:f1: a5:af:55:40:c5:99:1c:29:d7:6b:bd:8c:ee:7a:7a:ef: 85:a9:21:1e:62:eb:26:61:a8:b2:b3:43:fb:81:24:be: 15:49:7e:86:d2:e4:80:f9:5f:0e:61:cd:ed:cb:22:f5: c6:6b:e8:aa:a2:26:10:d4:f2:9d:19:17:93:53:01:79: 67:98:8d:28:10:db:92:6c:b1:39:1f:1a:5f:dc:cb:f1: 6c:f0:4c:9c:46:7c:d8:ba:b9:7e:92:63:ee:3d:af:3b: 68:b0:2d:77:18:b4:14:c3:bb:44:b3:90:0d:ec:4e:79: f7:8a:d3:c0:21:fc:0c:9a:5e:c2:d8:66:06:36:09:d0: 95:7c:ab:a1:1a:a9:39:ab:d7:f9:a6:50:9b:7d:17:16: 99:50:01:ea:b3:0c:a4:0c:3d:a7:6b:b1:32:bf:45:c1: db:a6:bb:f4:58:70:a1:47:e3:36:e4:06:ff:e2:1d:1f: 7e:85:fe:b7:16:3f:c9:c4:ae:c1:ed:2a:2c:36:35:ca: 74:77:a7:47:24:57:81:e1:fd:98:9c:7d:38:ce:64:1d Fingerprint (SHA-256): C1:4D:3D:C3:0A:60:EE:38:B6:F9:2A:53:79:0C:B6:15:48:8F:2A:32:9F:AF:32:84:80:CB:9B:31:65:B6:3B:A1 Fingerprint (SHA1): AA:2A:ED:75:26:10:C7:BE:51:FF:47:F3:CD:E8:A2:4F:2B:53:B2:7D Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7713: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172472 (0x13bd4a78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 17:36:38 2017 Not After : Thu Mar 31 17:36:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:a2:6f:a4:ae:f7:e1:5e:da:b2:f8:95:9a:f9:2f:b2: 7d:a7:f4:dd:ee:97:a3:cf:4e:21:92:7f:27:55:00:44: b0:b3:2d:24:db:e3:2f:dc:db:4f:57:bf:d8:ee:d9:c0: 41:97:3c:5b:04:88:2d:62:96:4a:39:2e:35:27:6b:0f: d0:a8:3d:15:cb:a2:ae:6d:9a:42:8d:45:33:eb:ba:99: 56:14:f5:68:20:b8:78:97:7f:74:77:55:66:db:83:3c: b8:a3:f6:63:ed:47:84:b7:bc:8e:4e:a7:35:04:93:9d: 45:25:d3:4f:e4:b5:7f:a5:ac:62:46:1d:3f:c0:74:e9: 1d:2a:2f:66:79:7c:19:54:2a:81:ad:11:97:75:d3:7d: f1:a8:a0:0b:17:98:3f:a8:7e:22:87:2a:a3:a2:2f:17: 12:31:5e:16:8f:ae:9c:4c:28:99:06:6a:67:dd:5d:be: de:f6:ca:5a:ec:5f:7b:e6:8b:bb:5c:21:a7:d8:62:2b: d7:11:30:d6:5e:65:c8:55:a8:e7:5e:bc:ae:a5:6c:63: ab:97:57:97:13:a1:8b:00:9c:dc:89:01:22:8b:31:73: d4:e6:62:4c:cd:9b:89:74:9d:c3:d4:94:bc:5a:a3:63: 9e:50:1d:2c:f7:01:06:54:4f:a9:19:ec:2d:db:e5:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:3f:55:d4:44:39:1d:52:9f:37:f7:fb:0b:51:86:31: 5f:5d:97:3d:06:ed:3d:6c:f5:da:6e:9a:6b:ec:03:1b: 07:d7:83:3f:f4:41:95:3b:ce:2c:b9:18:6d:4d:71:f1: a5:af:55:40:c5:99:1c:29:d7:6b:bd:8c:ee:7a:7a:ef: 85:a9:21:1e:62:eb:26:61:a8:b2:b3:43:fb:81:24:be: 15:49:7e:86:d2:e4:80:f9:5f:0e:61:cd:ed:cb:22:f5: c6:6b:e8:aa:a2:26:10:d4:f2:9d:19:17:93:53:01:79: 67:98:8d:28:10:db:92:6c:b1:39:1f:1a:5f:dc:cb:f1: 6c:f0:4c:9c:46:7c:d8:ba:b9:7e:92:63:ee:3d:af:3b: 68:b0:2d:77:18:b4:14:c3:bb:44:b3:90:0d:ec:4e:79: f7:8a:d3:c0:21:fc:0c:9a:5e:c2:d8:66:06:36:09:d0: 95:7c:ab:a1:1a:a9:39:ab:d7:f9:a6:50:9b:7d:17:16: 99:50:01:ea:b3:0c:a4:0c:3d:a7:6b:b1:32:bf:45:c1: db:a6:bb:f4:58:70:a1:47:e3:36:e4:06:ff:e2:1d:1f: 7e:85:fe:b7:16:3f:c9:c4:ae:c1:ed:2a:2c:36:35:ca: 74:77:a7:47:24:57:81:e1:fd:98:9c:7d:38:ce:64:1d Fingerprint (SHA-256): C1:4D:3D:C3:0A:60:EE:38:B6:F9:2A:53:79:0C:B6:15:48:8F:2A:32:9F:AF:32:84:80:CB:9B:31:65:B6:3B:A1 Fingerprint (SHA1): AA:2A:ED:75:26:10:C7:BE:51:FF:47:F3:CD:E8:A2:4F:2B:53:B2:7D Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #7714: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172472 (0x13bd4a78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 17:36:38 2017 Not After : Thu Mar 31 17:36:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:a2:6f:a4:ae:f7:e1:5e:da:b2:f8:95:9a:f9:2f:b2: 7d:a7:f4:dd:ee:97:a3:cf:4e:21:92:7f:27:55:00:44: b0:b3:2d:24:db:e3:2f:dc:db:4f:57:bf:d8:ee:d9:c0: 41:97:3c:5b:04:88:2d:62:96:4a:39:2e:35:27:6b:0f: d0:a8:3d:15:cb:a2:ae:6d:9a:42:8d:45:33:eb:ba:99: 56:14:f5:68:20:b8:78:97:7f:74:77:55:66:db:83:3c: b8:a3:f6:63:ed:47:84:b7:bc:8e:4e:a7:35:04:93:9d: 45:25:d3:4f:e4:b5:7f:a5:ac:62:46:1d:3f:c0:74:e9: 1d:2a:2f:66:79:7c:19:54:2a:81:ad:11:97:75:d3:7d: f1:a8:a0:0b:17:98:3f:a8:7e:22:87:2a:a3:a2:2f:17: 12:31:5e:16:8f:ae:9c:4c:28:99:06:6a:67:dd:5d:be: de:f6:ca:5a:ec:5f:7b:e6:8b:bb:5c:21:a7:d8:62:2b: d7:11:30:d6:5e:65:c8:55:a8:e7:5e:bc:ae:a5:6c:63: ab:97:57:97:13:a1:8b:00:9c:dc:89:01:22:8b:31:73: d4:e6:62:4c:cd:9b:89:74:9d:c3:d4:94:bc:5a:a3:63: 9e:50:1d:2c:f7:01:06:54:4f:a9:19:ec:2d:db:e5:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:3f:55:d4:44:39:1d:52:9f:37:f7:fb:0b:51:86:31: 5f:5d:97:3d:06:ed:3d:6c:f5:da:6e:9a:6b:ec:03:1b: 07:d7:83:3f:f4:41:95:3b:ce:2c:b9:18:6d:4d:71:f1: a5:af:55:40:c5:99:1c:29:d7:6b:bd:8c:ee:7a:7a:ef: 85:a9:21:1e:62:eb:26:61:a8:b2:b3:43:fb:81:24:be: 15:49:7e:86:d2:e4:80:f9:5f:0e:61:cd:ed:cb:22:f5: c6:6b:e8:aa:a2:26:10:d4:f2:9d:19:17:93:53:01:79: 67:98:8d:28:10:db:92:6c:b1:39:1f:1a:5f:dc:cb:f1: 6c:f0:4c:9c:46:7c:d8:ba:b9:7e:92:63:ee:3d:af:3b: 68:b0:2d:77:18:b4:14:c3:bb:44:b3:90:0d:ec:4e:79: f7:8a:d3:c0:21:fc:0c:9a:5e:c2:d8:66:06:36:09:d0: 95:7c:ab:a1:1a:a9:39:ab:d7:f9:a6:50:9b:7d:17:16: 99:50:01:ea:b3:0c:a4:0c:3d:a7:6b:b1:32:bf:45:c1: db:a6:bb:f4:58:70:a1:47:e3:36:e4:06:ff:e2:1d:1f: 7e:85:fe:b7:16:3f:c9:c4:ae:c1:ed:2a:2c:36:35:ca: 74:77:a7:47:24:57:81:e1:fd:98:9c:7d:38:ce:64:1d Fingerprint (SHA-256): C1:4D:3D:C3:0A:60:EE:38:B6:F9:2A:53:79:0C:B6:15:48:8F:2A:32:9F:AF:32:84:80:CB:9B:31:65:B6:3B:A1 Fingerprint (SHA1): AA:2A:ED:75:26:10:C7:BE:51:FF:47:F3:CD:E8:A2:4F:2B:53:B2:7D Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #7715: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172472 (0x13bd4a78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 17:36:38 2017 Not After : Thu Mar 31 17:36:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:a2:6f:a4:ae:f7:e1:5e:da:b2:f8:95:9a:f9:2f:b2: 7d:a7:f4:dd:ee:97:a3:cf:4e:21:92:7f:27:55:00:44: b0:b3:2d:24:db:e3:2f:dc:db:4f:57:bf:d8:ee:d9:c0: 41:97:3c:5b:04:88:2d:62:96:4a:39:2e:35:27:6b:0f: d0:a8:3d:15:cb:a2:ae:6d:9a:42:8d:45:33:eb:ba:99: 56:14:f5:68:20:b8:78:97:7f:74:77:55:66:db:83:3c: b8:a3:f6:63:ed:47:84:b7:bc:8e:4e:a7:35:04:93:9d: 45:25:d3:4f:e4:b5:7f:a5:ac:62:46:1d:3f:c0:74:e9: 1d:2a:2f:66:79:7c:19:54:2a:81:ad:11:97:75:d3:7d: f1:a8:a0:0b:17:98:3f:a8:7e:22:87:2a:a3:a2:2f:17: 12:31:5e:16:8f:ae:9c:4c:28:99:06:6a:67:dd:5d:be: de:f6:ca:5a:ec:5f:7b:e6:8b:bb:5c:21:a7:d8:62:2b: d7:11:30:d6:5e:65:c8:55:a8:e7:5e:bc:ae:a5:6c:63: ab:97:57:97:13:a1:8b:00:9c:dc:89:01:22:8b:31:73: d4:e6:62:4c:cd:9b:89:74:9d:c3:d4:94:bc:5a:a3:63: 9e:50:1d:2c:f7:01:06:54:4f:a9:19:ec:2d:db:e5:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:3f:55:d4:44:39:1d:52:9f:37:f7:fb:0b:51:86:31: 5f:5d:97:3d:06:ed:3d:6c:f5:da:6e:9a:6b:ec:03:1b: 07:d7:83:3f:f4:41:95:3b:ce:2c:b9:18:6d:4d:71:f1: a5:af:55:40:c5:99:1c:29:d7:6b:bd:8c:ee:7a:7a:ef: 85:a9:21:1e:62:eb:26:61:a8:b2:b3:43:fb:81:24:be: 15:49:7e:86:d2:e4:80:f9:5f:0e:61:cd:ed:cb:22:f5: c6:6b:e8:aa:a2:26:10:d4:f2:9d:19:17:93:53:01:79: 67:98:8d:28:10:db:92:6c:b1:39:1f:1a:5f:dc:cb:f1: 6c:f0:4c:9c:46:7c:d8:ba:b9:7e:92:63:ee:3d:af:3b: 68:b0:2d:77:18:b4:14:c3:bb:44:b3:90:0d:ec:4e:79: f7:8a:d3:c0:21:fc:0c:9a:5e:c2:d8:66:06:36:09:d0: 95:7c:ab:a1:1a:a9:39:ab:d7:f9:a6:50:9b:7d:17:16: 99:50:01:ea:b3:0c:a4:0c:3d:a7:6b:b1:32:bf:45:c1: db:a6:bb:f4:58:70:a1:47:e3:36:e4:06:ff:e2:1d:1f: 7e:85:fe:b7:16:3f:c9:c4:ae:c1:ed:2a:2c:36:35:ca: 74:77:a7:47:24:57:81:e1:fd:98:9c:7d:38:ce:64:1d Fingerprint (SHA-256): C1:4D:3D:C3:0A:60:EE:38:B6:F9:2A:53:79:0C:B6:15:48:8F:2A:32:9F:AF:32:84:80:CB:9B:31:65:B6:3B:A1 Fingerprint (SHA1): AA:2A:ED:75:26:10:C7:BE:51:FF:47:F3:CD:E8:A2:4F:2B:53:B2:7D Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #7716: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172472 (0x13bd4a78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 17:36:38 2017 Not After : Thu Mar 31 17:36:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:a2:6f:a4:ae:f7:e1:5e:da:b2:f8:95:9a:f9:2f:b2: 7d:a7:f4:dd:ee:97:a3:cf:4e:21:92:7f:27:55:00:44: b0:b3:2d:24:db:e3:2f:dc:db:4f:57:bf:d8:ee:d9:c0: 41:97:3c:5b:04:88:2d:62:96:4a:39:2e:35:27:6b:0f: d0:a8:3d:15:cb:a2:ae:6d:9a:42:8d:45:33:eb:ba:99: 56:14:f5:68:20:b8:78:97:7f:74:77:55:66:db:83:3c: b8:a3:f6:63:ed:47:84:b7:bc:8e:4e:a7:35:04:93:9d: 45:25:d3:4f:e4:b5:7f:a5:ac:62:46:1d:3f:c0:74:e9: 1d:2a:2f:66:79:7c:19:54:2a:81:ad:11:97:75:d3:7d: f1:a8:a0:0b:17:98:3f:a8:7e:22:87:2a:a3:a2:2f:17: 12:31:5e:16:8f:ae:9c:4c:28:99:06:6a:67:dd:5d:be: de:f6:ca:5a:ec:5f:7b:e6:8b:bb:5c:21:a7:d8:62:2b: d7:11:30:d6:5e:65:c8:55:a8:e7:5e:bc:ae:a5:6c:63: ab:97:57:97:13:a1:8b:00:9c:dc:89:01:22:8b:31:73: d4:e6:62:4c:cd:9b:89:74:9d:c3:d4:94:bc:5a:a3:63: 9e:50:1d:2c:f7:01:06:54:4f:a9:19:ec:2d:db:e5:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:3f:55:d4:44:39:1d:52:9f:37:f7:fb:0b:51:86:31: 5f:5d:97:3d:06:ed:3d:6c:f5:da:6e:9a:6b:ec:03:1b: 07:d7:83:3f:f4:41:95:3b:ce:2c:b9:18:6d:4d:71:f1: a5:af:55:40:c5:99:1c:29:d7:6b:bd:8c:ee:7a:7a:ef: 85:a9:21:1e:62:eb:26:61:a8:b2:b3:43:fb:81:24:be: 15:49:7e:86:d2:e4:80:f9:5f:0e:61:cd:ed:cb:22:f5: c6:6b:e8:aa:a2:26:10:d4:f2:9d:19:17:93:53:01:79: 67:98:8d:28:10:db:92:6c:b1:39:1f:1a:5f:dc:cb:f1: 6c:f0:4c:9c:46:7c:d8:ba:b9:7e:92:63:ee:3d:af:3b: 68:b0:2d:77:18:b4:14:c3:bb:44:b3:90:0d:ec:4e:79: f7:8a:d3:c0:21:fc:0c:9a:5e:c2:d8:66:06:36:09:d0: 95:7c:ab:a1:1a:a9:39:ab:d7:f9:a6:50:9b:7d:17:16: 99:50:01:ea:b3:0c:a4:0c:3d:a7:6b:b1:32:bf:45:c1: db:a6:bb:f4:58:70:a1:47:e3:36:e4:06:ff:e2:1d:1f: 7e:85:fe:b7:16:3f:c9:c4:ae:c1:ed:2a:2c:36:35:ca: 74:77:a7:47:24:57:81:e1:fd:98:9c:7d:38:ce:64:1d Fingerprint (SHA-256): C1:4D:3D:C3:0A:60:EE:38:B6:F9:2A:53:79:0C:B6:15:48:8F:2A:32:9F:AF:32:84:80:CB:9B:31:65:B6:3B:A1 Fingerprint (SHA1): AA:2A:ED:75:26:10:C7:BE:51:FF:47:F3:CD:E8:A2:4F:2B:53:B2:7D Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #7717: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172472 (0x13bd4a78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 17:36:38 2017 Not After : Thu Mar 31 17:36:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:a2:6f:a4:ae:f7:e1:5e:da:b2:f8:95:9a:f9:2f:b2: 7d:a7:f4:dd:ee:97:a3:cf:4e:21:92:7f:27:55:00:44: b0:b3:2d:24:db:e3:2f:dc:db:4f:57:bf:d8:ee:d9:c0: 41:97:3c:5b:04:88:2d:62:96:4a:39:2e:35:27:6b:0f: d0:a8:3d:15:cb:a2:ae:6d:9a:42:8d:45:33:eb:ba:99: 56:14:f5:68:20:b8:78:97:7f:74:77:55:66:db:83:3c: b8:a3:f6:63:ed:47:84:b7:bc:8e:4e:a7:35:04:93:9d: 45:25:d3:4f:e4:b5:7f:a5:ac:62:46:1d:3f:c0:74:e9: 1d:2a:2f:66:79:7c:19:54:2a:81:ad:11:97:75:d3:7d: f1:a8:a0:0b:17:98:3f:a8:7e:22:87:2a:a3:a2:2f:17: 12:31:5e:16:8f:ae:9c:4c:28:99:06:6a:67:dd:5d:be: de:f6:ca:5a:ec:5f:7b:e6:8b:bb:5c:21:a7:d8:62:2b: d7:11:30:d6:5e:65:c8:55:a8:e7:5e:bc:ae:a5:6c:63: ab:97:57:97:13:a1:8b:00:9c:dc:89:01:22:8b:31:73: d4:e6:62:4c:cd:9b:89:74:9d:c3:d4:94:bc:5a:a3:63: 9e:50:1d:2c:f7:01:06:54:4f:a9:19:ec:2d:db:e5:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:3f:55:d4:44:39:1d:52:9f:37:f7:fb:0b:51:86:31: 5f:5d:97:3d:06:ed:3d:6c:f5:da:6e:9a:6b:ec:03:1b: 07:d7:83:3f:f4:41:95:3b:ce:2c:b9:18:6d:4d:71:f1: a5:af:55:40:c5:99:1c:29:d7:6b:bd:8c:ee:7a:7a:ef: 85:a9:21:1e:62:eb:26:61:a8:b2:b3:43:fb:81:24:be: 15:49:7e:86:d2:e4:80:f9:5f:0e:61:cd:ed:cb:22:f5: c6:6b:e8:aa:a2:26:10:d4:f2:9d:19:17:93:53:01:79: 67:98:8d:28:10:db:92:6c:b1:39:1f:1a:5f:dc:cb:f1: 6c:f0:4c:9c:46:7c:d8:ba:b9:7e:92:63:ee:3d:af:3b: 68:b0:2d:77:18:b4:14:c3:bb:44:b3:90:0d:ec:4e:79: f7:8a:d3:c0:21:fc:0c:9a:5e:c2:d8:66:06:36:09:d0: 95:7c:ab:a1:1a:a9:39:ab:d7:f9:a6:50:9b:7d:17:16: 99:50:01:ea:b3:0c:a4:0c:3d:a7:6b:b1:32:bf:45:c1: db:a6:bb:f4:58:70:a1:47:e3:36:e4:06:ff:e2:1d:1f: 7e:85:fe:b7:16:3f:c9:c4:ae:c1:ed:2a:2c:36:35:ca: 74:77:a7:47:24:57:81:e1:fd:98:9c:7d:38:ce:64:1d Fingerprint (SHA-256): C1:4D:3D:C3:0A:60:EE:38:B6:F9:2A:53:79:0C:B6:15:48:8F:2A:32:9F:AF:32:84:80:CB:9B:31:65:B6:3B:A1 Fingerprint (SHA1): AA:2A:ED:75:26:10:C7:BE:51:FF:47:F3:CD:E8:A2:4F:2B:53:B2:7D Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #7718: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7719: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7720: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172502 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7721: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7722: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #7723: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7724: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 331172503 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7725: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7726: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #7727: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7728: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 331172504 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7729: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7730: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #7731: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7732: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 331172505 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7733: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7734: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #7735: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7736: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 331172506 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7737: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7738: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #7739: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7740: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 331172507 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7741: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7742: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #7743: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7744: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 331172508 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7745: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7746: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7747: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172502 (0x13bd4a96) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:42:48 2017 Not After : Thu Mar 31 17:42:48 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:38:fd:59:1a:0e:8f:de:3f:2b:21:66:f8:97:0a:49: 3b:6e:8f:3f:e6:dd:f5:2c:99:12:32:77:bc:df:9b:2b: 40:98:66:05:f8:c7:31:d8:83:81:e5:e3:2d:d5:0c:6b: 97:5d:86:44:13:c3:85:51:25:28:60:82:da:ba:93:47: e7:b5:6e:31:06:1c:84:b2:fa:03:5e:2a:45:3c:e8:7d: 82:9e:43:3c:ff:f2:bd:b3:80:b4:f0:81:eb:36:d7:b7: e7:87:92:cc:9e:f9:e6:c2:c0:f6:a4:e0:e2:69:66:92: 37:c8:8f:e8:e7:8d:02:5e:b6:04:4f:cd:89:fe:7f:e9: 7e:4e:31:a3:a1:d6:b1:0f:d5:8a:8d:e3:37:4c:02:56: 0e:0a:a6:c6:b0:e1:25:0c:1e:fe:45:dc:53:76:a4:2a: ad:44:27:8a:3f:81:69:c0:e5:6d:8f:b5:4d:fe:ca:99: c0:cc:18:f7:26:4e:01:fc:0e:34:3a:85:0f:54:36:47: 28:e9:f1:79:86:66:ac:8d:d1:b2:f4:73:51:b6:92:76: c3:a6:98:1a:c4:01:72:1b:bc:09:93:ba:64:e5:72:27: 7a:58:f0:36:ef:e9:82:be:59:8e:2f:5f:a1:0b:ef:8d: 87:16:40:a8:59:bb:fd:d9:9c:dd:e5:66:f6:e7:28:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:60:e5:dc:f8:5c:71:4f:dd:94:aa:37:37:7e:4c:5c: 01:c9:c1:5c:07:b6:8e:66:f2:68:56:90:04:1b:05:5c: 96:3c:7c:02:17:fe:d7:6d:98:5b:bb:d8:b6:df:94:a6: 87:e9:1b:65:f1:84:b4:5c:e4:8f:3d:1b:c3:08:10:ed: 32:e5:09:81:0d:c8:90:f7:f5:e1:0a:46:b0:b9:d6:ed: a4:c6:06:56:90:05:3f:b0:2a:dc:e7:48:77:6d:03:45: b1:7e:e4:52:7e:2d:0b:27:87:cb:dc:9a:f2:3d:68:6b: 74:d5:b5:eb:91:89:c5:d8:97:39:f5:5d:a6:f8:63:9b: 7a:36:9d:48:16:29:9c:ca:67:bd:52:a1:e1:c9:55:15: d1:56:72:77:d3:23:39:4d:62:c2:6e:4a:d2:f8:8e:95: d7:4b:86:2e:7c:93:ee:81:9c:12:37:e6:5d:af:51:f6: 96:50:73:57:26:70:b6:44:53:2b:6f:68:fc:d0:27:d0: 85:82:c5:7d:1a:fc:72:80:ed:5d:82:1f:2c:40:56:f2: 1b:0c:d0:d6:9d:eb:e8:63:6c:a1:8b:2e:af:96:ca:6c: e2:40:23:e8:50:86:2d:b2:fd:75:88:f8:c4:c8:64:29: e0:73:2c:1c:ea:72:21:fd:c5:b5:ba:cd:76:72:c5:d4 Fingerprint (SHA-256): 8F:02:B9:27:DE:02:E0:B4:E4:8B:4F:1C:DB:98:21:9C:A0:A9:9E:2B:A3:61:3D:80:8B:D2:92:03:33:92:04:45 Fingerprint (SHA1): 23:D1:A2:D8:76:4E:76:CD:95:17:DF:70:A0:BC:9F:13:57:6E:30:2C Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #7748: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7749: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7750: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #7751: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172502 (0x13bd4a96) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:42:48 2017 Not After : Thu Mar 31 17:42:48 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:38:fd:59:1a:0e:8f:de:3f:2b:21:66:f8:97:0a:49: 3b:6e:8f:3f:e6:dd:f5:2c:99:12:32:77:bc:df:9b:2b: 40:98:66:05:f8:c7:31:d8:83:81:e5:e3:2d:d5:0c:6b: 97:5d:86:44:13:c3:85:51:25:28:60:82:da:ba:93:47: e7:b5:6e:31:06:1c:84:b2:fa:03:5e:2a:45:3c:e8:7d: 82:9e:43:3c:ff:f2:bd:b3:80:b4:f0:81:eb:36:d7:b7: e7:87:92:cc:9e:f9:e6:c2:c0:f6:a4:e0:e2:69:66:92: 37:c8:8f:e8:e7:8d:02:5e:b6:04:4f:cd:89:fe:7f:e9: 7e:4e:31:a3:a1:d6:b1:0f:d5:8a:8d:e3:37:4c:02:56: 0e:0a:a6:c6:b0:e1:25:0c:1e:fe:45:dc:53:76:a4:2a: ad:44:27:8a:3f:81:69:c0:e5:6d:8f:b5:4d:fe:ca:99: c0:cc:18:f7:26:4e:01:fc:0e:34:3a:85:0f:54:36:47: 28:e9:f1:79:86:66:ac:8d:d1:b2:f4:73:51:b6:92:76: c3:a6:98:1a:c4:01:72:1b:bc:09:93:ba:64:e5:72:27: 7a:58:f0:36:ef:e9:82:be:59:8e:2f:5f:a1:0b:ef:8d: 87:16:40:a8:59:bb:fd:d9:9c:dd:e5:66:f6:e7:28:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:60:e5:dc:f8:5c:71:4f:dd:94:aa:37:37:7e:4c:5c: 01:c9:c1:5c:07:b6:8e:66:f2:68:56:90:04:1b:05:5c: 96:3c:7c:02:17:fe:d7:6d:98:5b:bb:d8:b6:df:94:a6: 87:e9:1b:65:f1:84:b4:5c:e4:8f:3d:1b:c3:08:10:ed: 32:e5:09:81:0d:c8:90:f7:f5:e1:0a:46:b0:b9:d6:ed: a4:c6:06:56:90:05:3f:b0:2a:dc:e7:48:77:6d:03:45: b1:7e:e4:52:7e:2d:0b:27:87:cb:dc:9a:f2:3d:68:6b: 74:d5:b5:eb:91:89:c5:d8:97:39:f5:5d:a6:f8:63:9b: 7a:36:9d:48:16:29:9c:ca:67:bd:52:a1:e1:c9:55:15: d1:56:72:77:d3:23:39:4d:62:c2:6e:4a:d2:f8:8e:95: d7:4b:86:2e:7c:93:ee:81:9c:12:37:e6:5d:af:51:f6: 96:50:73:57:26:70:b6:44:53:2b:6f:68:fc:d0:27:d0: 85:82:c5:7d:1a:fc:72:80:ed:5d:82:1f:2c:40:56:f2: 1b:0c:d0:d6:9d:eb:e8:63:6c:a1:8b:2e:af:96:ca:6c: e2:40:23:e8:50:86:2d:b2:fd:75:88:f8:c4:c8:64:29: e0:73:2c:1c:ea:72:21:fd:c5:b5:ba:cd:76:72:c5:d4 Fingerprint (SHA-256): 8F:02:B9:27:DE:02:E0:B4:E4:8B:4F:1C:DB:98:21:9C:A0:A9:9E:2B:A3:61:3D:80:8B:D2:92:03:33:92:04:45 Fingerprint (SHA1): 23:D1:A2:D8:76:4E:76:CD:95:17:DF:70:A0:BC:9F:13:57:6E:30:2C Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #7752: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7753: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7754: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7755: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172509 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7756: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7757: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7758: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7759: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331172510 --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #7760: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7761: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7762: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7763: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331172511 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7764: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7765: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #7766: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7767: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 331172512 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7768: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7769: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7770: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #7771: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #7772: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #7773: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172509 (0x13bd4a9d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:44:24 2017 Not After : Thu Mar 31 17:44:24 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f4:a4:31:11:51:d3:70:a3:8f:12:27:2a:c1:a0:ee: d9:e3:53:f9:d7:51:51:c9:ac:48:3d:9d:a7:9d:76:d3: 3f:3f:7a:bf:51:00:d5:9c:fc:e0:92:6c:16:f2:7a:8e: ff:52:a2:65:e3:4f:8c:ba:5d:9c:9d:8b:47:5b:e5:66: 0e:9c:b5:50:16:a5:30:b3:d6:77:a6:f3:26:14:c3:ce: e0:bb:f0:84:e6:bd:05:bb:b7:44:96:b2:d5:8c:4b:6a: 79:8e:42:60:45:ac:4a:ea:c8:27:3e:43:4b:b9:ba:6d: 1f:fe:7f:24:46:c7:af:f8:72:eb:f3:08:80:0c:8d:18: bb:d2:6a:7e:e4:c3:24:8f:5b:3f:0f:2c:3d:31:db:ec: 26:71:ff:ce:22:bd:97:58:43:10:47:fe:9a:1d:97:30: 20:c1:d7:2d:4e:34:ea:a5:aa:4e:ee:e8:03:fb:1c:1f: f6:b4:ee:e9:af:f5:0d:d9:e2:a5:89:b7:73:ee:cb:d3: eb:e4:f1:22:4d:b6:cb:c1:f1:7b:fa:87:95:0b:e5:e2: 9d:62:91:95:21:0c:aa:1e:99:d6:99:eb:c8:bb:e8:68: b8:1e:8c:58:f0:b5:72:97:b7:a8:2e:7c:f8:da:b0:ba: 70:ab:36:c0:b3:9a:d5:36:71:5e:b7:6b:cf:80:cb:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:f2:30:50:a5:d1:ec:59:1f:e6:2f:53:79:ad:69:b0: 48:e5:d7:51:73:87:76:6d:6e:71:80:88:b1:a8:ba:c0: 9c:69:d3:6b:66:11:79:fe:a9:10:65:55:7b:a3:0f:31: c7:fa:50:70:a8:da:f6:d7:5e:61:b6:13:ff:4f:57:e0: 2d:d5:44:be:52:73:f7:38:52:52:ed:bc:f0:9d:94:e4: 1a:ee:6f:e5:9e:5e:08:6a:a3:66:33:c0:e7:d3:53:04: fb:e9:fa:f1:76:bf:47:9a:5e:5d:1d:47:af:b9:6f:23: 97:23:48:0e:f5:21:78:e9:57:6a:ab:e9:a1:b8:24:e3: a0:6d:ad:d3:c0:47:34:85:38:c7:bc:48:9d:43:63:76: d1:e0:b7:37:af:5f:f1:03:11:af:da:b4:2d:b7:2e:4c: 1d:37:c6:95:5e:a1:c6:c3:93:a1:a0:3d:8e:33:3a:dc: 3d:9a:87:b9:30:d9:be:ce:ba:98:aa:9e:31:bb:48:d5: 77:7c:19:03:e3:61:65:26:0d:d3:68:6e:af:5f:4c:b6: cc:15:cb:15:84:e8:f7:8d:04:ee:a4:93:b5:60:3e:8a: 66:0a:80:bf:87:08:f3:81:6f:a5:65:0a:f4:92:cc:9a: 8f:be:8f:bd:46:49:92:a6:c5:f4:82:31:6a:20:f8:f1 Fingerprint (SHA-256): FE:DA:19:54:C9:CC:56:12:8C:49:5C:77:37:EE:44:53:75:68:97:91:C5:B8:EF:A9:7E:56:C7:B2:A1:8D:C8:87 Fingerprint (SHA1): 37:16:46:43:2F:D9:9D:7E:03:29:69:6A:2C:E2:B3:44:44:89:24:DE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7774: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7775: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7776: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172510 (0x13bd4a9e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:44:46 2017 Not After : Thu Mar 31 17:44:46 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:27:ca:25:93:7d:90:e5:48:67:cb:55:03:f0:4e:70: d7:ca:d9:31:15:92:e0:7a:0a:b9:df:2a:15:08:67:65: 36:2d:45:4a:50:aa:81:93:83:a6:11:1e:ef:78:ce:3a: 83:a0:ae:40:e3:1e:fc:b1:e0:98:4f:98:88:5e:d3:a6: 9f:d7:f9:7f:13:5b:71:dc:58:ee:da:b6:3b:8f:12:97: 04:55:37:5f:a8:a1:44:81:47:b0:42:02:98:ad:44:2c: 31:7d:7f:e1:7c:c5:6f:28:7f:f4:04:3e:58:82:e9:02: 42:53:74:a8:05:11:d0:27:b8:0a:d1:f3:17:9a:13:93: 60:bc:df:db:0d:46:51:49:c2:58:c3:16:f7:c4:a6:ea: d6:2b:d9:28:59:a5:ac:76:3d:78:4d:b7:3f:59:80:28: 59:fc:0a:ab:63:53:ef:5f:91:d0:af:48:84:2c:dc:9e: 74:d4:80:05:d2:f2:ec:9b:b5:1b:db:f7:03:02:03:d1: 57:01:52:ab:d4:91:2a:79:44:c9:94:f7:47:5e:90:5f: 11:ed:64:9f:45:67:2b:4e:15:fc:03:09:96:3d:10:a1: 00:d4:83:d5:71:7c:bf:49:1e:ed:a9:96:ea:a7:d2:4f: 9d:1d:9d:9c:5f:88:65:40:24:e8:84:8c:b6:80:b7:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c4:9f:d7:f0:e6:8f:36:c0:94:ae:6c:88:23:ba:00:33: 49:ae:f8:40:84:88:39:b0:34:09:80:5f:83:f4:bc:b0: a5:12:d5:59:61:80:53:3e:fe:47:04:e5:47:84:fe:ac: 46:10:60:04:e3:86:09:8f:f9:87:44:22:c5:9a:3a:69: 85:aa:88:2c:1a:f9:ee:d3:8b:83:6b:90:70:2d:eb:fb: c5:35:c7:a7:ce:af:12:eb:d1:19:29:05:03:ac:99:49: 5b:7e:53:36:95:c4:f2:8d:81:8d:34:a9:9c:08:d9:5c: f8:df:29:f5:eb:3a:6f:4e:9a:3d:ea:05:e4:99:74:1e: a8:63:bc:47:9d:06:a8:7b:8b:7e:13:89:f3:a0:a9:1b: 1f:58:76:79:db:f7:25:ce:da:c4:7a:f1:04:08:1b:83: 74:a8:0b:c3:5b:00:01:a7:86:76:7f:0a:af:60:f0:b5: f3:76:4c:99:c0:c3:80:92:70:f0:ec:00:89:44:e7:79: 85:43:aa:4f:b2:82:f4:0e:0e:e1:1c:c1:ba:ab:d1:e3: b0:49:aa:cb:b8:bd:4a:76:c8:2c:ef:92:06:7b:5f:1a: 0b:19:b2:84:5d:fe:89:e2:e0:c7:a5:78:84:a3:9d:a8: bd:2f:8f:fe:55:e6:75:c7:8d:e9:fb:91:da:b5:90:a0 Fingerprint (SHA-256): 15:74:9C:01:5B:7E:92:F5:D4:91:8D:56:60:31:CE:D0:AA:D2:91:E2:76:75:20:DA:ED:23:97:7A:06:D8:0C:2A Fingerprint (SHA1): A4:2E:8E:17:50:98:D1:E8:5A:18:88:73:B9:76:D9:AE:C9:D9:BD:1E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7777: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7778: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172511 (0x13bd4a9f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 17:44:53 2017 Not After : Thu Mar 31 17:44:53 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:cb:09:35:be:bd:47:77:c8:ef:d0:d2:19:20:bd:69: 02:e6:8c:45:47:a2:db:01:09:5a:c4:5a:2d:a6:6e:cf: 50:95:2e:03:6c:22:d1:14:49:18:28:40:52:8e:ef:d1: 0c:d6:be:da:6c:4c:f6:07:f3:96:fa:a8:96:4c:71:38: f5:24:22:8d:f3:9d:f6:d8:94:49:99:18:8e:c9:fa:f4: b9:6e:0f:b0:cc:7d:10:9c:37:4c:8e:c9:c8:bd:cc:f9: ab:11:72:bb:75:95:10:97:a4:80:13:ad:4f:40:4f:18: ee:51:4a:67:5d:d4:74:4a:df:e2:26:b3:a8:48:6f:a8: f3:3a:c3:6c:f4:ba:3c:3a:fb:b9:bd:ad:d4:17:45:07: a5:c6:98:7d:f9:f5:3c:d2:e0:ca:c8:89:68:0e:47:19: b9:2d:fb:20:b6:50:5c:5e:31:bf:95:92:35:12:06:5b: f8:6b:f1:2c:b0:87:ce:c1:a2:ca:93:30:49:01:7e:e8: 46:30:bc:5e:36:04:71:cb:b5:96:15:34:17:63:13:9b: 12:e4:c3:32:45:67:12:63:23:df:fa:92:11:27:9c:cf: 26:17:ca:55:1e:c0:ab:b5:1b:2f:f7:46:4e:5e:82:53: 43:9f:6c:73:53:00:f1:6f:a5:4c:79:81:89:20:c5:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:d4:ae:d6:d6:14:c7:77:cf:aa:68:f7:16:04:9d:ab: 71:c9:39:f3:28:35:42:6b:ad:d0:1d:05:e7:56:06:e4: 24:b0:01:ac:63:e6:d4:be:df:a2:62:d9:49:ca:de:e4: 33:f8:25:6a:56:01:ee:25:98:3c:27:b5:32:93:a1:fc: eb:d1:bf:49:46:7d:c1:ca:4d:ca:e7:ff:2e:00:67:ed: 60:b3:72:35:e0:4c:9f:4c:9e:28:d9:6f:f4:79:10:11: 95:15:8e:e7:0e:d7:3a:2f:1e:76:dc:7c:e2:99:cd:fa: d3:37:59:cd:77:8c:11:2b:90:02:3c:5f:7f:9f:bf:97: c1:b9:a2:9e:22:7e:1e:81:18:28:67:21:e4:16:8c:aa: 0d:11:14:79:31:0e:11:36:c2:02:47:7d:e8:9b:b5:8f: 69:c1:41:94:0e:82:34:af:95:69:29:e9:0f:8a:6e:50: 16:1b:9c:59:1d:6e:76:0a:c4:47:6e:e8:10:f7:48:71: 81:58:cd:0e:aa:d3:d7:57:a8:8d:0b:d2:f6:b4:1b:aa: 68:70:49:70:b2:94:3a:f1:c6:64:ea:2a:21:80:f1:de: b0:7b:e9:78:a0:95:f3:0f:c6:93:e5:f3:82:1b:f9:4d: 78:2d:1b:7b:b4:ba:cc:63:0e:dd:8c:2a:8c:e2:34:45 Fingerprint (SHA-256): 11:F9:66:C8:DE:67:1F:5B:19:A2:D7:C0:13:85:F2:56:D4:D8:E1:A1:B7:28:4C:E8:81:9B:B2:01:3C:7C:A0:9C Fingerprint (SHA1): 19:E7:DD:2D:4F:59:93:28:2C:B2:16:D5:6B:F2:43:7D:F0:C8:E4:73 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #7779: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7780: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172513 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7781: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7782: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7783: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7784: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331172514 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7785: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7786: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7787: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7788: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331172515 --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #7789: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7790: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #7791: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7792: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 331172516 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7793: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7794: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #7795: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7796: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 331172517 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7797: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7798: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7799: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #7800: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #7801: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #7802: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #7803: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172513 (0x13bd4aa1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:45:18 2017 Not After : Thu Mar 31 17:45:18 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:09:14:c2:ae:b1:ef:dc:8d:69:42:31:0d:f6:67:de: 79:69:7e:4e:e3:c8:31:a6:2c:82:b3:55:3a:b4:0a:10: 18:fd:4f:08:37:2d:ec:be:cc:e7:40:2d:17:6c:89:05: 61:f3:ef:45:dc:cb:08:ab:78:29:99:b8:bc:16:d7:c2: 56:c3:1b:26:f1:18:6a:0d:79:6c:61:df:35:4d:f6:c9: 16:d3:39:14:0b:f3:8d:8e:2e:1d:c2:b0:90:92:c7:c6: a5:4e:30:88:6d:5a:08:8a:3e:e1:d4:98:58:8a:15:4a: 2c:06:a5:f2:67:fa:86:32:50:85:fc:88:0d:4e:33:c6: 83:84:a0:94:e9:f4:1d:c3:85:6b:f9:9a:dc:3e:f7:82: 27:eb:a0:5d:ce:ca:da:0d:2d:42:c9:cf:1f:42:1e:fb: ea:2c:59:db:28:2a:5d:13:62:b7:26:ae:96:df:b2:a8: 79:54:b7:37:45:2c:29:43:95:53:24:bc:c0:08:c7:11: 7f:b9:10:7e:27:b5:4d:16:11:b7:21:59:6b:9f:5c:8e: 71:fe:d3:27:2f:64:af:0c:35:1c:9a:95:b1:a0:3b:98: 62:58:52:d3:33:8c:46:f3:7d:8a:27:96:e1:e6:0f:06: b0:94:6c:5a:4b:4b:62:33:b1:ea:f7:9c:7f:30:a9:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:c6:4b:9b:d6:6a:20:84:f0:84:4d:3b:a3:01:53:bf: e9:e9:ad:99:c4:d3:17:8c:3f:8d:f3:b1:06:62:16:d1: 5a:c1:ae:cd:65:06:3e:e1:0a:93:0e:7b:84:d6:28:1c: c7:6a:a8:d8:2c:50:6a:b8:b4:c3:cc:32:38:d1:03:ec: 8b:3e:7d:b9:09:60:e5:d4:29:b7:63:72:e6:b2:b7:4d: 67:79:b9:9b:d4:38:b1:fb:6f:57:fb:a9:cb:dd:4c:7d: e9:50:d4:29:39:1b:a7:37:47:df:d9:60:b1:ed:8e:31: c9:26:58:9b:ac:75:17:76:b7:a9:6d:e8:05:b1:50:63: 8e:c9:21:33:7c:14:0b:13:f8:58:bc:06:ad:45:4f:b7: 34:3e:9f:08:b5:3c:53:f5:41:e6:23:e4:b2:ce:e6:5a: 07:24:37:90:9b:3e:d5:75:1d:10:55:7d:51:d3:c9:56: ee:8d:9e:51:22:fc:4c:43:88:25:88:a3:16:ec:4e:5e: 37:e7:c2:79:e2:ea:cd:b7:d5:a3:11:fc:f1:66:69:40: 22:40:b6:4f:fd:16:c7:a1:5a:09:83:32:e3:5d:2e:56: dc:1b:44:75:af:c7:cf:f4:8c:c7:e5:e8:e2:d8:bc:0a: 99:b2:4e:47:8f:92:b7:08:a3:1b:9e:f3:c7:53:d2:fe Fingerprint (SHA-256): 95:60:03:D0:9F:60:54:B1:F5:94:0F:A1:0D:AF:3B:50:60:E7:54:56:1E:12:A6:D3:1A:F4:FA:FC:B3:BE:E8:3B Fingerprint (SHA1): AA:BF:CF:36:F5:0E:BC:08:46:8E:3E:E0:6E:62:2A:C2:00:B6:0D:C5 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7804: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7805: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172514 (0x13bd4aa2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:45:34 2017 Not After : Thu Mar 31 17:45:34 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:34:31:fd:5d:9b:7c:e9:53:90:6e:e6:9c:e5:e4:70: ce:53:4b:cd:11:e8:cc:77:f1:53:65:87:ab:cd:4d:c7: 24:6a:de:fc:11:35:9b:72:da:ed:29:43:49:3b:a6:eb: a6:97:1b:b1:5a:9d:c0:60:4f:df:d3:24:56:d0:03:25: 7e:f9:41:24:8d:c3:88:f5:32:f9:5e:64:a2:7d:02:40: 56:81:d2:56:09:c1:73:1e:29:e6:6a:33:12:01:09:f4: 6b:3c:52:49:09:a1:72:ca:e8:d7:9a:cf:32:b6:c8:05: 2b:ff:f4:2b:3f:d8:6d:bc:28:3f:28:41:de:0a:34:e2: c9:ca:52:4b:c4:98:4a:95:e6:a0:9a:57:b5:48:9d:9d: 6c:43:45:91:0d:4a:17:7f:3d:ed:bf:4b:17:9f:ec:77: f1:fe:67:7f:9a:5a:bc:94:63:59:b6:3a:90:31:1e:4b: 0c:88:59:09:c3:53:b8:5c:32:79:76:31:0f:b3:36:98: 4f:86:77:43:8a:60:c1:99:69:47:27:4a:6d:c0:f5:3a: d8:8f:10:7e:d3:76:a4:8b:62:f7:cb:53:42:8f:67:e3: cb:de:39:3e:4b:03:86:9a:88:4d:47:30:db:e8:fa:ce: b5:61:96:fd:17:aa:91:22:a5:e4:e2:87:64:55:d8:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:98:0c:32:3a:b6:78:e1:b3:10:73:dd:f9:24:7d:71: 78:cd:93:34:2f:60:c9:a9:d5:35:93:06:70:46:c9:3b: 10:73:64:e5:61:ed:12:28:5d:2e:74:49:0e:16:20:45: 74:7a:ce:f5:b2:9b:7f:9b:d2:b2:f9:43:db:ac:c5:1e: 6e:0e:92:7c:32:56:83:7d:68:9f:2c:12:5f:93:fb:f2: 1f:ed:e6:ad:72:9d:38:10:74:89:fc:66:6b:55:ba:aa: 61:78:78:ee:3c:a1:69:4f:9e:2a:17:0b:e1:ff:09:3d: 78:6b:94:86:1f:49:a2:bd:d5:62:e8:5c:36:a1:a0:a3: ab:7b:11:d5:1f:a0:0e:36:f2:f2:29:e5:f6:ec:e0:8f: 27:e0:fa:65:03:21:74:97:10:6b:bd:0c:77:5e:05:87: 26:5c:6a:96:ff:6f:d9:c5:da:6d:ac:46:c3:5a:90:20: be:e8:03:aa:a6:0b:22:3b:75:24:30:fb:bd:8c:36:09: 94:30:1a:91:cd:94:5b:bc:a8:7f:9b:8f:02:67:c3:72: 6c:55:ff:01:07:b6:b7:79:1b:61:85:45:fe:12:b0:dc: 71:84:14:87:f6:9b:70:0e:d1:cb:c2:99:16:34:22:d0: 0c:da:2a:78:60:b7:ed:fe:68:a6:89:ea:19:d1:5e:c6 Fingerprint (SHA-256): 65:16:1A:C1:A5:4A:2A:31:C2:54:64:E3:9B:6F:8E:61:C8:CD:F9:17:9A:D7:28:F3:74:EC:99:B7:D5:31:65:3D Fingerprint (SHA1): 8C:48:5E:15:1A:2B:65:25:C4:CB:F5:0F:B7:B1:33:FA:B9:FB:80:1A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7806: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7807: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7808: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172515 (0x13bd4aa3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 17:45:43 2017 Not After : Thu Mar 31 17:45:43 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:91:6f:42:fa:ba:25:7c:d8:50:3b:2f:42:a4:b5:f0: 3c:a7:b2:33:08:d9:bb:c7:cc:22:97:01:8d:f4:21:1d: 46:9e:37:64:49:ef:be:ea:4a:3d:93:db:d8:30:30:64: 7a:46:05:ef:6c:4a:fa:87:b5:bc:04:69:f9:fc:4f:e2: 72:65:d4:06:c7:a8:85:e4:e3:f1:4d:7e:83:8c:1e:40: 6f:f5:e4:71:73:0e:0a:38:64:c5:48:b9:4d:95:86:a8: 1e:30:75:d5:f1:cc:8f:b8:fc:13:03:6c:b4:05:f6:85: 3e:e9:7a:cc:17:9f:62:e3:56:29:b3:cf:ad:ae:ff:9e: 8c:c8:6e:47:24:28:f0:ab:09:61:62:f0:a4:65:4a:1d: cb:44:78:06:ba:a5:2b:c9:3f:cc:c5:2c:51:85:ac:6a: 59:aa:bb:59:ef:99:5f:bf:cf:27:a7:82:34:74:f3:62: fb:26:f4:5a:47:27:40:d4:9d:6f:58:fd:c2:9b:79:c0: 4a:99:51:08:41:51:49:ee:e7:38:f4:5f:a2:9e:09:66: 1d:b2:a9:9e:61:88:5b:73:8b:3c:f4:6a:2d:ab:09:0f: b6:71:d2:83:b7:6d:67:22:05:3b:e2:38:9e:51:7f:99: 7b:0a:78:c8:8f:54:84:61:b9:39:36:57:a1:7d:28:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:82:8c:c9:d1:1b:4d:c8:c9:c4:15:93:51:c0:d4:65: 27:ed:51:c8:93:73:ac:2f:a0:54:98:60:f9:ff:50:0e: 0e:03:55:31:01:10:aa:8c:08:e8:d2:54:c3:26:a7:6b: 59:27:98:a7:7b:d2:f7:e6:1e:ed:26:46:cf:c9:27:95: e4:1e:64:7c:67:cd:8e:65:27:ab:d2:24:1c:81:5f:31: ec:55:bf:50:7e:01:d0:e5:11:ec:a2:01:52:3c:76:d4: c5:b4:ea:78:3b:1f:75:9e:fa:92:d0:38:d5:4f:0f:28: 31:9c:8f:05:f5:cd:bb:c9:83:1a:35:72:d2:56:c9:6c: 19:7a:ec:30:7a:d9:4f:f4:1b:a8:cc:ea:2d:89:35:f8: da:9e:5e:4f:62:29:f3:7a:ab:52:a4:ca:d2:d7:0d:de: fe:ef:ae:84:7c:d4:cc:62:e9:52:b6:d9:4f:a5:af:6c: 7d:4f:8e:45:5f:21:2c:b3:51:f6:5f:53:58:71:f7:6c: 9f:64:48:33:3d:6d:a9:0a:b7:7b:c4:0b:f2:d3:5f:45: 4c:a0:df:68:4a:5e:72:92:e0:66:3d:a5:61:b1:64:bc: 8d:2e:f0:de:1e:3f:54:ba:7b:5c:d2:12:e8:9b:a6:72: 47:cd:8e:ca:50:7b:73:55:0b:54:17:b8:33:2d:54:f1 Fingerprint (SHA-256): D8:8A:4B:A3:E9:C3:DF:8A:73:EE:3F:0C:51:A5:96:17:B3:6D:FF:C4:00:F7:40:35:3E:90:70:59:EC:BA:21:E1 Fingerprint (SHA1): 46:EF:82:96:C6:4D:A1:12:9F:FB:12:86:78:08:BC:50:DF:49:89:27 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #7809: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7810: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172518 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7811: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7812: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7813: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7814: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331172519 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7815: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7816: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7817: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7818: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331172520 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA1Root-331172427.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7819: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7820: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #7821: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7822: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 331172521 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7823: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7824: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #7825: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172518 (0x13bd4aa6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:46:47 2017 Not After : Thu Mar 31 17:46:47 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:c8:8c:4e:61:e9:25:a8:c0:bf:d5:ce:29:43:0b:32: e0:a6:1a:7b:a1:f3:31:59:31:9b:13:5f:38:ef:f9:57: 0a:74:c7:22:ec:23:5f:4a:0b:e0:d5:e5:50:70:24:24: 3b:31:4a:6a:11:9c:9b:df:6e:a5:8f:4f:50:bf:01:f2: 30:67:89:b0:b7:4a:75:c9:0d:cd:73:b6:47:f0:9a:63: ad:8b:d8:ec:91:14:8d:27:04:ae:1c:e1:70:9c:43:36: ac:dd:55:24:d3:df:80:7e:54:5c:1f:00:9f:93:38:4b: 4f:ef:a4:8d:75:f2:33:4d:5b:41:e4:63:6f:cf:38:6f: 00:92:46:76:8d:de:d7:c9:c6:16:a8:ac:18:cf:db:8b: 1b:9f:6e:a2:be:29:9f:6e:19:9e:fb:1a:b2:9c:87:3f: ef:89:5e:fd:25:3e:52:c9:13:ff:19:cb:d1:f9:bb:bc: af:b8:84:c7:60:40:4f:cd:93:48:83:dc:cb:a2:a8:35: 68:90:95:66:a8:d3:6c:2c:fc:51:7d:ff:f1:2a:0a:14: 6f:85:7e:9c:be:3f:10:fb:6e:ad:a6:0b:89:6e:f0:48: 3c:2e:5b:33:b1:e1:89:de:ec:7f:c8:66:8b:e3:68:5a: 44:c4:41:a7:c9:3b:2e:d4:83:7c:90:92:ce:a9:bb:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:f2:91:72:51:5c:4a:96:de:15:29:d2:df:44:71:f6: 8e:23:93:2a:f3:0b:01:ff:bf:8c:2a:25:68:07:fd:a8: b2:a2:56:55:2d:02:b1:37:9b:97:39:79:42:19:76:78: 3a:72:c7:f5:9c:fd:70:22:d4:c2:41:14:c6:dc:1c:d0: d3:cd:78:ab:78:87:f8:42:02:16:ff:aa:56:f8:2a:87: a1:9d:71:5f:b5:bb:64:7e:bb:44:9f:cf:df:ed:42:39: 2f:9a:7e:bf:58:7c:22:cb:87:eb:67:4d:ef:f8:d9:2a: 85:2e:2b:e1:2d:03:ef:b3:3c:2a:06:35:8e:12:ba:55: a0:fd:35:d2:07:81:07:b3:b9:08:fa:bb:9f:04:67:0a: 5e:97:8d:ea:cc:51:3f:3c:91:1e:3f:76:1f:e1:fa:2c: 56:30:13:8f:4e:c3:31:db:43:d3:e5:8d:89:96:41:f1: a6:6a:6d:f6:44:90:44:60:d2:e2:42:48:87:59:25:a5: 6c:15:14:30:da:50:6d:6b:e4:10:54:dd:e0:d6:2f:ff: 07:41:28:81:0a:dd:07:a7:5e:59:76:a8:d7:cf:c3:52: e2:56:79:85:80:2d:58:2f:74:5f:f7:cb:ad:79:e0:04: 3b:be:9d:0f:9d:74:6b:a5:c8:50:68:df:4a:5e:08:c9 Fingerprint (SHA-256): 55:3F:29:A3:B2:05:6B:CF:C5:89:86:D9:7B:5E:70:D7:FF:85:22:B2:3C:E6:45:52:02:E2:F2:79:BB:94:63:6A Fingerprint (SHA1): 87:FE:7F:12:42:97:FD:42:1D:27:01:4E:F4:3A:0E:34:AD:80:7E:7E Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7826: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #7827: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172522 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7828: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #7829: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #7830: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172523 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7831: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #7832: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #7833: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7834: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 331172524 -7 Bridge@Army < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7835: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7836: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 331172525 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7837: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7838: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #7839: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7840: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7841: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 331172526 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-Bridge-331172428.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7842: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7843: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7844: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7845: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331172527 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7846: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7847: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #7848: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #7849: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172523 (0x13bd4aab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 17:47:39 2017 Not After : Thu Mar 31 17:47:39 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:81:ac:2e:61:15:e4:98:6f:3d:bd:96:4f:6c:a0:e3: 63:17:af:7f:33:92:18:30:7b:10:57:0b:22:35:85:26: e1:9b:20:48:0f:c9:a7:6a:c2:a8:b1:f8:b3:2b:f4:6f: 50:2b:70:a3:05:cd:b8:66:6a:b3:d6:8a:9f:15:0b:31: 3d:23:44:73:5e:7f:94:b4:bc:c3:fb:ae:6e:35:49:e7: df:26:af:29:2f:ab:3c:65:e3:a2:0a:01:27:50:b6:e0: b2:a1:dd:14:cd:01:a6:61:fd:af:19:50:dd:41:fb:cb: d4:81:2c:98:77:b2:7f:af:e6:92:dd:6a:2c:c1:2c:59: c3:ae:9e:37:00:e2:7c:aa:7d:6d:f5:fe:c4:a5:b9:d3: 57:7f:6c:f6:28:34:6e:fd:93:4a:71:be:55:c5:90:d5: 56:e2:af:8c:b2:fb:a6:23:04:cd:de:c1:37:02:52:75: b7:ce:63:d6:76:af:57:3c:5a:39:93:2b:22:be:be:94: 12:1c:35:28:94:86:a8:69:62:b5:0b:ec:56:a2:ac:65: 79:12:cb:54:e7:a3:c3:74:76:3d:87:5e:d1:0c:dd:a5: 46:3d:96:67:de:05:d5:b5:8b:18:c8:0c:69:c1:64:28: 13:75:32:e1:44:ec:53:9d:d2:ff:3f:a3:2c:57:89:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:5b:7f:d1:65:07:33:6d:5c:57:74:28:4b:c9:b6:13: 3d:64:32:35:30:fb:e6:d4:16:4f:76:fb:a7:4e:18:83: 50:ee:2a:1a:9c:bd:b7:7c:7a:b0:47:3e:14:e9:91:b5: 4b:df:b5:3c:d7:04:3f:f4:24:98:3e:2e:00:7b:9b:65: a8:45:0b:d6:f4:13:ff:44:b7:81:4d:8b:0a:63:88:ed: f2:c7:1a:80:6d:f0:47:79:31:54:05:11:b2:ac:07:30: 12:ed:8d:3b:7d:6a:09:0f:72:2f:21:d5:26:94:64:81: e5:47:8f:72:4b:5d:6c:e6:67:38:f3:dc:5a:47:c7:99: 92:f5:d9:2e:c6:54:af:fe:03:d8:b4:12:7b:6e:42:f3: 64:b5:2a:88:3a:b6:47:40:86:14:e2:f3:cb:38:73:61: 74:d9:2e:02:9d:4d:87:91:c7:ec:dc:83:b8:e8:8e:c7: 8a:77:fd:32:c6:a0:33:1e:22:e1:ed:8c:f4:ed:36:2d: 44:f4:69:d8:d9:21:6d:d3:c1:e6:89:18:22:df:a8:06: e5:ed:6b:43:29:05:37:ad:17:7e:f0:89:97:e9:77:9b: 99:20:7d:cf:15:5e:f8:a2:be:e6:a9:17:eb:1e:d8:b3: 8b:f6:00:68:31:58:03:f3:2c:18:9e:22:3c:58:0a:0f Fingerprint (SHA-256): B4:1F:7C:85:99:A0:F8:2D:36:F2:84:DC:7C:81:5D:70:09:21:88:50:36:C7:47:7C:1B:95:55:60:83:59:66:7F Fingerprint (SHA1): 19:22:9D:37:00:B2:E5:C5:D8:18:FE:8F:62:D0:C7:D8:CF:77:E0:7B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7850: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172523 (0x13bd4aab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 17:47:39 2017 Not After : Thu Mar 31 17:47:39 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:81:ac:2e:61:15:e4:98:6f:3d:bd:96:4f:6c:a0:e3: 63:17:af:7f:33:92:18:30:7b:10:57:0b:22:35:85:26: e1:9b:20:48:0f:c9:a7:6a:c2:a8:b1:f8:b3:2b:f4:6f: 50:2b:70:a3:05:cd:b8:66:6a:b3:d6:8a:9f:15:0b:31: 3d:23:44:73:5e:7f:94:b4:bc:c3:fb:ae:6e:35:49:e7: df:26:af:29:2f:ab:3c:65:e3:a2:0a:01:27:50:b6:e0: b2:a1:dd:14:cd:01:a6:61:fd:af:19:50:dd:41:fb:cb: d4:81:2c:98:77:b2:7f:af:e6:92:dd:6a:2c:c1:2c:59: c3:ae:9e:37:00:e2:7c:aa:7d:6d:f5:fe:c4:a5:b9:d3: 57:7f:6c:f6:28:34:6e:fd:93:4a:71:be:55:c5:90:d5: 56:e2:af:8c:b2:fb:a6:23:04:cd:de:c1:37:02:52:75: b7:ce:63:d6:76:af:57:3c:5a:39:93:2b:22:be:be:94: 12:1c:35:28:94:86:a8:69:62:b5:0b:ec:56:a2:ac:65: 79:12:cb:54:e7:a3:c3:74:76:3d:87:5e:d1:0c:dd:a5: 46:3d:96:67:de:05:d5:b5:8b:18:c8:0c:69:c1:64:28: 13:75:32:e1:44:ec:53:9d:d2:ff:3f:a3:2c:57:89:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:5b:7f:d1:65:07:33:6d:5c:57:74:28:4b:c9:b6:13: 3d:64:32:35:30:fb:e6:d4:16:4f:76:fb:a7:4e:18:83: 50:ee:2a:1a:9c:bd:b7:7c:7a:b0:47:3e:14:e9:91:b5: 4b:df:b5:3c:d7:04:3f:f4:24:98:3e:2e:00:7b:9b:65: a8:45:0b:d6:f4:13:ff:44:b7:81:4d:8b:0a:63:88:ed: f2:c7:1a:80:6d:f0:47:79:31:54:05:11:b2:ac:07:30: 12:ed:8d:3b:7d:6a:09:0f:72:2f:21:d5:26:94:64:81: e5:47:8f:72:4b:5d:6c:e6:67:38:f3:dc:5a:47:c7:99: 92:f5:d9:2e:c6:54:af:fe:03:d8:b4:12:7b:6e:42:f3: 64:b5:2a:88:3a:b6:47:40:86:14:e2:f3:cb:38:73:61: 74:d9:2e:02:9d:4d:87:91:c7:ec:dc:83:b8:e8:8e:c7: 8a:77:fd:32:c6:a0:33:1e:22:e1:ed:8c:f4:ed:36:2d: 44:f4:69:d8:d9:21:6d:d3:c1:e6:89:18:22:df:a8:06: e5:ed:6b:43:29:05:37:ad:17:7e:f0:89:97:e9:77:9b: 99:20:7d:cf:15:5e:f8:a2:be:e6:a9:17:eb:1e:d8:b3: 8b:f6:00:68:31:58:03:f3:2c:18:9e:22:3c:58:0a:0f Fingerprint (SHA-256): B4:1F:7C:85:99:A0:F8:2D:36:F2:84:DC:7C:81:5D:70:09:21:88:50:36:C7:47:7C:1B:95:55:60:83:59:66:7F Fingerprint (SHA1): 19:22:9D:37:00:B2:E5:C5:D8:18:FE:8F:62:D0:C7:D8:CF:77:E0:7B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7851: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #7852: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172528 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7853: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #7854: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #7855: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172529 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7856: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #7857: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #7858: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7859: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 331172530 -7 Bridge@Army < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7860: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7861: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 331172531 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7862: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7863: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #7864: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7865: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7866: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 331172532 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-Bridge-331172429.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7867: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7868: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7869: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7870: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331172533 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7871: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7872: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7873: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7874: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 331172534 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-BridgeNavy-331172430.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7875: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7876: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #7877: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7878: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 331172535 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7879: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7880: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #7881: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #7882: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172529 (0x13bd4ab1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 17:48:39 2017 Not After : Thu Mar 31 17:48:39 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:67:62:fa:ed:7d:6a:18:6b:4f:49:37:cc:0f:40:c5: 84:5a:3e:87:d3:d3:11:28:78:91:c6:e7:66:78:4a:7f: 6d:df:fa:16:d7:7f:e1:90:64:80:8d:77:0d:5c:2d:1a: 20:7a:c8:bf:5d:36:de:4d:45:0a:31:c9:f5:82:e8:92: 85:5e:b0:3b:2d:dd:a1:c8:5e:e9:62:e9:e6:83:c9:f3: 67:ea:95:ab:12:76:35:fe:aa:cb:f0:a5:39:ab:ac:2d: f3:5f:e8:23:a3:ef:6f:1d:ba:0b:df:68:b5:0c:96:2c: 16:46:fa:f0:6a:d1:8b:34:55:30:d2:17:7d:d9:68:a8: 6c:a7:11:63:9c:ba:64:87:0a:3a:ae:bd:f0:d8:b9:9f: 83:c1:2d:71:12:8b:a2:82:9c:31:86:dd:9c:8e:06:a6: 99:ad:56:36:19:c8:84:f7:c7:f4:70:e0:3b:2a:bf:16: 4f:8c:85:31:ef:f4:4e:7a:f4:c5:b9:ee:4a:6f:7f:13: 49:3d:b4:c4:74:7e:df:45:dd:6b:5c:51:2c:55:8a:03: dd:9c:d4:c0:26:c9:aa:bb:16:1a:66:08:23:7f:64:19: db:4d:40:b4:fd:b7:a7:c2:08:9f:f5:28:13:ee:c4:6d: b9:49:de:36:db:8e:0e:46:44:68:ba:47:d7:da:3b:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:40:1b:7a:34:94:5b:53:7b:62:96:e0:9b:9a:63:f0: 6b:95:b6:b1:e7:95:87:eb:7c:a5:d6:70:df:d2:d6:ee: 13:99:c0:22:00:5b:0f:5d:86:5f:c6:d3:3a:c2:60:32: ac:94:50:f0:97:01:84:4e:6c:9f:a5:ad:49:42:bc:58: a0:6c:8c:1e:d6:ed:7b:e1:5d:ce:2f:9a:c4:d7:52:a5: c3:a7:62:8a:ab:50:4d:b4:f1:c6:a5:2a:f1:6b:63:d7: cf:5b:71:81:9a:05:58:cc:fb:7d:fa:ff:76:2d:ce:a4: b6:3e:dc:38:6b:cf:12:af:a6:ca:2d:b8:a0:b5:99:e1: 60:fa:d6:91:dd:bf:0d:22:01:f9:cb:ba:9e:d0:38:86: f9:a0:73:22:cf:31:30:43:49:59:94:53:71:b8:d7:9a: 72:18:a1:5f:69:fd:0e:4f:e8:28:e0:ec:65:88:e8:65: 64:eb:56:3b:ef:26:c6:2b:62:0f:de:15:c5:3a:a9:57: 56:b3:68:9d:2a:83:14:57:83:15:a4:1c:77:f1:aa:05: bf:ec:bf:5f:7a:5b:13:fa:76:e0:87:94:2e:f0:9d:31: c4:80:5e:29:3d:96:e0:82:9a:34:54:76:02:4b:37:58: 10:43:2f:38:a3:aa:f8:42:ef:e7:7d:c1:90:91:ab:30 Fingerprint (SHA-256): 51:50:82:3D:5A:FA:43:E8:41:B9:C2:9F:AD:EE:D7:0C:A8:0D:6A:59:59:6A:D1:F8:A7:95:D8:3D:EB:82:D8:D6 Fingerprint (SHA1): 87:7F:3A:24:B9:AF:EF:96:FC:D2:1E:F3:05:60:10:89:77:8C:62:BA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7883: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172529 (0x13bd4ab1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 17:48:39 2017 Not After : Thu Mar 31 17:48:39 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:67:62:fa:ed:7d:6a:18:6b:4f:49:37:cc:0f:40:c5: 84:5a:3e:87:d3:d3:11:28:78:91:c6:e7:66:78:4a:7f: 6d:df:fa:16:d7:7f:e1:90:64:80:8d:77:0d:5c:2d:1a: 20:7a:c8:bf:5d:36:de:4d:45:0a:31:c9:f5:82:e8:92: 85:5e:b0:3b:2d:dd:a1:c8:5e:e9:62:e9:e6:83:c9:f3: 67:ea:95:ab:12:76:35:fe:aa:cb:f0:a5:39:ab:ac:2d: f3:5f:e8:23:a3:ef:6f:1d:ba:0b:df:68:b5:0c:96:2c: 16:46:fa:f0:6a:d1:8b:34:55:30:d2:17:7d:d9:68:a8: 6c:a7:11:63:9c:ba:64:87:0a:3a:ae:bd:f0:d8:b9:9f: 83:c1:2d:71:12:8b:a2:82:9c:31:86:dd:9c:8e:06:a6: 99:ad:56:36:19:c8:84:f7:c7:f4:70:e0:3b:2a:bf:16: 4f:8c:85:31:ef:f4:4e:7a:f4:c5:b9:ee:4a:6f:7f:13: 49:3d:b4:c4:74:7e:df:45:dd:6b:5c:51:2c:55:8a:03: dd:9c:d4:c0:26:c9:aa:bb:16:1a:66:08:23:7f:64:19: db:4d:40:b4:fd:b7:a7:c2:08:9f:f5:28:13:ee:c4:6d: b9:49:de:36:db:8e:0e:46:44:68:ba:47:d7:da:3b:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:40:1b:7a:34:94:5b:53:7b:62:96:e0:9b:9a:63:f0: 6b:95:b6:b1:e7:95:87:eb:7c:a5:d6:70:df:d2:d6:ee: 13:99:c0:22:00:5b:0f:5d:86:5f:c6:d3:3a:c2:60:32: ac:94:50:f0:97:01:84:4e:6c:9f:a5:ad:49:42:bc:58: a0:6c:8c:1e:d6:ed:7b:e1:5d:ce:2f:9a:c4:d7:52:a5: c3:a7:62:8a:ab:50:4d:b4:f1:c6:a5:2a:f1:6b:63:d7: cf:5b:71:81:9a:05:58:cc:fb:7d:fa:ff:76:2d:ce:a4: b6:3e:dc:38:6b:cf:12:af:a6:ca:2d:b8:a0:b5:99:e1: 60:fa:d6:91:dd:bf:0d:22:01:f9:cb:ba:9e:d0:38:86: f9:a0:73:22:cf:31:30:43:49:59:94:53:71:b8:d7:9a: 72:18:a1:5f:69:fd:0e:4f:e8:28:e0:ec:65:88:e8:65: 64:eb:56:3b:ef:26:c6:2b:62:0f:de:15:c5:3a:a9:57: 56:b3:68:9d:2a:83:14:57:83:15:a4:1c:77:f1:aa:05: bf:ec:bf:5f:7a:5b:13:fa:76:e0:87:94:2e:f0:9d:31: c4:80:5e:29:3d:96:e0:82:9a:34:54:76:02:4b:37:58: 10:43:2f:38:a3:aa:f8:42:ef:e7:7d:c1:90:91:ab:30 Fingerprint (SHA-256): 51:50:82:3D:5A:FA:43:E8:41:B9:C2:9F:AD:EE:D7:0C:A8:0D:6A:59:59:6A:D1:F8:A7:95:D8:3D:EB:82:D8:D6 Fingerprint (SHA1): 87:7F:3A:24:B9:AF:EF:96:FC:D2:1E:F3:05:60:10:89:77:8C:62:BA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7884: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #7885: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172528 (0x13bd4ab0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 17:48:23 2017 Not After : Thu Mar 31 17:48:23 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:cf:9f:e6:6a:8c:10:99:09:d5:04:7b:d7:e1:90:08: 64:10:05:dd:e9:cd:53:fb:ae:04:36:e2:32:9c:0b:53: 6f:b8:74:33:c0:5d:60:c7:3b:69:99:cb:98:ca:18:b3: b8:84:5d:8f:36:77:7e:db:03:60:49:47:4c:a2:4b:69: b8:84:27:fe:31:1b:34:eb:74:2e:65:dd:24:bb:c2:0d: 7a:5b:84:22:7a:c6:1d:f6:5a:9f:18:f9:7f:66:ee:fc: 73:2f:9c:63:66:ad:14:7f:aa:19:13:12:73:b4:18:b5: 06:8a:02:44:b3:f0:e3:a4:db:2f:38:3c:47:75:2c:73: f4:f0:6d:20:f3:9f:ec:2a:db:89:d8:6c:f3:a0:d3:32: 9e:a7:41:22:ea:e6:63:79:6c:a7:14:87:2b:09:33:b9: 62:68:86:2c:99:e0:67:6a:a3:ec:df:24:20:da:3e:14: 94:56:0a:a1:8c:88:30:42:e5:2b:fc:94:bc:5d:61:7a: 26:5c:75:be:83:30:38:c8:7f:2e:e9:60:4b:78:a3:55: cb:a9:b0:4f:e3:17:d8:b5:66:ee:71:49:be:09:4f:35: 0c:56:40:9f:fa:ac:cf:eb:e7:99:90:de:ef:e2:7d:1f: 4e:dd:1f:2f:6d:13:e9:93:08:51:30:22:68:b5:0e:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:41:23:8a:77:25:db:4e:e2:97:57:3a:31:26:59:47: 34:97:42:09:c4:5c:34:70:0d:56:08:69:b5:d0:c3:42: eb:a9:c7:c4:e5:c2:c7:86:d7:5d:9b:32:86:08:46:a1: 69:90:12:22:9d:3f:f7:2c:a4:9d:ce:bf:42:d9:76:39: b7:e4:6c:4c:c5:b9:54:ad:f0:8f:e3:33:ad:c0:92:a9: 78:51:6b:b9:d2:77:a7:83:ad:18:d3:20:0c:8b:98:6b: ef:5b:f0:46:e3:ec:ac:ec:e1:14:9b:54:d2:11:1b:57: 21:c2:84:19:53:da:99:bd:a0:a6:18:95:b3:af:bd:06: fa:10:09:9a:2c:68:33:c6:c9:55:a8:f2:24:d4:d3:32: a9:f5:9a:4d:59:a8:88:f9:7f:b6:8d:f9:36:46:9f:01: 33:92:3a:93:f8:f4:2f:ff:34:b4:9a:bb:f1:1c:0b:06: b4:48:29:c1:6f:b1:cf:95:79:4f:07:64:bd:31:08:e8: 33:a3:5d:d0:ea:14:7d:48:66:50:e9:91:d3:e1:b5:1f: 1e:73:1b:67:40:e8:70:0a:35:64:63:eb:9a:5d:4e:cb: 6c:79:b3:c8:b5:06:f8:46:eb:f5:51:2b:51:25:30:3d: a4:d1:58:3b:87:01:8a:37:47:3e:7a:ee:ab:9b:8d:f3 Fingerprint (SHA-256): 9C:31:44:48:32:56:4E:5B:83:14:96:5C:21:0E:EF:86:35:32:3E:C0:8E:D2:AA:B1:76:5E:6F:3C:3D:34:BE:58 Fingerprint (SHA1): FE:C6:09:9B:68:61:D3:5F:F3:57:E3:57:CC:22:AE:8B:81:23:97:3B Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7886: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172529 (0x13bd4ab1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 17:48:39 2017 Not After : Thu Mar 31 17:48:39 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:67:62:fa:ed:7d:6a:18:6b:4f:49:37:cc:0f:40:c5: 84:5a:3e:87:d3:d3:11:28:78:91:c6:e7:66:78:4a:7f: 6d:df:fa:16:d7:7f:e1:90:64:80:8d:77:0d:5c:2d:1a: 20:7a:c8:bf:5d:36:de:4d:45:0a:31:c9:f5:82:e8:92: 85:5e:b0:3b:2d:dd:a1:c8:5e:e9:62:e9:e6:83:c9:f3: 67:ea:95:ab:12:76:35:fe:aa:cb:f0:a5:39:ab:ac:2d: f3:5f:e8:23:a3:ef:6f:1d:ba:0b:df:68:b5:0c:96:2c: 16:46:fa:f0:6a:d1:8b:34:55:30:d2:17:7d:d9:68:a8: 6c:a7:11:63:9c:ba:64:87:0a:3a:ae:bd:f0:d8:b9:9f: 83:c1:2d:71:12:8b:a2:82:9c:31:86:dd:9c:8e:06:a6: 99:ad:56:36:19:c8:84:f7:c7:f4:70:e0:3b:2a:bf:16: 4f:8c:85:31:ef:f4:4e:7a:f4:c5:b9:ee:4a:6f:7f:13: 49:3d:b4:c4:74:7e:df:45:dd:6b:5c:51:2c:55:8a:03: dd:9c:d4:c0:26:c9:aa:bb:16:1a:66:08:23:7f:64:19: db:4d:40:b4:fd:b7:a7:c2:08:9f:f5:28:13:ee:c4:6d: b9:49:de:36:db:8e:0e:46:44:68:ba:47:d7:da:3b:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:40:1b:7a:34:94:5b:53:7b:62:96:e0:9b:9a:63:f0: 6b:95:b6:b1:e7:95:87:eb:7c:a5:d6:70:df:d2:d6:ee: 13:99:c0:22:00:5b:0f:5d:86:5f:c6:d3:3a:c2:60:32: ac:94:50:f0:97:01:84:4e:6c:9f:a5:ad:49:42:bc:58: a0:6c:8c:1e:d6:ed:7b:e1:5d:ce:2f:9a:c4:d7:52:a5: c3:a7:62:8a:ab:50:4d:b4:f1:c6:a5:2a:f1:6b:63:d7: cf:5b:71:81:9a:05:58:cc:fb:7d:fa:ff:76:2d:ce:a4: b6:3e:dc:38:6b:cf:12:af:a6:ca:2d:b8:a0:b5:99:e1: 60:fa:d6:91:dd:bf:0d:22:01:f9:cb:ba:9e:d0:38:86: f9:a0:73:22:cf:31:30:43:49:59:94:53:71:b8:d7:9a: 72:18:a1:5f:69:fd:0e:4f:e8:28:e0:ec:65:88:e8:65: 64:eb:56:3b:ef:26:c6:2b:62:0f:de:15:c5:3a:a9:57: 56:b3:68:9d:2a:83:14:57:83:15:a4:1c:77:f1:aa:05: bf:ec:bf:5f:7a:5b:13:fa:76:e0:87:94:2e:f0:9d:31: c4:80:5e:29:3d:96:e0:82:9a:34:54:76:02:4b:37:58: 10:43:2f:38:a3:aa:f8:42:ef:e7:7d:c1:90:91:ab:30 Fingerprint (SHA-256): 51:50:82:3D:5A:FA:43:E8:41:B9:C2:9F:AD:EE:D7:0C:A8:0D:6A:59:59:6A:D1:F8:A7:95:D8:3D:EB:82:D8:D6 Fingerprint (SHA1): 87:7F:3A:24:B9:AF:EF:96:FC:D2:1E:F3:05:60:10:89:77:8C:62:BA Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7887: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172529 (0x13bd4ab1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 17:48:39 2017 Not After : Thu Mar 31 17:48:39 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:67:62:fa:ed:7d:6a:18:6b:4f:49:37:cc:0f:40:c5: 84:5a:3e:87:d3:d3:11:28:78:91:c6:e7:66:78:4a:7f: 6d:df:fa:16:d7:7f:e1:90:64:80:8d:77:0d:5c:2d:1a: 20:7a:c8:bf:5d:36:de:4d:45:0a:31:c9:f5:82:e8:92: 85:5e:b0:3b:2d:dd:a1:c8:5e:e9:62:e9:e6:83:c9:f3: 67:ea:95:ab:12:76:35:fe:aa:cb:f0:a5:39:ab:ac:2d: f3:5f:e8:23:a3:ef:6f:1d:ba:0b:df:68:b5:0c:96:2c: 16:46:fa:f0:6a:d1:8b:34:55:30:d2:17:7d:d9:68:a8: 6c:a7:11:63:9c:ba:64:87:0a:3a:ae:bd:f0:d8:b9:9f: 83:c1:2d:71:12:8b:a2:82:9c:31:86:dd:9c:8e:06:a6: 99:ad:56:36:19:c8:84:f7:c7:f4:70:e0:3b:2a:bf:16: 4f:8c:85:31:ef:f4:4e:7a:f4:c5:b9:ee:4a:6f:7f:13: 49:3d:b4:c4:74:7e:df:45:dd:6b:5c:51:2c:55:8a:03: dd:9c:d4:c0:26:c9:aa:bb:16:1a:66:08:23:7f:64:19: db:4d:40:b4:fd:b7:a7:c2:08:9f:f5:28:13:ee:c4:6d: b9:49:de:36:db:8e:0e:46:44:68:ba:47:d7:da:3b:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:40:1b:7a:34:94:5b:53:7b:62:96:e0:9b:9a:63:f0: 6b:95:b6:b1:e7:95:87:eb:7c:a5:d6:70:df:d2:d6:ee: 13:99:c0:22:00:5b:0f:5d:86:5f:c6:d3:3a:c2:60:32: ac:94:50:f0:97:01:84:4e:6c:9f:a5:ad:49:42:bc:58: a0:6c:8c:1e:d6:ed:7b:e1:5d:ce:2f:9a:c4:d7:52:a5: c3:a7:62:8a:ab:50:4d:b4:f1:c6:a5:2a:f1:6b:63:d7: cf:5b:71:81:9a:05:58:cc:fb:7d:fa:ff:76:2d:ce:a4: b6:3e:dc:38:6b:cf:12:af:a6:ca:2d:b8:a0:b5:99:e1: 60:fa:d6:91:dd:bf:0d:22:01:f9:cb:ba:9e:d0:38:86: f9:a0:73:22:cf:31:30:43:49:59:94:53:71:b8:d7:9a: 72:18:a1:5f:69:fd:0e:4f:e8:28:e0:ec:65:88:e8:65: 64:eb:56:3b:ef:26:c6:2b:62:0f:de:15:c5:3a:a9:57: 56:b3:68:9d:2a:83:14:57:83:15:a4:1c:77:f1:aa:05: bf:ec:bf:5f:7a:5b:13:fa:76:e0:87:94:2e:f0:9d:31: c4:80:5e:29:3d:96:e0:82:9a:34:54:76:02:4b:37:58: 10:43:2f:38:a3:aa:f8:42:ef:e7:7d:c1:90:91:ab:30 Fingerprint (SHA-256): 51:50:82:3D:5A:FA:43:E8:41:B9:C2:9F:AD:EE:D7:0C:A8:0D:6A:59:59:6A:D1:F8:A7:95:D8:3D:EB:82:D8:D6 Fingerprint (SHA1): 87:7F:3A:24:B9:AF:EF:96:FC:D2:1E:F3:05:60:10:89:77:8C:62:BA Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7888: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #7889: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172536 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7890: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #7891: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #7892: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172537 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7893: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #7894: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #7895: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7896: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 331172538 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7897: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7898: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #7899: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7900: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 331172539 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7901: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7902: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #7903: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7904: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 331172540 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #7905: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7906: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 331172541 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #7907: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7908: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #7909: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7910: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7911: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 331172542 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7912: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7913: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7914: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7915: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 331172543 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7916: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7917: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7918: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7919: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331172544 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7920: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7921: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #7922: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7923: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 331172545 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7924: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7925: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7926: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172536 (0x13bd4ab8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 17:49:53 2017 Not After : Thu Mar 31 17:49:53 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:36:b3:1a:53:86:2e:f9:cb:df:3b:b1:73:f4:f9:7b: c7:fb:e6:dd:0f:5b:2a:f9:cd:7f:b2:2a:29:5f:0b:a5: 7e:1a:64:62:94:74:f6:f6:21:c7:37:1e:a1:7b:2c:b2: 94:00:f2:4f:6c:05:c9:df:93:e9:a5:11:4f:27:33:b5: 1d:a4:77:48:6b:3e:a0:6d:f5:32:81:f9:96:20:9a:cf: b8:1c:f0:94:a8:c1:22:cb:ed:f4:41:4c:0a:4d:fd:42: 34:76:db:cb:95:d1:fa:ef:5f:8c:72:f7:aa:a2:ba:43: da:9e:6e:95:6c:20:c2:00:de:17:0c:1d:f2:40:47:b1: a9:9c:97:05:70:36:88:a0:bf:1d:e9:60:5f:7a:2c:d7: 8c:a8:ae:02:ca:01:a2:00:5e:79:6d:0d:a2:79:46:51: 7d:82:6a:5a:ac:74:41:fc:17:90:27:a8:44:8d:fe:7d: 55:24:e9:d2:dc:fd:05:d7:55:6b:e7:1d:9c:2e:15:8f: 34:eb:cf:76:05:4f:1c:16:cb:2b:1f:17:1d:5f:83:3d: 2c:d6:79:5e:b8:dd:11:90:26:7c:67:7c:1d:d9:cb:11: 81:2c:bd:91:5b:7a:06:40:ca:92:f0:f2:0d:2e:ff:8a: f8:aa:0e:e7:1d:ff:6b:3b:f1:7a:ba:76:3c:4f:b4:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:31:ab:3b:81:1a:70:01:f1:cc:ad:f5:66:aa:f3:5a: 56:c3:7e:73:6c:c2:f5:ca:f3:a1:5a:d1:94:29:3c:2c: f6:ea:da:85:a0:6f:df:cf:27:d3:e6:6e:6c:47:1f:21: 85:ae:3b:89:bf:d1:fb:bd:93:fe:44:e8:1f:15:8e:41: 8f:c3:2c:ce:f0:4e:71:4f:2e:9e:fe:3f:84:b0:c7:69: 6a:c2:cc:10:dc:96:6f:b6:4d:b1:98:01:c0:0a:73:52: 31:61:ea:6b:91:e8:65:09:8f:b4:e1:bb:96:6f:6d:1f: e3:2d:fc:b3:b8:47:48:5e:fc:d0:8f:09:2c:ef:a3:82: a0:e5:57:89:7f:44:ff:f9:7f:80:88:47:1c:a8:4a:24: 26:f8:9a:42:ca:58:07:cb:07:0c:05:50:06:05:ac:a4: b3:fa:98:c3:45:b4:b1:ca:60:af:3f:b0:ac:16:06:49: e3:26:1e:50:7d:67:f4:27:fa:41:0d:77:15:56:ba:15: ac:b0:e5:a7:a1:96:26:18:a4:9b:fe:67:47:97:ef:b8: be:66:cd:43:de:65:92:cb:06:8a:73:97:f1:24:cb:48: d5:b4:37:aa:44:bd:cc:c2:a2:8e:76:41:30:db:f4:cf: 9f:f6:36:99:b9:e6:d8:c9:f7:35:5f:49:90:c2:94:69 Fingerprint (SHA-256): 45:80:7E:FB:1B:11:83:6A:75:21:5E:0D:40:EF:B9:AD:E3:79:1F:EE:5A:D5:CA:37:9F:82:A2:CA:F1:49:71:E3 Fingerprint (SHA1): 8D:38:4B:4E:9F:43:10:21:F8:3E:1A:54:27:83:14:B0:15:B9:1C:26 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #7927: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7928: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7929: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7930: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7931: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7932: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7933: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7934: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7935: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172537 (0x13bd4ab9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 17:50:00 2017 Not After : Thu Mar 31 17:50:00 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:5a:7b:82:1e:3b:58:39:56:f8:2a:c0:d4:ed:36:5e: 14:b6:79:6c:d7:5f:d4:0b:db:cf:03:dd:f4:0a:07:36: bc:54:d2:44:d5:89:7a:a7:87:d5:46:72:0d:9a:d9:bc: 38:a5:39:ee:73:ab:71:fe:6e:10:f6:28:ab:d0:72:09: 21:31:01:5b:5f:5a:b7:25:cf:af:19:37:01:bf:c4:cd: 50:d8:bc:2a:75:04:d9:85:53:bc:2f:8e:96:6a:92:d0: 32:bc:b5:15:ac:5c:fb:fd:49:09:e4:3d:f6:92:ee:80: d4:96:d1:7a:34:16:dd:ad:ff:f0:fa:01:1e:b6:9c:d9: ef:7f:df:7c:da:47:00:a8:45:fe:55:47:7b:57:78:a1: 70:f4:6a:a8:8a:4a:6b:c8:44:69:69:fd:98:02:12:4a: 36:26:cf:f9:46:f1:2f:44:f6:48:b3:86:21:d3:74:0a: 25:e9:76:65:7e:7b:ea:f7:44:29:51:f2:75:16:a9:97: 6c:4f:19:8e:bf:36:b5:c1:6b:bb:cc:11:73:61:34:0c: 05:30:cf:5b:9a:ef:6c:ed:3e:6e:60:c1:96:8c:a4:77: f5:f2:62:a7:a6:d0:e1:29:e9:6d:9c:9b:36:63:65:79: fd:eb:a9:6a:ff:59:82:af:31:dc:65:63:ab:39:8c:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:e7:bf:03:19:3d:d7:88:4c:05:55:74:77:43:db:9f: 90:de:bd:13:0c:1e:79:6b:d7:d8:c5:e5:2a:89:1c:c1: b7:d0:56:55:46:70:be:79:0a:b2:be:62:d0:82:e4:42: 12:7e:ac:82:3f:a2:83:46:18:9a:37:8c:2e:2b:be:62: 13:2d:23:e3:f6:3f:c4:24:95:39:71:6f:63:22:40:c6: f6:ee:fc:39:60:d4:31:2b:62:e1:6b:7d:dd:f2:09:8b: 08:f3:a9:57:fa:03:79:8f:32:dd:92:52:05:92:da:d4: 58:84:b0:8f:01:66:14:8b:db:51:87:24:17:d6:6e:70: be:48:a4:ad:a8:58:8c:39:ca:11:58:4e:ef:28:73:69: e3:ed:43:68:64:77:6b:63:0c:0e:d7:86:fd:c1:94:80: 8f:4e:9f:d7:c1:61:7c:91:c4:35:5b:9f:2c:d7:10:53: 58:9b:9b:44:af:86:0d:25:0e:6e:84:ad:a5:1e:78:1f: e3:81:a3:b6:f3:e5:65:12:b2:7f:5e:8b:6f:0a:6b:ba: 5b:1d:cc:d7:4d:da:e4:96:a9:83:41:dc:5d:25:6f:18: 33:af:12:c0:4c:08:62:03:3d:40:36:c1:e0:86:03:01: 81:7c:7d:92:01:88:c3:f0:f6:d3:7f:16:ef:61:57:d6 Fingerprint (SHA-256): EA:20:83:58:23:FE:CC:49:71:5F:3C:42:0B:54:FF:06:D5:59:8A:88:6A:CF:E1:D7:B0:53:80:2F:4B:D8:9D:EF Fingerprint (SHA1): C8:10:F9:71:75:D3:D2:FA:46:88:3E:37:96:D0:A9:2E:E7:46:31:17 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #7936: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7937: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7938: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7939: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7940: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7941: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7942: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #7943: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #7944: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #7945: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #7946: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #7947: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #7948: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #7949: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #7950: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #7951: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #7952: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #7953: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7954: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172546 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7955: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7956: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7957: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7958: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331172547 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7959: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7960: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7961: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7962: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331172548 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7963: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7964: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7965: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7966: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 331172549 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7967: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7968: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #7969: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7970: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 331172550 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7971: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7972: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #7973: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7974: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 331172551 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7975: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7976: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #7977: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7978: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 331172552 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7979: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7980: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #7981: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7982: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 331172553 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7983: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7984: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #7985: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7986: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 331172554 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7987: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7988: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7989: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172546 (0x13bd4ac2) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:51:48 2017 Not After : Thu Mar 31 17:51:48 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 3a:3d:48:c7:6a:88:c0:35:41:20:e1:d0:10:69:23:c7: d4:4e:50:78:1c:d4:b7:7c:68:c5:0b:b3:ec:ac:7c:5c: 75:a5:63:eb:13:59:81:46:4e:4f:00:af:e1:44:e0:22: 93:b2:a1:34:98:f8:b8:08:52:41:b6:73:be:4a:ca:81: 5e:39:ee:af:43:de:ac:71:2c:dc:1b:6d:b9:8c:cc:17: cf:33:1a:c6:70:3e:28:53:f3:44:98:19:f6:5f:a6:7c: 32:f8:70:60:6f:32:8b:15:ca:16:74:51:30:4a:7d:e7: 17:fc:21:c5:e6:f7:1e:05:ec:70:c4:c0:33:81:fd:db: db:00:77:97:56:85:67:f0:65:a1:37:39:9d:ab:b6:46: 6f:b9:7f:e6:44:46:ed:7c:da:3b:a2:5a:bf:ad:2a:1a: 23:31:70:b5:79:0a:1b:59:2c:34:c9:49:4b:99:66:bf: 7c:59:41:b6:88:85:be:d1:2c:ba:8f:cc:92:60:c2:b5: aa:9f:8c:dd:08:43:b3:79:3b:13:56:df:02:9e:54:c1: af:a9:74:2b:93:eb:1f:e6:82:ec:f3:2c:e9:e1:bd:16: 74:d6:74:60:96:55:a7:1c:32:27:50:f2:fc:64:55:ab: 82:24:eb:57:6c:bd:ad:3f:c7:41:c6:6d:c9:33:ae:03 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:13:18:ec:74:54:da:90:43:25:9e:7e:59: 65:86:b6:ec:01:bf:ce:52:ee:72:ba:27:2d:b0:35:5b: 02:1d:00:ba:98:77:4b:80:a7:e3:cb:c0:ac:98:4f:1a: 3c:64:5c:34:0e:a3:95:d3:ae:73:b3:c1:96:14:ee Fingerprint (SHA-256): CC:AF:CF:F8:22:D9:9C:28:D5:53:18:BD:41:58:AA:9E:67:CD:82:BB:1E:65:80:16:08:86:9F:C5:A3:C3:37:F0 Fingerprint (SHA1): E4:3A:47:F7:85:33:25:D3:FF:30:14:06:8F:5F:43:4B:26:3A:A3:C5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7990: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172546 (0x13bd4ac2) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:51:48 2017 Not After : Thu Mar 31 17:51:48 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 3a:3d:48:c7:6a:88:c0:35:41:20:e1:d0:10:69:23:c7: d4:4e:50:78:1c:d4:b7:7c:68:c5:0b:b3:ec:ac:7c:5c: 75:a5:63:eb:13:59:81:46:4e:4f:00:af:e1:44:e0:22: 93:b2:a1:34:98:f8:b8:08:52:41:b6:73:be:4a:ca:81: 5e:39:ee:af:43:de:ac:71:2c:dc:1b:6d:b9:8c:cc:17: cf:33:1a:c6:70:3e:28:53:f3:44:98:19:f6:5f:a6:7c: 32:f8:70:60:6f:32:8b:15:ca:16:74:51:30:4a:7d:e7: 17:fc:21:c5:e6:f7:1e:05:ec:70:c4:c0:33:81:fd:db: db:00:77:97:56:85:67:f0:65:a1:37:39:9d:ab:b6:46: 6f:b9:7f:e6:44:46:ed:7c:da:3b:a2:5a:bf:ad:2a:1a: 23:31:70:b5:79:0a:1b:59:2c:34:c9:49:4b:99:66:bf: 7c:59:41:b6:88:85:be:d1:2c:ba:8f:cc:92:60:c2:b5: aa:9f:8c:dd:08:43:b3:79:3b:13:56:df:02:9e:54:c1: af:a9:74:2b:93:eb:1f:e6:82:ec:f3:2c:e9:e1:bd:16: 74:d6:74:60:96:55:a7:1c:32:27:50:f2:fc:64:55:ab: 82:24:eb:57:6c:bd:ad:3f:c7:41:c6:6d:c9:33:ae:03 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:13:18:ec:74:54:da:90:43:25:9e:7e:59: 65:86:b6:ec:01:bf:ce:52:ee:72:ba:27:2d:b0:35:5b: 02:1d:00:ba:98:77:4b:80:a7:e3:cb:c0:ac:98:4f:1a: 3c:64:5c:34:0e:a3:95:d3:ae:73:b3:c1:96:14:ee Fingerprint (SHA-256): CC:AF:CF:F8:22:D9:9C:28:D5:53:18:BD:41:58:AA:9E:67:CD:82:BB:1E:65:80:16:08:86:9F:C5:A3:C3:37:F0 Fingerprint (SHA1): E4:3A:47:F7:85:33:25:D3:FF:30:14:06:8F:5F:43:4B:26:3A:A3:C5 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7991: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172546 (0x13bd4ac2) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:51:48 2017 Not After : Thu Mar 31 17:51:48 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 3a:3d:48:c7:6a:88:c0:35:41:20:e1:d0:10:69:23:c7: d4:4e:50:78:1c:d4:b7:7c:68:c5:0b:b3:ec:ac:7c:5c: 75:a5:63:eb:13:59:81:46:4e:4f:00:af:e1:44:e0:22: 93:b2:a1:34:98:f8:b8:08:52:41:b6:73:be:4a:ca:81: 5e:39:ee:af:43:de:ac:71:2c:dc:1b:6d:b9:8c:cc:17: cf:33:1a:c6:70:3e:28:53:f3:44:98:19:f6:5f:a6:7c: 32:f8:70:60:6f:32:8b:15:ca:16:74:51:30:4a:7d:e7: 17:fc:21:c5:e6:f7:1e:05:ec:70:c4:c0:33:81:fd:db: db:00:77:97:56:85:67:f0:65:a1:37:39:9d:ab:b6:46: 6f:b9:7f:e6:44:46:ed:7c:da:3b:a2:5a:bf:ad:2a:1a: 23:31:70:b5:79:0a:1b:59:2c:34:c9:49:4b:99:66:bf: 7c:59:41:b6:88:85:be:d1:2c:ba:8f:cc:92:60:c2:b5: aa:9f:8c:dd:08:43:b3:79:3b:13:56:df:02:9e:54:c1: af:a9:74:2b:93:eb:1f:e6:82:ec:f3:2c:e9:e1:bd:16: 74:d6:74:60:96:55:a7:1c:32:27:50:f2:fc:64:55:ab: 82:24:eb:57:6c:bd:ad:3f:c7:41:c6:6d:c9:33:ae:03 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:13:18:ec:74:54:da:90:43:25:9e:7e:59: 65:86:b6:ec:01:bf:ce:52:ee:72:ba:27:2d:b0:35:5b: 02:1d:00:ba:98:77:4b:80:a7:e3:cb:c0:ac:98:4f:1a: 3c:64:5c:34:0e:a3:95:d3:ae:73:b3:c1:96:14:ee Fingerprint (SHA-256): CC:AF:CF:F8:22:D9:9C:28:D5:53:18:BD:41:58:AA:9E:67:CD:82:BB:1E:65:80:16:08:86:9F:C5:A3:C3:37:F0 Fingerprint (SHA1): E4:3A:47:F7:85:33:25:D3:FF:30:14:06:8F:5F:43:4B:26:3A:A3:C5 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #7992: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172546 (0x13bd4ac2) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:51:48 2017 Not After : Thu Mar 31 17:51:48 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 3a:3d:48:c7:6a:88:c0:35:41:20:e1:d0:10:69:23:c7: d4:4e:50:78:1c:d4:b7:7c:68:c5:0b:b3:ec:ac:7c:5c: 75:a5:63:eb:13:59:81:46:4e:4f:00:af:e1:44:e0:22: 93:b2:a1:34:98:f8:b8:08:52:41:b6:73:be:4a:ca:81: 5e:39:ee:af:43:de:ac:71:2c:dc:1b:6d:b9:8c:cc:17: cf:33:1a:c6:70:3e:28:53:f3:44:98:19:f6:5f:a6:7c: 32:f8:70:60:6f:32:8b:15:ca:16:74:51:30:4a:7d:e7: 17:fc:21:c5:e6:f7:1e:05:ec:70:c4:c0:33:81:fd:db: db:00:77:97:56:85:67:f0:65:a1:37:39:9d:ab:b6:46: 6f:b9:7f:e6:44:46:ed:7c:da:3b:a2:5a:bf:ad:2a:1a: 23:31:70:b5:79:0a:1b:59:2c:34:c9:49:4b:99:66:bf: 7c:59:41:b6:88:85:be:d1:2c:ba:8f:cc:92:60:c2:b5: aa:9f:8c:dd:08:43:b3:79:3b:13:56:df:02:9e:54:c1: af:a9:74:2b:93:eb:1f:e6:82:ec:f3:2c:e9:e1:bd:16: 74:d6:74:60:96:55:a7:1c:32:27:50:f2:fc:64:55:ab: 82:24:eb:57:6c:bd:ad:3f:c7:41:c6:6d:c9:33:ae:03 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:13:18:ec:74:54:da:90:43:25:9e:7e:59: 65:86:b6:ec:01:bf:ce:52:ee:72:ba:27:2d:b0:35:5b: 02:1d:00:ba:98:77:4b:80:a7:e3:cb:c0:ac:98:4f:1a: 3c:64:5c:34:0e:a3:95:d3:ae:73:b3:c1:96:14:ee Fingerprint (SHA-256): CC:AF:CF:F8:22:D9:9C:28:D5:53:18:BD:41:58:AA:9E:67:CD:82:BB:1E:65:80:16:08:86:9F:C5:A3:C3:37:F0 Fingerprint (SHA1): E4:3A:47:F7:85:33:25:D3:FF:30:14:06:8F:5F:43:4B:26:3A:A3:C5 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #7993: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7994: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7995: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7996: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #7997: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7998: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7999: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8000: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8001: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8002: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8003: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8004: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #8005: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8006: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8007: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8008: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #8009: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8010: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8011: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8012: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8013: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8014: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8015: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8016: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #8017: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8018: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8019: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8020: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170331175412Z nextupdate=20180331175412Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Mar 31 17:54:12 2017 Next Update: Sat Mar 31 17:54:12 2018 CRL Extensions: chains.sh: #8021: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331175413Z nextupdate=20180331175413Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 17:54:13 2017 Next Update: Sat Mar 31 17:54:13 2018 CRL Extensions: chains.sh: #8022: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170331175413Z nextupdate=20180331175414Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Mar 31 17:54:13 2017 Next Update: Sat Mar 31 17:54:14 2018 CRL Extensions: chains.sh: #8023: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170331175414Z nextupdate=20180331175414Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Mar 31 17:54:14 2017 Next Update: Sat Mar 31 17:54:14 2018 CRL Extensions: chains.sh: #8024: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170331175415Z addcert 14 20170331175415Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Mar 31 17:54:15 2017 Next Update: Sat Mar 31 17:54:14 2018 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Mar 31 17:54:15 2017 CRL Extensions: chains.sh: #8025: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331175416Z addcert 15 20170331175416Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 17:54:16 2017 Next Update: Sat Mar 31 17:54:13 2018 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Mar 31 17:54:16 2017 CRL Extensions: chains.sh: #8026: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8027: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8028: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #8029: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #8030: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #8031: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #8032: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #8033: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #8034: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #8035: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:53:00 2017 Not After : Thu Mar 31 17:53:00 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:78:17:0f:82:2a:34:22:8a:2b:56:15:37:6e:f6:2b: 3e:81:1e:56:a1:90:c8:40:46:8c:31:e7:82:83:7f:66: be:25:f1:82:a9:95:8d:76:77:6e:04:f4:47:43:50:da: 3c:20:40:47:b7:8d:f6:e9:98:fb:9e:85:c8:a1:a8:6d: bf:06:26:42:e4:9f:7e:45:44:db:30:b1:8c:9f:6e:b2: c3:a5:d6:72:e5:3e:92:92:22:b6:7b:b4:12:47:cf:3c: ce:43:f8:c8:2f:0a:55:c5:ea:79:fb:9b:6b:a5:97:b8: a4:08:f5:ab:cd:b2:91:47:1b:0e:03:46:41:33:9c:7e: 70:2b:72:4f:d9:1e:6c:b9:03:dc:af:4b:2f:9f:c1:82: 91:4d:80:da:4f:90:ca:9c:a8:b4:6e:cf:08:52:76:24: f9:4a:f9:79:53:87:48:0a:b5:56:6d:a7:37:b6:89:ff: 87:87:86:06:e8:df:3b:e6:74:6d:0c:53:2d:3a:ae:43: 8a:5b:1b:06:19:7d:c9:6d:2c:1c:98:ab:99:76:aa:a3: 6a:75:1e:54:9e:8c:82:de:a2:41:c2:97:19:e1:80:59: 29:57:9b:2a:e4:a6:80:fd:74:1d:41:b3:d4:4a:6b:d3: e1:3d:72:a1:cb:8f:e5:30:6c:95:87:e3:d0:9b:25:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:61:4b:24:a7:e8:ea:59:bd:c6:ce:a2:78:ac:1a:93: 54:9a:fc:3d:26:ec:8b:3f:eb:1e:b1:67:0c:34:d3:e0: 81:b4:60:c5:fd:98:88:da:5e:13:c2:1a:3c:c6:79:f9: 54:3e:22:00:d2:fb:7a:c1:cd:93:44:87:fb:91:4a:be: 5e:ad:c5:6b:9a:05:a8:c7:27:73:f4:a4:01:c9:67:9a: 57:02:83:95:59:b6:c0:fb:e7:d3:78:9d:19:b0:af:e3: a3:b9:a2:c4:e2:e5:b9:b5:1d:fb:d6:38:07:d8:43:93: ff:75:91:5a:89:07:0e:2a:b9:68:fa:4e:d5:45:a7:9b: 96:2a:c7:c0:fe:25:4a:0a:96:8e:c5:ab:b1:dc:60:c8: ef:40:9a:e5:9d:8c:64:13:aa:6b:41:38:10:04:c2:6c: d6:48:64:ff:01:ec:96:31:f4:05:15:28:0e:eb:83:e2: 05:9b:c3:03:49:10:5c:1e:40:6a:2c:1d:44:98:3b:06: a7:49:14:81:5a:31:8e:b5:b1:47:5e:3e:ce:61:d8:e5: b5:cd:dc:30:ed:b3:64:cf:15:7d:e3:9a:5f:27:88:8d: 5f:33:65:90:1c:06:c0:38:c2:1f:71:30:9c:9a:aa:c4: 3e:12:61:ff:c5:c1:d1:01:46:8b:b7:cc:a5:5d:47:de Fingerprint (SHA-256): 9D:99:3C:0A:E9:E9:0C:15:88:C4:CE:01:D7:28:16:73:36:5A:ED:E4:99:BF:ED:8E:F3:73:24:5E:0D:8F:50:47 Fingerprint (SHA1): 30:90:3A:D9:5F:A1:1B:79:1F:43:D5:AA:E7:B0:9F:9D:DD:D1:58:3F Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #8036: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #8037: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:53:00 2017 Not After : Thu Mar 31 17:53:00 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:78:17:0f:82:2a:34:22:8a:2b:56:15:37:6e:f6:2b: 3e:81:1e:56:a1:90:c8:40:46:8c:31:e7:82:83:7f:66: be:25:f1:82:a9:95:8d:76:77:6e:04:f4:47:43:50:da: 3c:20:40:47:b7:8d:f6:e9:98:fb:9e:85:c8:a1:a8:6d: bf:06:26:42:e4:9f:7e:45:44:db:30:b1:8c:9f:6e:b2: c3:a5:d6:72:e5:3e:92:92:22:b6:7b:b4:12:47:cf:3c: ce:43:f8:c8:2f:0a:55:c5:ea:79:fb:9b:6b:a5:97:b8: a4:08:f5:ab:cd:b2:91:47:1b:0e:03:46:41:33:9c:7e: 70:2b:72:4f:d9:1e:6c:b9:03:dc:af:4b:2f:9f:c1:82: 91:4d:80:da:4f:90:ca:9c:a8:b4:6e:cf:08:52:76:24: f9:4a:f9:79:53:87:48:0a:b5:56:6d:a7:37:b6:89:ff: 87:87:86:06:e8:df:3b:e6:74:6d:0c:53:2d:3a:ae:43: 8a:5b:1b:06:19:7d:c9:6d:2c:1c:98:ab:99:76:aa:a3: 6a:75:1e:54:9e:8c:82:de:a2:41:c2:97:19:e1:80:59: 29:57:9b:2a:e4:a6:80:fd:74:1d:41:b3:d4:4a:6b:d3: e1:3d:72:a1:cb:8f:e5:30:6c:95:87:e3:d0:9b:25:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:61:4b:24:a7:e8:ea:59:bd:c6:ce:a2:78:ac:1a:93: 54:9a:fc:3d:26:ec:8b:3f:eb:1e:b1:67:0c:34:d3:e0: 81:b4:60:c5:fd:98:88:da:5e:13:c2:1a:3c:c6:79:f9: 54:3e:22:00:d2:fb:7a:c1:cd:93:44:87:fb:91:4a:be: 5e:ad:c5:6b:9a:05:a8:c7:27:73:f4:a4:01:c9:67:9a: 57:02:83:95:59:b6:c0:fb:e7:d3:78:9d:19:b0:af:e3: a3:b9:a2:c4:e2:e5:b9:b5:1d:fb:d6:38:07:d8:43:93: ff:75:91:5a:89:07:0e:2a:b9:68:fa:4e:d5:45:a7:9b: 96:2a:c7:c0:fe:25:4a:0a:96:8e:c5:ab:b1:dc:60:c8: ef:40:9a:e5:9d:8c:64:13:aa:6b:41:38:10:04:c2:6c: d6:48:64:ff:01:ec:96:31:f4:05:15:28:0e:eb:83:e2: 05:9b:c3:03:49:10:5c:1e:40:6a:2c:1d:44:98:3b:06: a7:49:14:81:5a:31:8e:b5:b1:47:5e:3e:ce:61:d8:e5: b5:cd:dc:30:ed:b3:64:cf:15:7d:e3:9a:5f:27:88:8d: 5f:33:65:90:1c:06:c0:38:c2:1f:71:30:9c:9a:aa:c4: 3e:12:61:ff:c5:c1:d1:01:46:8b:b7:cc:a5:5d:47:de Fingerprint (SHA-256): 9D:99:3C:0A:E9:E9:0C:15:88:C4:CE:01:D7:28:16:73:36:5A:ED:E4:99:BF:ED:8E:F3:73:24:5E:0D:8F:50:47 Fingerprint (SHA1): 30:90:3A:D9:5F:A1:1B:79:1F:43:D5:AA:E7:B0:9F:9D:DD:D1:58:3F Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #8038: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #8039: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8040: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172555 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8041: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8042: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #8043: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8044: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 331172556 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8045: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8046: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8047: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331172446.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #8048: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331172431.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8049: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8050: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #8051: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331172446.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #8052: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 331172557 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8053: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8054: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8055: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331172446.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #8056: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331172432.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8057: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8058: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #8059: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8060: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 331172558 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8061: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8062: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8063: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331172446.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #8064: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331172433.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8065: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8066: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #8067: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331172446.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #8068: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331172434.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8069: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8070: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170331175559Z nextupdate=20180331175559Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Mar 31 17:55:59 2017 Next Update: Sat Mar 31 17:55:59 2018 CRL Extensions: chains.sh: #8071: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331175600Z nextupdate=20180331175600Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 17:56:00 2017 Next Update: Sat Mar 31 17:56:00 2018 CRL Extensions: chains.sh: #8072: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170331175601Z nextupdate=20180331175601Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Mar 31 17:56:01 2017 Next Update: Sat Mar 31 17:56:01 2018 CRL Extensions: chains.sh: #8073: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170331175602Z nextupdate=20180331175602Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Mar 31 17:56:02 2017 Next Update: Sat Mar 31 17:56:02 2018 CRL Extensions: chains.sh: #8074: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331175603Z addcert 20 20170331175603Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 17:56:03 2017 Next Update: Sat Mar 31 17:56:00 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Mar 31 17:56:03 2017 CRL Extensions: chains.sh: #8075: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331175604Z addcert 40 20170331175604Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 17:56:04 2017 Next Update: Sat Mar 31 17:56:00 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Mar 31 17:56:03 2017 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Mar 31 17:56:04 2017 CRL Extensions: chains.sh: #8076: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8077: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8078: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #8079: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172555 (0x13bd4acb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:54:37 2017 Not After : Thu Mar 31 17:54:37 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:54:18:09:2f:2a:14:23:44:0e:0b:02:a0:cb:49:63: 5e:08:c0:30:53:36:0b:49:7b:3c:c9:a8:91:1e:4e:b2: f3:21:f2:9b:93:4d:65:0e:4b:92:eb:31:9a:05:31:50: 65:71:66:62:28:5e:b8:a4:d3:09:68:b2:49:0d:cc:2b: 4e:94:9b:a2:b1:96:02:94:56:b1:a6:34:44:e3:ce:da: 2e:8b:c0:49:a8:82:0b:9d:eb:dc:4e:b3:1b:df:d8:8b: 95:05:0e:e5:fe:4c:ef:15:0f:5b:62:22:8e:0b:03:91: a1:f4:66:b3:a0:b6:32:a1:3d:34:eb:5d:b1:1d:61:fe: c7:1d:dd:07:62:3b:77:3a:74:cb:d9:b2:31:9d:69:22: 0d:76:aa:05:ea:d7:5f:8b:4b:fb:82:d6:f6:5e:e9:65: 41:d8:c6:e7:26:04:49:e8:51:07:05:74:c1:5f:94:de: 4d:dc:d3:3d:58:4e:67:62:ed:2c:04:ca:1f:3b:b9:22: 09:35:09:98:82:dd:ea:67:04:bf:4b:64:eb:44:b7:31: bf:45:0d:25:5d:24:71:53:58:ae:a2:01:32:f7:51:96: 0b:55:a0:5b:34:0f:c6:38:ee:ff:ec:a0:94:1f:82:5b: fe:33:c5:27:a6:a1:6f:73:19:3f:5d:3a:c2:ff:14:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:3e:5f:09:b0:09:ca:05:cc:25:fc:c0:06:6a:f7:14: 88:85:83:90:1e:07:e0:1d:95:7a:ef:87:36:81:8e:57: 48:40:e2:54:c4:7c:5f:18:f1:8c:24:8d:fb:71:30:ad: db:b2:72:1b:55:61:d9:4e:ec:89:e0:f8:9f:20:c5:4e: 9b:f0:43:2e:15:f6:fd:e8:1a:ec:5d:f8:be:e1:e9:9c: 3f:af:e7:87:0b:a1:8a:2a:bb:79:99:aa:19:ba:98:e4: f2:df:47:cf:8a:c3:79:28:73:a3:86:c9:74:36:59:d4: 80:f6:60:c1:ea:c3:81:11:be:02:9d:da:16:cd:34:c7: d3:59:b1:8a:59:ee:f5:e9:82:a1:d2:01:44:b8:d1:f4: ce:b5:35:43:5b:e1:c3:7b:7f:ed:b3:af:56:03:0e:e4: 86:53:ec:74:7c:fc:79:69:fd:00:02:ef:c7:96:12:cf: 84:1a:df:29:97:17:47:ac:0a:3c:43:5e:36:b5:7d:94: 40:ae:ba:2c:7a:ef:cb:88:49:95:a3:7c:01:9f:2b:77: c2:91:28:4e:a3:e7:30:6e:87:0f:fb:b3:0a:c7:8b:a0: d1:5d:50:67:58:64:5c:79:e4:9b:6b:d6:37:a6:60:4e: 03:ae:95:8f:d7:4e:f0:fd:96:46:a5:b2:a0:d7:bf:44 Fingerprint (SHA-256): 57:00:32:98:D9:18:A6:14:2C:6F:E3:33:D6:EC:9B:10:60:5A:70:CA:21:ED:B0:FF:E8:D6:59:03:66:28:D4:67 Fingerprint (SHA1): 78:2D:29:00:34:BB:4D:77:0D:F5:FD:60:CB:23:57:BA:33:DF:12:14 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #8080: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #8081: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172555 (0x13bd4acb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 17:54:37 2017 Not After : Thu Mar 31 17:54:37 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:54:18:09:2f:2a:14:23:44:0e:0b:02:a0:cb:49:63: 5e:08:c0:30:53:36:0b:49:7b:3c:c9:a8:91:1e:4e:b2: f3:21:f2:9b:93:4d:65:0e:4b:92:eb:31:9a:05:31:50: 65:71:66:62:28:5e:b8:a4:d3:09:68:b2:49:0d:cc:2b: 4e:94:9b:a2:b1:96:02:94:56:b1:a6:34:44:e3:ce:da: 2e:8b:c0:49:a8:82:0b:9d:eb:dc:4e:b3:1b:df:d8:8b: 95:05:0e:e5:fe:4c:ef:15:0f:5b:62:22:8e:0b:03:91: a1:f4:66:b3:a0:b6:32:a1:3d:34:eb:5d:b1:1d:61:fe: c7:1d:dd:07:62:3b:77:3a:74:cb:d9:b2:31:9d:69:22: 0d:76:aa:05:ea:d7:5f:8b:4b:fb:82:d6:f6:5e:e9:65: 41:d8:c6:e7:26:04:49:e8:51:07:05:74:c1:5f:94:de: 4d:dc:d3:3d:58:4e:67:62:ed:2c:04:ca:1f:3b:b9:22: 09:35:09:98:82:dd:ea:67:04:bf:4b:64:eb:44:b7:31: bf:45:0d:25:5d:24:71:53:58:ae:a2:01:32:f7:51:96: 0b:55:a0:5b:34:0f:c6:38:ee:ff:ec:a0:94:1f:82:5b: fe:33:c5:27:a6:a1:6f:73:19:3f:5d:3a:c2:ff:14:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:3e:5f:09:b0:09:ca:05:cc:25:fc:c0:06:6a:f7:14: 88:85:83:90:1e:07:e0:1d:95:7a:ef:87:36:81:8e:57: 48:40:e2:54:c4:7c:5f:18:f1:8c:24:8d:fb:71:30:ad: db:b2:72:1b:55:61:d9:4e:ec:89:e0:f8:9f:20:c5:4e: 9b:f0:43:2e:15:f6:fd:e8:1a:ec:5d:f8:be:e1:e9:9c: 3f:af:e7:87:0b:a1:8a:2a:bb:79:99:aa:19:ba:98:e4: f2:df:47:cf:8a:c3:79:28:73:a3:86:c9:74:36:59:d4: 80:f6:60:c1:ea:c3:81:11:be:02:9d:da:16:cd:34:c7: d3:59:b1:8a:59:ee:f5:e9:82:a1:d2:01:44:b8:d1:f4: ce:b5:35:43:5b:e1:c3:7b:7f:ed:b3:af:56:03:0e:e4: 86:53:ec:74:7c:fc:79:69:fd:00:02:ef:c7:96:12:cf: 84:1a:df:29:97:17:47:ac:0a:3c:43:5e:36:b5:7d:94: 40:ae:ba:2c:7a:ef:cb:88:49:95:a3:7c:01:9f:2b:77: c2:91:28:4e:a3:e7:30:6e:87:0f:fb:b3:0a:c7:8b:a0: d1:5d:50:67:58:64:5c:79:e4:9b:6b:d6:37:a6:60:4e: 03:ae:95:8f:d7:4e:f0:fd:96:46:a5:b2:a0:d7:bf:44 Fingerprint (SHA-256): 57:00:32:98:D9:18:A6:14:2C:6F:E3:33:D6:EC:9B:10:60:5A:70:CA:21:ED:B0:FF:E8:D6:59:03:66:28:D4:67 Fingerprint (SHA1): 78:2D:29:00:34:BB:4D:77:0D:F5:FD:60:CB:23:57:BA:33:DF:12:14 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #8082: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #8083: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #8084: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172559 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8085: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #8086: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8087: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8088: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 331172560 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8089: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8090: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8091: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8092: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331172561 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8093: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8094: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8095: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8096: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 331172562 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8097: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8098: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #8099: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172563 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8100: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #8101: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #8102: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8103: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 331172564 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8104: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8105: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #8106: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8107: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 331172565 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8108: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8109: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #8110: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #8111: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #8112: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172559 (0x13bd4acf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 17:56:22 2017 Not After : Thu Mar 31 17:56:22 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:07:6a:d7:7e:fa:f5:f7:6e:fa:5a:98:15:24:e1:15: 93:cc:d3:84:42:53:52:28:2a:89:de:23:97:cf:d1:3a: b4:47:38:0c:32:97:d0:6a:11:d6:5c:0b:f8:44:50:cc: c0:d4:7c:c6:6c:b1:ef:f3:a0:56:7f:c3:4c:3c:a6:4c: b2:8b:db:ef:89:95:e7:22:90:4a:1e:40:8b:ac:d6:37: 79:cb:56:40:b1:de:34:0e:4d:2a:5b:8d:48:93:5e:89: 80:11:ae:b0:94:cb:2c:13:82:8d:27:38:8f:6e:00:d0: 72:b0:cb:5e:c0:73:bc:d1:0c:2c:df:3d:ff:91:7f:31: 0e:2a:71:52:98:73:e1:a1:1f:91:5f:b8:5b:96:ee:b3: d7:e7:8b:f0:8c:3d:14:26:b8:c6:61:1c:c8:0d:9f:b1: 8d:08:a6:cd:72:ab:fe:00:77:18:79:41:53:6c:2d:10: 58:0c:72:44:18:7c:27:b9:46:45:b3:c2:a8:ca:b1:a5: af:39:fe:f3:c2:f4:f2:ea:a7:c3:1d:3a:70:f7:47:ea: d4:5d:14:1b:0b:54:6a:41:85:91:c1:b6:c2:82:2d:8a: 4e:1d:50:ce:da:e6:7a:26:60:99:ea:a6:70:c0:57:26: 07:77:2d:d6:e2:b3:61:31:96:1c:a7:60:15:4e:f9:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:94:03:26:2c:e9:cc:6d:31:19:dd:7d:b3:dc:e2:92: d1:81:6a:08:0c:ba:4b:4e:4b:ad:1f:93:aa:ce:d3:53: 0a:c8:d5:dc:fb:46:11:6b:81:b8:b6:7a:29:fc:a4:39: 7a:ea:6d:d4:40:2b:57:7e:a0:80:e7:ed:79:a2:bd:df: 1a:b5:80:cd:a8:4c:8d:75:6a:ee:90:11:d7:8f:80:6c: e6:7b:42:94:a0:09:c1:b1:8a:e4:9e:13:81:bb:30:86: c3:60:fa:26:44:43:49:c3:ed:69:1a:ee:e4:f5:34:e3: 28:33:cf:ca:55:08:5e:c8:6c:85:29:f3:7e:12:6b:b3: ed:5f:7f:48:5a:9c:1a:74:09:e0:b4:53:a9:de:3f:e7: dd:85:c9:1c:99:f6:b4:e9:3b:2d:2f:ac:48:a1:a6:0e: 28:ce:13:4a:f7:df:08:bd:45:38:c3:8a:9a:9a:c2:5f: 02:a0:95:ec:16:37:9d:75:33:d2:76:9b:31:21:08:5b: 26:1e:a0:9d:c8:78:56:cf:fa:c4:38:1f:fc:80:af:8f: d5:87:f0:2d:3a:d0:58:02:12:f1:73:9c:f2:25:5f:eb: 8e:f7:cc:5f:2e:1f:6c:08:ab:70:4d:02:e2:e5:45:85: 4d:f7:bf:b3:2e:a0:85:af:b6:7d:00:92:b3:38:48:aa Fingerprint (SHA-256): E1:2F:81:04:51:38:01:0E:D7:FB:9F:BD:2F:19:20:CC:74:41:13:86:B3:0D:26:45:9A:05:A4:A5:1D:C2:53:27 Fingerprint (SHA1): 0B:41:09:07:6A:19:DB:71:51:BE:91:4E:A9:18:84:A0:A5:D6:98:00 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8113: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172561 (0x13bd4ad1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 17:56:44 2017 Not After : Thu Mar 31 17:56:44 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:fc:7f:f7:2a:ed:9e:12:e9:71:5b:86:2d:52:de:1f: bf:9e:c3:2c:73:25:52:29:58:c5:f0:a5:3a:80:6e:f6: 8d:17:a4:8b:8c:94:98:da:49:8c:6a:d0:96:57:b3:e7: 0b:8e:a9:24:f5:2b:90:b4:1d:fe:9e:87:a1:39:2f:6c: 43:6d:80:23:cc:81:2e:c9:f1:96:59:a4:df:8a:92:49: b0:60:67:f4:ee:34:9f:6b:93:1a:bd:60:43:58:0b:38: dd:3f:3d:d7:a9:b2:9c:8b:3c:7a:e5:2b:1c:ce:f6:52: 84:4a:e0:0e:16:a3:37:17:86:0d:3e:ef:93:78:c1:36: 73:35:d3:ff:a3:40:f0:75:6c:0d:2f:6b:6b:06:59:44: 96:1d:23:93:d6:d1:70:5f:1e:6a:98:6b:2f:94:d0:00: 1f:e3:cb:e8:c9:78:bd:e6:7f:97:7c:33:63:f2:fa:2e: 4b:e8:cc:a0:d7:34:74:2e:30:73:78:3e:d8:4c:bc:04: fa:44:66:5e:cd:7b:25:d9:46:6f:d7:e4:71:8f:7b:71: 37:10:cf:f5:0c:7d:94:a1:45:45:b0:2f:ee:f1:a7:92: c6:e8:30:df:69:95:d4:55:1a:94:e2:35:6f:47:42:28: 3e:66:4b:0b:4f:68:12:34:38:3d:b8:95:d6:89:da:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:d6:60:b3:78:15:9f:9e:b3:8a:dc:a9:9c:fe:09:03: 19:44:4c:3b:42:e4:18:a9:bf:ab:f5:a4:76:72:cf:b8: 34:d3:2c:d7:a6:40:01:dc:bd:9c:5a:52:72:01:2d:45: 67:25:8f:0f:4d:85:fc:c1:84:7b:6b:e8:3e:fb:15:86: 2c:71:e2:09:04:e9:48:3d:b9:f3:68:47:fa:a2:e9:c0: e3:b4:fe:86:23:c1:a3:c0:2a:75:15:1f:71:04:dd:d6: 9a:f4:f5:af:eb:a1:f4:a3:d3:04:90:a2:63:41:62:cd: 22:71:21:6c:97:fb:84:ef:d9:99:51:7b:45:c4:6c:a0: 4a:e0:ec:1a:3d:19:d1:2e:7d:7b:9c:07:10:41:bb:0c: 91:84:39:0a:c5:7f:4e:49:0b:da:32:fa:9d:5b:8c:50: aa:87:7a:27:f1:8a:c4:e8:41:8b:e2:16:4b:f8:37:a8: a7:24:52:b7:72:ae:5a:00:15:d3:c4:bf:28:e7:16:01: 55:5b:ac:ce:cd:70:e2:2c:db:c7:37:30:3c:57:2e:4d: 0c:6f:66:84:9d:bf:3d:59:c1:5e:a4:fc:cc:3d:52:24: a8:b4:da:bd:75:75:44:ee:ef:7c:2b:08:27:f7:ef:52: e7:5c:eb:42:17:06:97:2c:7a:b2:69:76:24:61:13:bc Fingerprint (SHA-256): 6C:A5:EB:31:FA:26:FE:7D:B6:E3:FA:7C:66:94:59:25:63:E1:08:AD:73:D7:8E:DD:23:F1:60:0E:15:96:01:DC Fingerprint (SHA1): AD:14:C8:C3:F6:1D:01:CB:A0:97:29:3C:8D:90:96:D4:C2:FE:97:B3 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #8114: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172559 (0x13bd4acf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 17:56:22 2017 Not After : Thu Mar 31 17:56:22 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:07:6a:d7:7e:fa:f5:f7:6e:fa:5a:98:15:24:e1:15: 93:cc:d3:84:42:53:52:28:2a:89:de:23:97:cf:d1:3a: b4:47:38:0c:32:97:d0:6a:11:d6:5c:0b:f8:44:50:cc: c0:d4:7c:c6:6c:b1:ef:f3:a0:56:7f:c3:4c:3c:a6:4c: b2:8b:db:ef:89:95:e7:22:90:4a:1e:40:8b:ac:d6:37: 79:cb:56:40:b1:de:34:0e:4d:2a:5b:8d:48:93:5e:89: 80:11:ae:b0:94:cb:2c:13:82:8d:27:38:8f:6e:00:d0: 72:b0:cb:5e:c0:73:bc:d1:0c:2c:df:3d:ff:91:7f:31: 0e:2a:71:52:98:73:e1:a1:1f:91:5f:b8:5b:96:ee:b3: d7:e7:8b:f0:8c:3d:14:26:b8:c6:61:1c:c8:0d:9f:b1: 8d:08:a6:cd:72:ab:fe:00:77:18:79:41:53:6c:2d:10: 58:0c:72:44:18:7c:27:b9:46:45:b3:c2:a8:ca:b1:a5: af:39:fe:f3:c2:f4:f2:ea:a7:c3:1d:3a:70:f7:47:ea: d4:5d:14:1b:0b:54:6a:41:85:91:c1:b6:c2:82:2d:8a: 4e:1d:50:ce:da:e6:7a:26:60:99:ea:a6:70:c0:57:26: 07:77:2d:d6:e2:b3:61:31:96:1c:a7:60:15:4e:f9:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:94:03:26:2c:e9:cc:6d:31:19:dd:7d:b3:dc:e2:92: d1:81:6a:08:0c:ba:4b:4e:4b:ad:1f:93:aa:ce:d3:53: 0a:c8:d5:dc:fb:46:11:6b:81:b8:b6:7a:29:fc:a4:39: 7a:ea:6d:d4:40:2b:57:7e:a0:80:e7:ed:79:a2:bd:df: 1a:b5:80:cd:a8:4c:8d:75:6a:ee:90:11:d7:8f:80:6c: e6:7b:42:94:a0:09:c1:b1:8a:e4:9e:13:81:bb:30:86: c3:60:fa:26:44:43:49:c3:ed:69:1a:ee:e4:f5:34:e3: 28:33:cf:ca:55:08:5e:c8:6c:85:29:f3:7e:12:6b:b3: ed:5f:7f:48:5a:9c:1a:74:09:e0:b4:53:a9:de:3f:e7: dd:85:c9:1c:99:f6:b4:e9:3b:2d:2f:ac:48:a1:a6:0e: 28:ce:13:4a:f7:df:08:bd:45:38:c3:8a:9a:9a:c2:5f: 02:a0:95:ec:16:37:9d:75:33:d2:76:9b:31:21:08:5b: 26:1e:a0:9d:c8:78:56:cf:fa:c4:38:1f:fc:80:af:8f: d5:87:f0:2d:3a:d0:58:02:12:f1:73:9c:f2:25:5f:eb: 8e:f7:cc:5f:2e:1f:6c:08:ab:70:4d:02:e2:e5:45:85: 4d:f7:bf:b3:2e:a0:85:af:b6:7d:00:92:b3:38:48:aa Fingerprint (SHA-256): E1:2F:81:04:51:38:01:0E:D7:FB:9F:BD:2F:19:20:CC:74:41:13:86:B3:0D:26:45:9A:05:A4:A5:1D:C2:53:27 Fingerprint (SHA1): 0B:41:09:07:6A:19:DB:71:51:BE:91:4E:A9:18:84:A0:A5:D6:98:00 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8115: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #8116: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172559 (0x13bd4acf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 17:56:22 2017 Not After : Thu Mar 31 17:56:22 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:07:6a:d7:7e:fa:f5:f7:6e:fa:5a:98:15:24:e1:15: 93:cc:d3:84:42:53:52:28:2a:89:de:23:97:cf:d1:3a: b4:47:38:0c:32:97:d0:6a:11:d6:5c:0b:f8:44:50:cc: c0:d4:7c:c6:6c:b1:ef:f3:a0:56:7f:c3:4c:3c:a6:4c: b2:8b:db:ef:89:95:e7:22:90:4a:1e:40:8b:ac:d6:37: 79:cb:56:40:b1:de:34:0e:4d:2a:5b:8d:48:93:5e:89: 80:11:ae:b0:94:cb:2c:13:82:8d:27:38:8f:6e:00:d0: 72:b0:cb:5e:c0:73:bc:d1:0c:2c:df:3d:ff:91:7f:31: 0e:2a:71:52:98:73:e1:a1:1f:91:5f:b8:5b:96:ee:b3: d7:e7:8b:f0:8c:3d:14:26:b8:c6:61:1c:c8:0d:9f:b1: 8d:08:a6:cd:72:ab:fe:00:77:18:79:41:53:6c:2d:10: 58:0c:72:44:18:7c:27:b9:46:45:b3:c2:a8:ca:b1:a5: af:39:fe:f3:c2:f4:f2:ea:a7:c3:1d:3a:70:f7:47:ea: d4:5d:14:1b:0b:54:6a:41:85:91:c1:b6:c2:82:2d:8a: 4e:1d:50:ce:da:e6:7a:26:60:99:ea:a6:70:c0:57:26: 07:77:2d:d6:e2:b3:61:31:96:1c:a7:60:15:4e:f9:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:94:03:26:2c:e9:cc:6d:31:19:dd:7d:b3:dc:e2:92: d1:81:6a:08:0c:ba:4b:4e:4b:ad:1f:93:aa:ce:d3:53: 0a:c8:d5:dc:fb:46:11:6b:81:b8:b6:7a:29:fc:a4:39: 7a:ea:6d:d4:40:2b:57:7e:a0:80:e7:ed:79:a2:bd:df: 1a:b5:80:cd:a8:4c:8d:75:6a:ee:90:11:d7:8f:80:6c: e6:7b:42:94:a0:09:c1:b1:8a:e4:9e:13:81:bb:30:86: c3:60:fa:26:44:43:49:c3:ed:69:1a:ee:e4:f5:34:e3: 28:33:cf:ca:55:08:5e:c8:6c:85:29:f3:7e:12:6b:b3: ed:5f:7f:48:5a:9c:1a:74:09:e0:b4:53:a9:de:3f:e7: dd:85:c9:1c:99:f6:b4:e9:3b:2d:2f:ac:48:a1:a6:0e: 28:ce:13:4a:f7:df:08:bd:45:38:c3:8a:9a:9a:c2:5f: 02:a0:95:ec:16:37:9d:75:33:d2:76:9b:31:21:08:5b: 26:1e:a0:9d:c8:78:56:cf:fa:c4:38:1f:fc:80:af:8f: d5:87:f0:2d:3a:d0:58:02:12:f1:73:9c:f2:25:5f:eb: 8e:f7:cc:5f:2e:1f:6c:08:ab:70:4d:02:e2:e5:45:85: 4d:f7:bf:b3:2e:a0:85:af:b6:7d:00:92:b3:38:48:aa Fingerprint (SHA-256): E1:2F:81:04:51:38:01:0E:D7:FB:9F:BD:2F:19:20:CC:74:41:13:86:B3:0D:26:45:9A:05:A4:A5:1D:C2:53:27 Fingerprint (SHA1): 0B:41:09:07:6A:19:DB:71:51:BE:91:4E:A9:18:84:A0:A5:D6:98:00 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8117: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172561 (0x13bd4ad1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 17:56:44 2017 Not After : Thu Mar 31 17:56:44 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:fc:7f:f7:2a:ed:9e:12:e9:71:5b:86:2d:52:de:1f: bf:9e:c3:2c:73:25:52:29:58:c5:f0:a5:3a:80:6e:f6: 8d:17:a4:8b:8c:94:98:da:49:8c:6a:d0:96:57:b3:e7: 0b:8e:a9:24:f5:2b:90:b4:1d:fe:9e:87:a1:39:2f:6c: 43:6d:80:23:cc:81:2e:c9:f1:96:59:a4:df:8a:92:49: b0:60:67:f4:ee:34:9f:6b:93:1a:bd:60:43:58:0b:38: dd:3f:3d:d7:a9:b2:9c:8b:3c:7a:e5:2b:1c:ce:f6:52: 84:4a:e0:0e:16:a3:37:17:86:0d:3e:ef:93:78:c1:36: 73:35:d3:ff:a3:40:f0:75:6c:0d:2f:6b:6b:06:59:44: 96:1d:23:93:d6:d1:70:5f:1e:6a:98:6b:2f:94:d0:00: 1f:e3:cb:e8:c9:78:bd:e6:7f:97:7c:33:63:f2:fa:2e: 4b:e8:cc:a0:d7:34:74:2e:30:73:78:3e:d8:4c:bc:04: fa:44:66:5e:cd:7b:25:d9:46:6f:d7:e4:71:8f:7b:71: 37:10:cf:f5:0c:7d:94:a1:45:45:b0:2f:ee:f1:a7:92: c6:e8:30:df:69:95:d4:55:1a:94:e2:35:6f:47:42:28: 3e:66:4b:0b:4f:68:12:34:38:3d:b8:95:d6:89:da:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:d6:60:b3:78:15:9f:9e:b3:8a:dc:a9:9c:fe:09:03: 19:44:4c:3b:42:e4:18:a9:bf:ab:f5:a4:76:72:cf:b8: 34:d3:2c:d7:a6:40:01:dc:bd:9c:5a:52:72:01:2d:45: 67:25:8f:0f:4d:85:fc:c1:84:7b:6b:e8:3e:fb:15:86: 2c:71:e2:09:04:e9:48:3d:b9:f3:68:47:fa:a2:e9:c0: e3:b4:fe:86:23:c1:a3:c0:2a:75:15:1f:71:04:dd:d6: 9a:f4:f5:af:eb:a1:f4:a3:d3:04:90:a2:63:41:62:cd: 22:71:21:6c:97:fb:84:ef:d9:99:51:7b:45:c4:6c:a0: 4a:e0:ec:1a:3d:19:d1:2e:7d:7b:9c:07:10:41:bb:0c: 91:84:39:0a:c5:7f:4e:49:0b:da:32:fa:9d:5b:8c:50: aa:87:7a:27:f1:8a:c4:e8:41:8b:e2:16:4b:f8:37:a8: a7:24:52:b7:72:ae:5a:00:15:d3:c4:bf:28:e7:16:01: 55:5b:ac:ce:cd:70:e2:2c:db:c7:37:30:3c:57:2e:4d: 0c:6f:66:84:9d:bf:3d:59:c1:5e:a4:fc:cc:3d:52:24: a8:b4:da:bd:75:75:44:ee:ef:7c:2b:08:27:f7:ef:52: e7:5c:eb:42:17:06:97:2c:7a:b2:69:76:24:61:13:bc Fingerprint (SHA-256): 6C:A5:EB:31:FA:26:FE:7D:B6:E3:FA:7C:66:94:59:25:63:E1:08:AD:73:D7:8E:DD:23:F1:60:0E:15:96:01:DC Fingerprint (SHA1): AD:14:C8:C3:F6:1D:01:CB:A0:97:29:3C:8D:90:96:D4:C2:FE:97:B3 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #8118: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #8119: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #8120: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #8121: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172559 (0x13bd4acf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 17:56:22 2017 Not After : Thu Mar 31 17:56:22 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:07:6a:d7:7e:fa:f5:f7:6e:fa:5a:98:15:24:e1:15: 93:cc:d3:84:42:53:52:28:2a:89:de:23:97:cf:d1:3a: b4:47:38:0c:32:97:d0:6a:11:d6:5c:0b:f8:44:50:cc: c0:d4:7c:c6:6c:b1:ef:f3:a0:56:7f:c3:4c:3c:a6:4c: b2:8b:db:ef:89:95:e7:22:90:4a:1e:40:8b:ac:d6:37: 79:cb:56:40:b1:de:34:0e:4d:2a:5b:8d:48:93:5e:89: 80:11:ae:b0:94:cb:2c:13:82:8d:27:38:8f:6e:00:d0: 72:b0:cb:5e:c0:73:bc:d1:0c:2c:df:3d:ff:91:7f:31: 0e:2a:71:52:98:73:e1:a1:1f:91:5f:b8:5b:96:ee:b3: d7:e7:8b:f0:8c:3d:14:26:b8:c6:61:1c:c8:0d:9f:b1: 8d:08:a6:cd:72:ab:fe:00:77:18:79:41:53:6c:2d:10: 58:0c:72:44:18:7c:27:b9:46:45:b3:c2:a8:ca:b1:a5: af:39:fe:f3:c2:f4:f2:ea:a7:c3:1d:3a:70:f7:47:ea: d4:5d:14:1b:0b:54:6a:41:85:91:c1:b6:c2:82:2d:8a: 4e:1d:50:ce:da:e6:7a:26:60:99:ea:a6:70:c0:57:26: 07:77:2d:d6:e2:b3:61:31:96:1c:a7:60:15:4e:f9:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:94:03:26:2c:e9:cc:6d:31:19:dd:7d:b3:dc:e2:92: d1:81:6a:08:0c:ba:4b:4e:4b:ad:1f:93:aa:ce:d3:53: 0a:c8:d5:dc:fb:46:11:6b:81:b8:b6:7a:29:fc:a4:39: 7a:ea:6d:d4:40:2b:57:7e:a0:80:e7:ed:79:a2:bd:df: 1a:b5:80:cd:a8:4c:8d:75:6a:ee:90:11:d7:8f:80:6c: e6:7b:42:94:a0:09:c1:b1:8a:e4:9e:13:81:bb:30:86: c3:60:fa:26:44:43:49:c3:ed:69:1a:ee:e4:f5:34:e3: 28:33:cf:ca:55:08:5e:c8:6c:85:29:f3:7e:12:6b:b3: ed:5f:7f:48:5a:9c:1a:74:09:e0:b4:53:a9:de:3f:e7: dd:85:c9:1c:99:f6:b4:e9:3b:2d:2f:ac:48:a1:a6:0e: 28:ce:13:4a:f7:df:08:bd:45:38:c3:8a:9a:9a:c2:5f: 02:a0:95:ec:16:37:9d:75:33:d2:76:9b:31:21:08:5b: 26:1e:a0:9d:c8:78:56:cf:fa:c4:38:1f:fc:80:af:8f: d5:87:f0:2d:3a:d0:58:02:12:f1:73:9c:f2:25:5f:eb: 8e:f7:cc:5f:2e:1f:6c:08:ab:70:4d:02:e2:e5:45:85: 4d:f7:bf:b3:2e:a0:85:af:b6:7d:00:92:b3:38:48:aa Fingerprint (SHA-256): E1:2F:81:04:51:38:01:0E:D7:FB:9F:BD:2F:19:20:CC:74:41:13:86:B3:0D:26:45:9A:05:A4:A5:1D:C2:53:27 Fingerprint (SHA1): 0B:41:09:07:6A:19:DB:71:51:BE:91:4E:A9:18:84:A0:A5:D6:98:00 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8122: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172563 (0x13bd4ad3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Mar 31 17:57:11 2017 Not After : Thu Mar 31 17:57:11 2067 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:8d:35:6c:f6:73:20:56:29:05:66:3d:8b:30:66:ad: 70:27:c6:ce:03:cc:67:e9:a9:76:9e:70:02:11:fe:07: f2:d7:ff:ac:d6:20:9c:8b:66:fd:d9:28:05:ba:95:b3: c0:4c:4f:76:73:81:61:ee:83:a7:c8:c9:36:7b:ff:17: 8d:15:14:cc:f7:3f:59:f3:f7:7e:35:cb:08:c4:c6:da: 43:52:fb:fd:51:44:d7:39:ab:a3:65:a6:04:48:80:da: ce:6e:9a:25:4a:61:b5:8b:84:cc:77:b4:f4:7a:f5:ba: e6:33:d0:50:71:9d:b3:58:a9:2d:fd:de:d1:ad:b0:2a: 8f:28:15:1b:fd:5e:b2:20:70:8d:bd:02:dc:34:da:ba: 20:51:25:4f:3f:cd:63:74:54:d2:c2:64:de:b2:90:4a: 81:20:54:c5:37:78:f7:0b:8a:92:59:d3:84:f2:1b:8a: 06:c3:57:9e:22:6a:42:83:4d:d7:8d:29:5d:92:bf:66: c9:23:ef:fa:75:58:bb:98:4e:05:54:da:54:97:1e:f8: 38:0a:d6:7a:90:1b:e0:10:06:c8:9c:0f:44:c1:8f:11: 1c:89:2e:a3:fc:27:34:66:c8:3a:51:fa:c3:10:35:43: 1c:07:46:d2:93:31:25:f6:9b:b5:9a:fb:51:20:25:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:1b:79:7e:24:da:35:83:f9:9d:81:d4:d4:ed:65:c4: b7:e4:d8:df:b6:43:9e:42:a0:f4:bd:da:87:4e:0e:fc: 6a:55:e9:df:8d:99:cb:be:fc:e5:de:24:0a:6c:bd:bc: b8:28:95:ae:de:6b:51:96:47:6b:ed:57:39:82:8b:00: c6:f1:1e:43:06:6c:6a:69:bd:92:42:be:e0:0e:5e:b8: 86:61:67:01:8b:b9:1c:5d:56:00:00:01:a3:93:5a:06: 52:4e:e4:74:18:d3:19:08:3b:82:16:d6:77:4b:03:e5: ee:1b:e5:03:0f:ba:3b:d0:9c:93:39:71:ae:56:ef:bb: 29:2a:67:40:db:65:0c:c3:e5:2a:7b:a5:90:61:b3:fb: 53:64:50:ab:b1:b8:9b:4a:7f:89:2c:b6:ca:8a:13:cd: 95:66:af:4b:78:8c:64:5c:bc:19:fc:76:20:c9:2b:ab: cf:0c:80:db:c3:07:4b:7f:4e:ed:c2:6a:0d:95:2d:af: a3:aa:d0:f3:a3:c5:51:e9:64:c6:87:67:bd:0b:74:c4: dd:14:21:25:b0:76:34:58:4d:3f:7c:6a:05:79:80:33: 48:20:76:2c:ce:e3:8b:a5:67:3b:8e:e3:0a:60:8c:7d: 22:ea:e5:f0:cc:fb:57:a1:b4:30:7f:69:ad:15:2a:1b Fingerprint (SHA-256): 4B:13:9E:93:94:AC:EA:FE:44:D3:2C:33:68:25:6F:E2:F9:10:E7:3B:D2:7D:05:BD:D9:98:73:AF:82:49:BA:67 Fingerprint (SHA1): 4B:ED:0B:6F:0A:BB:A7:4F:73:18:43:85:CC:7C:F8:C4:60:7B:87:77 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #8123: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172559 (0x13bd4acf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 17:56:22 2017 Not After : Thu Mar 31 17:56:22 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:07:6a:d7:7e:fa:f5:f7:6e:fa:5a:98:15:24:e1:15: 93:cc:d3:84:42:53:52:28:2a:89:de:23:97:cf:d1:3a: b4:47:38:0c:32:97:d0:6a:11:d6:5c:0b:f8:44:50:cc: c0:d4:7c:c6:6c:b1:ef:f3:a0:56:7f:c3:4c:3c:a6:4c: b2:8b:db:ef:89:95:e7:22:90:4a:1e:40:8b:ac:d6:37: 79:cb:56:40:b1:de:34:0e:4d:2a:5b:8d:48:93:5e:89: 80:11:ae:b0:94:cb:2c:13:82:8d:27:38:8f:6e:00:d0: 72:b0:cb:5e:c0:73:bc:d1:0c:2c:df:3d:ff:91:7f:31: 0e:2a:71:52:98:73:e1:a1:1f:91:5f:b8:5b:96:ee:b3: d7:e7:8b:f0:8c:3d:14:26:b8:c6:61:1c:c8:0d:9f:b1: 8d:08:a6:cd:72:ab:fe:00:77:18:79:41:53:6c:2d:10: 58:0c:72:44:18:7c:27:b9:46:45:b3:c2:a8:ca:b1:a5: af:39:fe:f3:c2:f4:f2:ea:a7:c3:1d:3a:70:f7:47:ea: d4:5d:14:1b:0b:54:6a:41:85:91:c1:b6:c2:82:2d:8a: 4e:1d:50:ce:da:e6:7a:26:60:99:ea:a6:70:c0:57:26: 07:77:2d:d6:e2:b3:61:31:96:1c:a7:60:15:4e:f9:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:94:03:26:2c:e9:cc:6d:31:19:dd:7d:b3:dc:e2:92: d1:81:6a:08:0c:ba:4b:4e:4b:ad:1f:93:aa:ce:d3:53: 0a:c8:d5:dc:fb:46:11:6b:81:b8:b6:7a:29:fc:a4:39: 7a:ea:6d:d4:40:2b:57:7e:a0:80:e7:ed:79:a2:bd:df: 1a:b5:80:cd:a8:4c:8d:75:6a:ee:90:11:d7:8f:80:6c: e6:7b:42:94:a0:09:c1:b1:8a:e4:9e:13:81:bb:30:86: c3:60:fa:26:44:43:49:c3:ed:69:1a:ee:e4:f5:34:e3: 28:33:cf:ca:55:08:5e:c8:6c:85:29:f3:7e:12:6b:b3: ed:5f:7f:48:5a:9c:1a:74:09:e0:b4:53:a9:de:3f:e7: dd:85:c9:1c:99:f6:b4:e9:3b:2d:2f:ac:48:a1:a6:0e: 28:ce:13:4a:f7:df:08:bd:45:38:c3:8a:9a:9a:c2:5f: 02:a0:95:ec:16:37:9d:75:33:d2:76:9b:31:21:08:5b: 26:1e:a0:9d:c8:78:56:cf:fa:c4:38:1f:fc:80:af:8f: d5:87:f0:2d:3a:d0:58:02:12:f1:73:9c:f2:25:5f:eb: 8e:f7:cc:5f:2e:1f:6c:08:ab:70:4d:02:e2:e5:45:85: 4d:f7:bf:b3:2e:a0:85:af:b6:7d:00:92:b3:38:48:aa Fingerprint (SHA-256): E1:2F:81:04:51:38:01:0E:D7:FB:9F:BD:2F:19:20:CC:74:41:13:86:B3:0D:26:45:9A:05:A4:A5:1D:C2:53:27 Fingerprint (SHA1): 0B:41:09:07:6A:19:DB:71:51:BE:91:4E:A9:18:84:A0:A5:D6:98:00 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8124: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #8125: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #8126: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #8127: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #8128: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #8129: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172564 (0x13bd4ad4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Mar 31 17:57:17 2017 Not After : Thu Mar 31 17:57:17 2022 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:1f:7c:22:ae:da:4d:74:ea:2b:82:ae:65:f5:4c:b9: aa:ca:a9:55:87:83:ea:a4:b9:f0:6d:a1:da:b5:cf:82: 67:c4:6a:db:86:46:b0:2b:e5:3b:d0:92:7f:1d:83:a1: 30:a8:78:83:58:e1:b9:72:1b:dd:63:7f:38:b5:4f:a6: 69:35:a9:c0:c4:cf:db:2c:42:e9:9a:14:78:56:60:05: 9f:41:5e:f9:e2:a3:73:cc:56:77:0c:4b:9b:6f:74:7a: ea:12:92:4d:03:a6:25:4e:c8:12:1c:00:68:94:52:3e: 48:ad:7a:70:84:48:f2:95:58:6d:be:95:94:90:cb:a1: 17:65:b2:bc:9d:54:b2:05:47:67:d7:6b:c7:9e:d3:be: 52:ff:45:86:a8:8d:09:aa:68:9e:0b:6f:6a:99:a9:4b: 19:cb:bd:db:22:99:f3:cc:55:29:7a:37:6e:32:c5:6d: fa:aa:82:76:1a:90:6c:d6:27:4f:37:2f:4d:db:d5:83: 54:a7:13:87:f6:3c:54:62:88:6d:0e:a2:d5:08:39:6f: 93:5b:65:42:97:3e:94:04:ed:60:05:97:60:c1:3e:7b: a1:48:e7:82:42:ee:a5:0d:47:00:6b:da:87:7a:a0:98: e7:55:ca:09:2f:60:b7:bd:fc:a6:dc:50:65:80:cd:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:ae:67:23:93:2a:8c:3a:f4:fb:58:3b:d9:b9:5b:1e: 2b:d7:41:87:8d:bd:f0:38:d2:e4:4d:9e:fe:35:fa:fd: da:c0:fb:c7:0b:c3:bb:4b:92:62:c5:53:1b:9c:55:9b: 7f:7d:5a:42:29:78:ad:21:6e:8f:a0:2d:39:f5:c4:52: 63:f8:13:39:b8:67:59:06:b3:49:dc:c6:01:e6:9c:a5: 56:27:ce:9b:8f:62:0c:c6:58:74:cc:fd:d8:94:23:69: 06:44:a6:6a:f5:bb:7a:71:c6:83:f2:ec:9c:54:cc:ef: 8d:db:11:d0:3e:c4:6f:be:03:68:37:32:9d:04:81:5b: 8a:a7:7c:c0:6b:26:87:0a:19:c6:48:a9:00:d2:3f:8c: 2f:0a:fc:7d:68:98:66:19:d3:50:39:26:42:60:43:49: 78:1e:f4:88:3f:8a:36:61:05:77:a7:3e:18:43:77:33: fe:51:a5:69:13:e3:a5:61:ae:f8:0d:7d:51:a8:6d:53: 02:dd:58:4d:cc:69:76:d3:ae:a1:ed:46:61:63:ca:48: 70:35:fe:32:fe:04:63:e9:79:fd:23:42:d5:3d:e0:db: b2:bf:bb:e3:6c:8d:4c:fd:70:3b:c5:bd:7f:03:11:29: 78:e5:79:50:04:aa:8e:fc:c0:4a:45:9e:53:6a:3e:71 Fingerprint (SHA-256): E1:5A:55:4F:98:F1:4D:AA:83:E5:2F:36:BD:5C:D9:D5:14:F8:8B:83:3C:BA:8B:3C:76:8F:D6:C9:34:BF:BA:64 Fingerprint (SHA1): 95:08:76:DE:08:21:19:21:01:80:7C:6C:26:5B:7F:89:99:A9:7A:19 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #8130: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #8131: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #8132: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #8133: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #8134: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #8135: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8136: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #8137: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #8138: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8139: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #8140: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #8141: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #8142: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #8143: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8144: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #8145: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8146: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #8147: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8148: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #8149: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8150: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #8151: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8152: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #8153: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 843 at Fri Mar 31 17:57:54 UTC 2017 kill -USR1 843 httpserv: normal termination httpserv -b -p 9636 2>/dev/null; httpserv with PID 843 killed at Fri Mar 31 17:57:55 UTC 2017 httpserv starting at Fri Mar 31 17:57:55 UTC 2017 httpserv -D -p 9636 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/aiahttp/http_pid.2460 & trying to connect to httpserv at Fri Mar 31 17:57:55 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 retrying to connect to httpserv at Fri Mar 31 17:58:00 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 chains.sh: #8154: Waiting for Server - FAILED kill -0 16882 >/dev/null 2>/dev/null httpserv with PID 16882 found at Fri Mar 31 17:58:01 UTC 2017 httpserv with PID 16882 started at Fri Mar 31 17:58:01 UTC 2017 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #8155: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172566 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8156: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #8157: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #8158: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172567 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8159: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #8160: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #8161: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8162: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 331172568 -7 Bridge@Army < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8163: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8164: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 331172569 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8165: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8166: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #8167: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #8168: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8169: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 331172570 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8170: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8171: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8172: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #8173: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #8174: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172567 (0x13bd4ad7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 17:58:18 2017 Not After : Thu Mar 31 17:58:18 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:02:b7:66:24:d9:80:c4:a6:9a:d9:c0:d6:d7:e4:79: 5b:5b:bc:09:04:70:27:79:d5:5a:d4:4b:be:52:61:4f: 84:c5:e1:db:c1:94:44:71:0f:09:df:28:94:1b:e0:8a: 27:d7:59:6e:9d:61:33:5e:d4:7e:01:ab:14:8d:37:00: 2c:dc:35:fa:75:7b:5a:cd:b2:64:cb:2c:90:33:66:84: f8:66:c8:a5:d4:68:b2:55:9b:d1:29:06:a6:1d:cf:df: 96:a4:d1:97:2e:0a:31:eb:35:89:e4:7c:50:65:dc:38: 2d:22:4a:43:3c:be:7c:97:ed:c6:1f:2d:2f:43:c8:cb: 26:38:4c:fe:c3:50:52:ab:87:69:94:d9:85:d9:ff:a2: f8:dc:94:50:a9:3c:ea:ca:52:51:68:9d:98:f0:00:af: f6:5a:ea:34:22:40:28:c1:09:d8:77:cc:4e:e1:34:21: 09:b8:54:51:67:5a:6a:df:2f:3b:90:e5:b0:dc:c7:df: 36:bf:84:2c:2f:89:70:71:6d:41:38:cc:06:a4:5a:a3: 63:07:38:22:b6:a0:99:a6:3c:29:28:37:05:26:52:bc: 31:f7:f4:de:0c:1b:5d:0b:27:b0:d9:91:0b:41:13:b9: 48:4c:99:67:d5:76:61:6f:12:91:cd:6f:d1:97:67:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:f4:44:47:21:18:4f:53:84:73:1e:61:f3:80:a5:db: 27:56:19:a8:d5:18:d4:f5:9e:a4:fe:1c:c3:13:64:8f: 25:cb:ff:3b:5b:9d:a2:1f:0d:36:8b:ab:f3:b7:11:f6: 4e:bc:cf:46:94:ee:ba:a7:8d:9b:c0:c1:07:57:f8:a9: 3b:c4:03:6f:0c:7d:d5:ac:0a:53:b5:e8:98:23:96:b4: cb:c4:66:31:c2:be:3c:da:04:cc:20:6b:ec:6e:32:88: 1e:56:99:b2:a8:7a:51:d3:f8:85:03:af:09:3d:b6:2c: 22:13:94:1a:f4:e3:40:3c:70:f2:05:ee:74:39:e1:a4: 5c:38:c2:27:43:55:cb:e0:e7:70:10:fa:10:01:c3:76: 0b:29:c2:98:a7:a6:02:0c:13:49:c8:8b:41:78:17:40: 5d:a2:2d:d7:fb:70:e2:de:aa:9f:f0:5f:b0:5d:0e:45: 6e:8a:40:c3:ac:07:c1:dc:c6:4f:de:58:3d:89:c3:ce: c5:40:f7:7e:d2:29:6f:3f:cd:bd:14:fe:0e:35:4c:63: c8:10:6e:21:04:fd:45:9b:45:a9:91:56:d1:4e:b7:65: 6b:43:2d:c3:2d:4a:ed:e6:37:c5:1a:12:da:22:af:50: 87:ef:ea:0a:35:02:4c:60:98:fd:d3:ae:67:2c:7c:0c Fingerprint (SHA-256): DB:00:F0:97:90:C5:E7:8A:B5:38:00:D5:7D:81:E3:BF:08:25:B7:E2:67:DA:19:04:DB:DB:D6:A7:43:A6:BB:C1 Fingerprint (SHA1): 98:3B:9E:78:58:77:40:68:C6:35:CA:4C:5B:84:F1:A5:6C:82:A0:D6 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8175: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172566 (0x13bd4ad6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 17:58:06 2017 Not After : Thu Mar 31 17:58:06 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:08:3c:fd:da:de:8f:17:9e:32:33:27:42:0b:e8:46: 39:19:a3:98:b1:66:9c:71:90:f3:d4:a0:df:a0:99:ad: 7e:8e:49:3d:90:5a:d2:4d:c8:fb:53:f0:16:de:8d:f8: ab:40:e7:6d:64:a9:14:46:14:8f:e4:c8:c7:4b:5f:06: 08:45:1e:61:fc:cd:85:4b:05:26:2e:1e:f3:a6:2c:42: b2:6d:d2:89:32:ce:15:b6:f2:60:e3:0f:e3:79:fb:c8: 68:39:81:df:4b:94:b3:4c:c7:41:fa:2a:93:d1:b0:e3: 2d:fd:3c:14:78:1d:10:5b:a3:0f:73:76:1e:5b:63:fa: 81:d3:ca:76:bc:1a:18:87:45:76:bf:10:76:51:44:39: dd:77:1e:f8:ca:50:ce:6e:1e:15:ff:29:a6:4f:cf:87: a6:2a:00:d6:b1:d7:e6:6c:f9:e5:99:5e:84:73:d8:db: 9d:6b:cb:3b:f5:c3:a7:24:58:f8:24:1b:4b:e2:9a:18: 48:1a:a8:79:b9:87:bd:ce:92:da:b9:ae:94:03:6b:d1: 5a:56:f6:26:ed:04:8f:8c:87:e2:21:8a:e8:8b:aa:bc: 32:e7:4d:ce:84:31:a6:19:43:5d:5e:88:da:a3:2e:3e: b5:a2:26:a5:58:e5:dc:a0:c1:e5:5c:d3:6d:25:2e:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:ba:39:0f:4a:67:ee:ee:9e:f4:17:19:d6:d5:35:d6: 73:7a:9a:16:dd:31:17:2b:ab:f2:ce:27:ad:75:41:c3: 87:1c:2a:e0:87:4c:a0:27:ef:be:95:29:ab:88:9c:4e: eb:bc:bd:ad:55:2a:dc:4c:b5:b2:20:78:1e:4b:9f:77: 76:aa:c0:08:0f:83:5e:8a:57:89:55:e7:63:2f:cd:ad: d2:16:f5:24:c9:ec:24:82:50:11:df:95:53:6a:2c:ae: 1d:ba:c5:10:fa:79:38:85:84:44:19:66:b0:fa:67:d8: 16:4e:75:10:22:da:5c:24:3f:f2:5c:ec:62:0b:e6:86: 19:8c:29:bb:c9:9e:23:50:3c:a3:d0:f4:84:32:1a:6d: 9c:42:3d:20:35:35:31:04:6b:4b:62:da:72:1b:8a:20: b7:0b:43:13:1f:51:f3:c5:95:41:fc:1d:19:be:03:3a: 7a:78:d8:86:ac:19:4d:78:7a:ba:cc:00:47:c3:d6:2e: 7e:9a:53:e5:fd:c6:cf:15:e2:17:d3:4c:09:f0:a7:35: e6:8d:ee:38:b1:55:1a:30:8d:d2:5d:4f:d0:42:a5:d9: b7:d3:0d:05:d9:d7:84:5f:35:28:ac:70:e9:eb:8f:42: 4a:4f:12:20:9a:06:b7:69:c0:6c:0f:f9:f1:8c:94:de Fingerprint (SHA-256): 63:11:E3:5F:64:9A:54:A0:6C:0C:B9:DB:77:98:D9:59:82:93:1B:99:41:92:68:E7:C5:FE:7F:EA:34:80:F6:C2 Fingerprint (SHA1): 7C:8B:37:2A:67:4F:8D:70:55:19:6F:87:42:80:40:F0:E2:E7:5F:75 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8176: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #8177: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #8178: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #8179: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172566 (0x13bd4ad6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 17:58:06 2017 Not After : Thu Mar 31 17:58:06 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:08:3c:fd:da:de:8f:17:9e:32:33:27:42:0b:e8:46: 39:19:a3:98:b1:66:9c:71:90:f3:d4:a0:df:a0:99:ad: 7e:8e:49:3d:90:5a:d2:4d:c8:fb:53:f0:16:de:8d:f8: ab:40:e7:6d:64:a9:14:46:14:8f:e4:c8:c7:4b:5f:06: 08:45:1e:61:fc:cd:85:4b:05:26:2e:1e:f3:a6:2c:42: b2:6d:d2:89:32:ce:15:b6:f2:60:e3:0f:e3:79:fb:c8: 68:39:81:df:4b:94:b3:4c:c7:41:fa:2a:93:d1:b0:e3: 2d:fd:3c:14:78:1d:10:5b:a3:0f:73:76:1e:5b:63:fa: 81:d3:ca:76:bc:1a:18:87:45:76:bf:10:76:51:44:39: dd:77:1e:f8:ca:50:ce:6e:1e:15:ff:29:a6:4f:cf:87: a6:2a:00:d6:b1:d7:e6:6c:f9:e5:99:5e:84:73:d8:db: 9d:6b:cb:3b:f5:c3:a7:24:58:f8:24:1b:4b:e2:9a:18: 48:1a:a8:79:b9:87:bd:ce:92:da:b9:ae:94:03:6b:d1: 5a:56:f6:26:ed:04:8f:8c:87:e2:21:8a:e8:8b:aa:bc: 32:e7:4d:ce:84:31:a6:19:43:5d:5e:88:da:a3:2e:3e: b5:a2:26:a5:58:e5:dc:a0:c1:e5:5c:d3:6d:25:2e:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:ba:39:0f:4a:67:ee:ee:9e:f4:17:19:d6:d5:35:d6: 73:7a:9a:16:dd:31:17:2b:ab:f2:ce:27:ad:75:41:c3: 87:1c:2a:e0:87:4c:a0:27:ef:be:95:29:ab:88:9c:4e: eb:bc:bd:ad:55:2a:dc:4c:b5:b2:20:78:1e:4b:9f:77: 76:aa:c0:08:0f:83:5e:8a:57:89:55:e7:63:2f:cd:ad: d2:16:f5:24:c9:ec:24:82:50:11:df:95:53:6a:2c:ae: 1d:ba:c5:10:fa:79:38:85:84:44:19:66:b0:fa:67:d8: 16:4e:75:10:22:da:5c:24:3f:f2:5c:ec:62:0b:e6:86: 19:8c:29:bb:c9:9e:23:50:3c:a3:d0:f4:84:32:1a:6d: 9c:42:3d:20:35:35:31:04:6b:4b:62:da:72:1b:8a:20: b7:0b:43:13:1f:51:f3:c5:95:41:fc:1d:19:be:03:3a: 7a:78:d8:86:ac:19:4d:78:7a:ba:cc:00:47:c3:d6:2e: 7e:9a:53:e5:fd:c6:cf:15:e2:17:d3:4c:09:f0:a7:35: e6:8d:ee:38:b1:55:1a:30:8d:d2:5d:4f:d0:42:a5:d9: b7:d3:0d:05:d9:d7:84:5f:35:28:ac:70:e9:eb:8f:42: 4a:4f:12:20:9a:06:b7:69:c0:6c:0f:f9:f1:8c:94:de Fingerprint (SHA-256): 63:11:E3:5F:64:9A:54:A0:6C:0C:B9:DB:77:98:D9:59:82:93:1B:99:41:92:68:E7:C5:FE:7F:EA:34:80:F6:C2 Fingerprint (SHA1): 7C:8B:37:2A:67:4F:8D:70:55:19:6F:87:42:80:40:F0:E2:E7:5F:75 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8180: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172567 (0x13bd4ad7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 17:58:18 2017 Not After : Thu Mar 31 17:58:18 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:02:b7:66:24:d9:80:c4:a6:9a:d9:c0:d6:d7:e4:79: 5b:5b:bc:09:04:70:27:79:d5:5a:d4:4b:be:52:61:4f: 84:c5:e1:db:c1:94:44:71:0f:09:df:28:94:1b:e0:8a: 27:d7:59:6e:9d:61:33:5e:d4:7e:01:ab:14:8d:37:00: 2c:dc:35:fa:75:7b:5a:cd:b2:64:cb:2c:90:33:66:84: f8:66:c8:a5:d4:68:b2:55:9b:d1:29:06:a6:1d:cf:df: 96:a4:d1:97:2e:0a:31:eb:35:89:e4:7c:50:65:dc:38: 2d:22:4a:43:3c:be:7c:97:ed:c6:1f:2d:2f:43:c8:cb: 26:38:4c:fe:c3:50:52:ab:87:69:94:d9:85:d9:ff:a2: f8:dc:94:50:a9:3c:ea:ca:52:51:68:9d:98:f0:00:af: f6:5a:ea:34:22:40:28:c1:09:d8:77:cc:4e:e1:34:21: 09:b8:54:51:67:5a:6a:df:2f:3b:90:e5:b0:dc:c7:df: 36:bf:84:2c:2f:89:70:71:6d:41:38:cc:06:a4:5a:a3: 63:07:38:22:b6:a0:99:a6:3c:29:28:37:05:26:52:bc: 31:f7:f4:de:0c:1b:5d:0b:27:b0:d9:91:0b:41:13:b9: 48:4c:99:67:d5:76:61:6f:12:91:cd:6f:d1:97:67:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:f4:44:47:21:18:4f:53:84:73:1e:61:f3:80:a5:db: 27:56:19:a8:d5:18:d4:f5:9e:a4:fe:1c:c3:13:64:8f: 25:cb:ff:3b:5b:9d:a2:1f:0d:36:8b:ab:f3:b7:11:f6: 4e:bc:cf:46:94:ee:ba:a7:8d:9b:c0:c1:07:57:f8:a9: 3b:c4:03:6f:0c:7d:d5:ac:0a:53:b5:e8:98:23:96:b4: cb:c4:66:31:c2:be:3c:da:04:cc:20:6b:ec:6e:32:88: 1e:56:99:b2:a8:7a:51:d3:f8:85:03:af:09:3d:b6:2c: 22:13:94:1a:f4:e3:40:3c:70:f2:05:ee:74:39:e1:a4: 5c:38:c2:27:43:55:cb:e0:e7:70:10:fa:10:01:c3:76: 0b:29:c2:98:a7:a6:02:0c:13:49:c8:8b:41:78:17:40: 5d:a2:2d:d7:fb:70:e2:de:aa:9f:f0:5f:b0:5d:0e:45: 6e:8a:40:c3:ac:07:c1:dc:c6:4f:de:58:3d:89:c3:ce: c5:40:f7:7e:d2:29:6f:3f:cd:bd:14:fe:0e:35:4c:63: c8:10:6e:21:04:fd:45:9b:45:a9:91:56:d1:4e:b7:65: 6b:43:2d:c3:2d:4a:ed:e6:37:c5:1a:12:da:22:af:50: 87:ef:ea:0a:35:02:4c:60:98:fd:d3:ae:67:2c:7c:0c Fingerprint (SHA-256): DB:00:F0:97:90:C5:E7:8A:B5:38:00:D5:7D:81:E3:BF:08:25:B7:E2:67:DA:19:04:DB:DB:D6:A7:43:A6:BB:C1 Fingerprint (SHA1): 98:3B:9E:78:58:77:40:68:C6:35:CA:4C:5B:84:F1:A5:6C:82:A0:D6 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8181: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #8182: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #8183: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #8184: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #8185: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #8186: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172567 (0x13bd4ad7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 17:58:18 2017 Not After : Thu Mar 31 17:58:18 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:02:b7:66:24:d9:80:c4:a6:9a:d9:c0:d6:d7:e4:79: 5b:5b:bc:09:04:70:27:79:d5:5a:d4:4b:be:52:61:4f: 84:c5:e1:db:c1:94:44:71:0f:09:df:28:94:1b:e0:8a: 27:d7:59:6e:9d:61:33:5e:d4:7e:01:ab:14:8d:37:00: 2c:dc:35:fa:75:7b:5a:cd:b2:64:cb:2c:90:33:66:84: f8:66:c8:a5:d4:68:b2:55:9b:d1:29:06:a6:1d:cf:df: 96:a4:d1:97:2e:0a:31:eb:35:89:e4:7c:50:65:dc:38: 2d:22:4a:43:3c:be:7c:97:ed:c6:1f:2d:2f:43:c8:cb: 26:38:4c:fe:c3:50:52:ab:87:69:94:d9:85:d9:ff:a2: f8:dc:94:50:a9:3c:ea:ca:52:51:68:9d:98:f0:00:af: f6:5a:ea:34:22:40:28:c1:09:d8:77:cc:4e:e1:34:21: 09:b8:54:51:67:5a:6a:df:2f:3b:90:e5:b0:dc:c7:df: 36:bf:84:2c:2f:89:70:71:6d:41:38:cc:06:a4:5a:a3: 63:07:38:22:b6:a0:99:a6:3c:29:28:37:05:26:52:bc: 31:f7:f4:de:0c:1b:5d:0b:27:b0:d9:91:0b:41:13:b9: 48:4c:99:67:d5:76:61:6f:12:91:cd:6f:d1:97:67:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:f4:44:47:21:18:4f:53:84:73:1e:61:f3:80:a5:db: 27:56:19:a8:d5:18:d4:f5:9e:a4:fe:1c:c3:13:64:8f: 25:cb:ff:3b:5b:9d:a2:1f:0d:36:8b:ab:f3:b7:11:f6: 4e:bc:cf:46:94:ee:ba:a7:8d:9b:c0:c1:07:57:f8:a9: 3b:c4:03:6f:0c:7d:d5:ac:0a:53:b5:e8:98:23:96:b4: cb:c4:66:31:c2:be:3c:da:04:cc:20:6b:ec:6e:32:88: 1e:56:99:b2:a8:7a:51:d3:f8:85:03:af:09:3d:b6:2c: 22:13:94:1a:f4:e3:40:3c:70:f2:05:ee:74:39:e1:a4: 5c:38:c2:27:43:55:cb:e0:e7:70:10:fa:10:01:c3:76: 0b:29:c2:98:a7:a6:02:0c:13:49:c8:8b:41:78:17:40: 5d:a2:2d:d7:fb:70:e2:de:aa:9f:f0:5f:b0:5d:0e:45: 6e:8a:40:c3:ac:07:c1:dc:c6:4f:de:58:3d:89:c3:ce: c5:40:f7:7e:d2:29:6f:3f:cd:bd:14:fe:0e:35:4c:63: c8:10:6e:21:04:fd:45:9b:45:a9:91:56:d1:4e:b7:65: 6b:43:2d:c3:2d:4a:ed:e6:37:c5:1a:12:da:22:af:50: 87:ef:ea:0a:35:02:4c:60:98:fd:d3:ae:67:2c:7c:0c Fingerprint (SHA-256): DB:00:F0:97:90:C5:E7:8A:B5:38:00:D5:7D:81:E3:BF:08:25:B7:E2:67:DA:19:04:DB:DB:D6:A7:43:A6:BB:C1 Fingerprint (SHA1): 98:3B:9E:78:58:77:40:68:C6:35:CA:4C:5B:84:F1:A5:6C:82:A0:D6 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8187: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172567 (0x13bd4ad7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 17:58:18 2017 Not After : Thu Mar 31 17:58:18 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:02:b7:66:24:d9:80:c4:a6:9a:d9:c0:d6:d7:e4:79: 5b:5b:bc:09:04:70:27:79:d5:5a:d4:4b:be:52:61:4f: 84:c5:e1:db:c1:94:44:71:0f:09:df:28:94:1b:e0:8a: 27:d7:59:6e:9d:61:33:5e:d4:7e:01:ab:14:8d:37:00: 2c:dc:35:fa:75:7b:5a:cd:b2:64:cb:2c:90:33:66:84: f8:66:c8:a5:d4:68:b2:55:9b:d1:29:06:a6:1d:cf:df: 96:a4:d1:97:2e:0a:31:eb:35:89:e4:7c:50:65:dc:38: 2d:22:4a:43:3c:be:7c:97:ed:c6:1f:2d:2f:43:c8:cb: 26:38:4c:fe:c3:50:52:ab:87:69:94:d9:85:d9:ff:a2: f8:dc:94:50:a9:3c:ea:ca:52:51:68:9d:98:f0:00:af: f6:5a:ea:34:22:40:28:c1:09:d8:77:cc:4e:e1:34:21: 09:b8:54:51:67:5a:6a:df:2f:3b:90:e5:b0:dc:c7:df: 36:bf:84:2c:2f:89:70:71:6d:41:38:cc:06:a4:5a:a3: 63:07:38:22:b6:a0:99:a6:3c:29:28:37:05:26:52:bc: 31:f7:f4:de:0c:1b:5d:0b:27:b0:d9:91:0b:41:13:b9: 48:4c:99:67:d5:76:61:6f:12:91:cd:6f:d1:97:67:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:f4:44:47:21:18:4f:53:84:73:1e:61:f3:80:a5:db: 27:56:19:a8:d5:18:d4:f5:9e:a4:fe:1c:c3:13:64:8f: 25:cb:ff:3b:5b:9d:a2:1f:0d:36:8b:ab:f3:b7:11:f6: 4e:bc:cf:46:94:ee:ba:a7:8d:9b:c0:c1:07:57:f8:a9: 3b:c4:03:6f:0c:7d:d5:ac:0a:53:b5:e8:98:23:96:b4: cb:c4:66:31:c2:be:3c:da:04:cc:20:6b:ec:6e:32:88: 1e:56:99:b2:a8:7a:51:d3:f8:85:03:af:09:3d:b6:2c: 22:13:94:1a:f4:e3:40:3c:70:f2:05:ee:74:39:e1:a4: 5c:38:c2:27:43:55:cb:e0:e7:70:10:fa:10:01:c3:76: 0b:29:c2:98:a7:a6:02:0c:13:49:c8:8b:41:78:17:40: 5d:a2:2d:d7:fb:70:e2:de:aa:9f:f0:5f:b0:5d:0e:45: 6e:8a:40:c3:ac:07:c1:dc:c6:4f:de:58:3d:89:c3:ce: c5:40:f7:7e:d2:29:6f:3f:cd:bd:14:fe:0e:35:4c:63: c8:10:6e:21:04:fd:45:9b:45:a9:91:56:d1:4e:b7:65: 6b:43:2d:c3:2d:4a:ed:e6:37:c5:1a:12:da:22:af:50: 87:ef:ea:0a:35:02:4c:60:98:fd:d3:ae:67:2c:7c:0c Fingerprint (SHA-256): DB:00:F0:97:90:C5:E7:8A:B5:38:00:D5:7D:81:E3:BF:08:25:B7:E2:67:DA:19:04:DB:DB:D6:A7:43:A6:BB:C1 Fingerprint (SHA1): 98:3B:9E:78:58:77:40:68:C6:35:CA:4C:5B:84:F1:A5:6C:82:A0:D6 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8188: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #8189: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #8190: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #8191: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #8192: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #8193: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172566 (0x13bd4ad6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 17:58:06 2017 Not After : Thu Mar 31 17:58:06 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:08:3c:fd:da:de:8f:17:9e:32:33:27:42:0b:e8:46: 39:19:a3:98:b1:66:9c:71:90:f3:d4:a0:df:a0:99:ad: 7e:8e:49:3d:90:5a:d2:4d:c8:fb:53:f0:16:de:8d:f8: ab:40:e7:6d:64:a9:14:46:14:8f:e4:c8:c7:4b:5f:06: 08:45:1e:61:fc:cd:85:4b:05:26:2e:1e:f3:a6:2c:42: b2:6d:d2:89:32:ce:15:b6:f2:60:e3:0f:e3:79:fb:c8: 68:39:81:df:4b:94:b3:4c:c7:41:fa:2a:93:d1:b0:e3: 2d:fd:3c:14:78:1d:10:5b:a3:0f:73:76:1e:5b:63:fa: 81:d3:ca:76:bc:1a:18:87:45:76:bf:10:76:51:44:39: dd:77:1e:f8:ca:50:ce:6e:1e:15:ff:29:a6:4f:cf:87: a6:2a:00:d6:b1:d7:e6:6c:f9:e5:99:5e:84:73:d8:db: 9d:6b:cb:3b:f5:c3:a7:24:58:f8:24:1b:4b:e2:9a:18: 48:1a:a8:79:b9:87:bd:ce:92:da:b9:ae:94:03:6b:d1: 5a:56:f6:26:ed:04:8f:8c:87:e2:21:8a:e8:8b:aa:bc: 32:e7:4d:ce:84:31:a6:19:43:5d:5e:88:da:a3:2e:3e: b5:a2:26:a5:58:e5:dc:a0:c1:e5:5c:d3:6d:25:2e:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:ba:39:0f:4a:67:ee:ee:9e:f4:17:19:d6:d5:35:d6: 73:7a:9a:16:dd:31:17:2b:ab:f2:ce:27:ad:75:41:c3: 87:1c:2a:e0:87:4c:a0:27:ef:be:95:29:ab:88:9c:4e: eb:bc:bd:ad:55:2a:dc:4c:b5:b2:20:78:1e:4b:9f:77: 76:aa:c0:08:0f:83:5e:8a:57:89:55:e7:63:2f:cd:ad: d2:16:f5:24:c9:ec:24:82:50:11:df:95:53:6a:2c:ae: 1d:ba:c5:10:fa:79:38:85:84:44:19:66:b0:fa:67:d8: 16:4e:75:10:22:da:5c:24:3f:f2:5c:ec:62:0b:e6:86: 19:8c:29:bb:c9:9e:23:50:3c:a3:d0:f4:84:32:1a:6d: 9c:42:3d:20:35:35:31:04:6b:4b:62:da:72:1b:8a:20: b7:0b:43:13:1f:51:f3:c5:95:41:fc:1d:19:be:03:3a: 7a:78:d8:86:ac:19:4d:78:7a:ba:cc:00:47:c3:d6:2e: 7e:9a:53:e5:fd:c6:cf:15:e2:17:d3:4c:09:f0:a7:35: e6:8d:ee:38:b1:55:1a:30:8d:d2:5d:4f:d0:42:a5:d9: b7:d3:0d:05:d9:d7:84:5f:35:28:ac:70:e9:eb:8f:42: 4a:4f:12:20:9a:06:b7:69:c0:6c:0f:f9:f1:8c:94:de Fingerprint (SHA-256): 63:11:E3:5F:64:9A:54:A0:6C:0C:B9:DB:77:98:D9:59:82:93:1B:99:41:92:68:E7:C5:FE:7F:EA:34:80:F6:C2 Fingerprint (SHA1): 7C:8B:37:2A:67:4F:8D:70:55:19:6F:87:42:80:40:F0:E2:E7:5F:75 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8194: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172566 (0x13bd4ad6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 17:58:06 2017 Not After : Thu Mar 31 17:58:06 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:08:3c:fd:da:de:8f:17:9e:32:33:27:42:0b:e8:46: 39:19:a3:98:b1:66:9c:71:90:f3:d4:a0:df:a0:99:ad: 7e:8e:49:3d:90:5a:d2:4d:c8:fb:53:f0:16:de:8d:f8: ab:40:e7:6d:64:a9:14:46:14:8f:e4:c8:c7:4b:5f:06: 08:45:1e:61:fc:cd:85:4b:05:26:2e:1e:f3:a6:2c:42: b2:6d:d2:89:32:ce:15:b6:f2:60:e3:0f:e3:79:fb:c8: 68:39:81:df:4b:94:b3:4c:c7:41:fa:2a:93:d1:b0:e3: 2d:fd:3c:14:78:1d:10:5b:a3:0f:73:76:1e:5b:63:fa: 81:d3:ca:76:bc:1a:18:87:45:76:bf:10:76:51:44:39: dd:77:1e:f8:ca:50:ce:6e:1e:15:ff:29:a6:4f:cf:87: a6:2a:00:d6:b1:d7:e6:6c:f9:e5:99:5e:84:73:d8:db: 9d:6b:cb:3b:f5:c3:a7:24:58:f8:24:1b:4b:e2:9a:18: 48:1a:a8:79:b9:87:bd:ce:92:da:b9:ae:94:03:6b:d1: 5a:56:f6:26:ed:04:8f:8c:87:e2:21:8a:e8:8b:aa:bc: 32:e7:4d:ce:84:31:a6:19:43:5d:5e:88:da:a3:2e:3e: b5:a2:26:a5:58:e5:dc:a0:c1:e5:5c:d3:6d:25:2e:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:ba:39:0f:4a:67:ee:ee:9e:f4:17:19:d6:d5:35:d6: 73:7a:9a:16:dd:31:17:2b:ab:f2:ce:27:ad:75:41:c3: 87:1c:2a:e0:87:4c:a0:27:ef:be:95:29:ab:88:9c:4e: eb:bc:bd:ad:55:2a:dc:4c:b5:b2:20:78:1e:4b:9f:77: 76:aa:c0:08:0f:83:5e:8a:57:89:55:e7:63:2f:cd:ad: d2:16:f5:24:c9:ec:24:82:50:11:df:95:53:6a:2c:ae: 1d:ba:c5:10:fa:79:38:85:84:44:19:66:b0:fa:67:d8: 16:4e:75:10:22:da:5c:24:3f:f2:5c:ec:62:0b:e6:86: 19:8c:29:bb:c9:9e:23:50:3c:a3:d0:f4:84:32:1a:6d: 9c:42:3d:20:35:35:31:04:6b:4b:62:da:72:1b:8a:20: b7:0b:43:13:1f:51:f3:c5:95:41:fc:1d:19:be:03:3a: 7a:78:d8:86:ac:19:4d:78:7a:ba:cc:00:47:c3:d6:2e: 7e:9a:53:e5:fd:c6:cf:15:e2:17:d3:4c:09:f0:a7:35: e6:8d:ee:38:b1:55:1a:30:8d:d2:5d:4f:d0:42:a5:d9: b7:d3:0d:05:d9:d7:84:5f:35:28:ac:70:e9:eb:8f:42: 4a:4f:12:20:9a:06:b7:69:c0:6c:0f:f9:f1:8c:94:de Fingerprint (SHA-256): 63:11:E3:5F:64:9A:54:A0:6C:0C:B9:DB:77:98:D9:59:82:93:1B:99:41:92:68:E7:C5:FE:7F:EA:34:80:F6:C2 Fingerprint (SHA1): 7C:8B:37:2A:67:4F:8D:70:55:19:6F:87:42:80:40:F0:E2:E7:5F:75 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8195: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #8196: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172571 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8197: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #8198: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #8199: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172572 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8200: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #8201: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #8202: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172573 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8203: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #8204: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #8205: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172574 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8206: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #8207: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #8208: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172575 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8209: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #8210: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #8211: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172576 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8212: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #8213: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #8214: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172577 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8215: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #8216: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #8217: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172578 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8218: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #8219: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #8220: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172579 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8221: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #8222: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #8223: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8224: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 331172580 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8225: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8226: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 331172581 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8227: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8228: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 331172582 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8229: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8230: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #8231: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #8232: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8233: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 331172583 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8234: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8235: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 331172584 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8236: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8237: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 331172585 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8238: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8239: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #8240: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #8241: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8242: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 331172586 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8243: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8244: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 331172587 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8245: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8246: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 331172588 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8247: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8248: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #8249: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #8250: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8251: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 331172589 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8252: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8253: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 331172590 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8254: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8255: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 331172591 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8256: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8257: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #8258: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8259: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8260: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 331172592 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8261: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8262: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8263: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8264: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331172593 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8265: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8266: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172571 (0x13bd4adb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Mar 31 17:59:04 2017 Not After : Thu Mar 31 17:59:04 2067 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:e3:2d:1e:4e:d2:be:06:c2:c6:10:5a:5f:80:fc:13: 30:8b:3a:57:2f:b8:7b:b4:fd:9d:1e:ad:17:ab:7e:06: 7b:c1:82:f8:37:e0:a6:b1:3c:19:ee:e6:94:98:72:ac: 47:3a:db:06:1f:16:e2:02:ed:5a:28:a1:6f:46:9d:bf: a5:ae:59:c5:43:bc:b4:ab:ac:3b:ba:a8:05:04:68:9e: 53:e4:03:3d:eb:6d:2a:a9:2b:85:a2:b3:ee:87:c6:4f: 0e:a2:1e:64:d7:cf:1d:d8:88:fd:a1:88:1b:1c:04:5b: 62:27:7a:f0:75:99:b9:e4:a3:56:33:fa:36:40:d3:df: e7:e0:31:99:1b:17:32:37:28:33:6c:b0:20:b8:7f:8a: 89:81:f1:15:d0:a2:bc:3c:ba:bf:30:9d:dd:9d:fb:11: 71:a7:8e:53:89:1d:5d:51:cc:c5:09:35:ec:93:12:85: c8:d0:1a:4d:02:8f:ff:a1:48:c6:8a:12:60:9f:23:53: 78:d7:da:a4:cf:5a:5e:47:6f:a2:92:9f:10:30:b2:93: f7:d0:a6:9a:21:0d:a9:29:04:b8:64:34:8f:31:3e:1f: 46:ec:ca:a6:bd:c5:a1:9a:62:39:e0:5f:00:a5:c6:72: 5c:98:c9:66:87:5d:36:70:70:ae:ea:da:b1:66:2b:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:71:c9:e4:7e:94:d0:33:f5:7a:aa:07:9a:74:35:6f: 64:a3:38:cd:30:7b:93:ce:69:a1:70:cb:24:b6:09:d5: 47:54:4d:ad:07:4d:02:f8:14:0d:5b:2b:27:fd:ef:35: 55:9f:4d:3c:7f:ba:d4:16:f8:34:a3:f7:c1:b0:cd:72: d2:92:e7:45:59:bc:48:34:10:9e:d3:3f:da:b8:db:d1: 4c:15:8e:f0:f4:63:95:91:1d:ca:b5:58:22:bf:3f:57: 35:f9:e5:c3:a3:79:ce:3e:56:b5:ab:dc:cd:88:af:a5: 11:f9:3b:13:e7:d9:2e:a6:e1:a9:ee:05:71:2d:2b:3e: a7:2c:7e:8b:ed:98:ed:45:5d:df:03:c8:4f:e7:6f:03: b7:57:c7:11:ee:7d:81:fa:e7:4d:fd:97:a6:fe:39:f4: 42:12:1b:7b:c0:b9:0e:67:52:0b:8b:ee:8e:0a:82:99: 26:1e:57:33:07:d7:1f:62:29:a7:8a:0a:2f:7c:33:e8: ef:38:be:a7:77:85:9a:89:a7:89:19:55:14:08:d7:c3: 14:3c:cb:6f:1f:73:dc:45:98:3f:7e:7d:15:c7:a8:8a: 99:f0:20:e9:c7:45:c5:68:a3:79:5a:8f:ad:50:7a:b3: 27:e8:c7:98:50:20:05:f9:14:19:c3:45:d3:22:9c:c7 Fingerprint (SHA-256): D5:07:1D:B5:49:79:90:E7:AE:10:28:D0:43:3F:5A:97:BC:86:DC:54:A5:AB:B0:B9:62:C3:0E:24:91:55:BC:DA Fingerprint (SHA1): 0D:94:5B:BF:FA:AD:F9:B6:D8:7D:0B:22:A3:96:C1:D8:8D:06:73:29 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #8267: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172572 (0x13bd4adc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Mar 31 17:59:17 2017 Not After : Thu Mar 31 17:59:17 2067 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:e4:f3:32:fc:73:9c:ae:56:c8:d3:b8:50:d5:f0:97: 60:95:66:27:ae:e5:6f:98:e0:b0:50:08:f7:60:23:6c: f7:6d:86:80:51:a8:a2:a2:1b:fe:31:cb:e5:79:2c:98: a0:69:44:52:7f:28:70:aa:5b:bd:c4:cd:45:f0:27:7e: af:a3:b0:4b:3e:25:db:3a:6b:c0:b2:e1:7d:80:6e:c4: 23:f1:e1:40:ee:1f:c3:13:34:cc:39:b7:c5:7b:93:d9: e9:b6:f9:6f:ef:68:6a:09:e4:4a:f3:2c:41:7d:0c:93: 99:44:47:11:45:2d:72:24:a3:e4:39:e6:15:e6:68:0d: 57:e6:5b:1f:b7:6c:a3:89:d5:84:86:62:67:ba:a4:6e: 54:4d:65:3c:36:aa:82:0b:64:af:be:01:a1:30:39:b2: 8c:be:bd:38:a4:76:7e:ff:0c:23:c4:14:6d:21:9a:52: 78:88:a7:9b:f6:cf:37:ae:ef:c2:1a:0f:9e:2c:7c:71: 19:a0:25:4f:50:df:51:26:d5:8c:b4:63:ca:ae:31:89: 95:12:f8:33:a3:c8:9d:ab:52:5d:6a:b1:9c:3f:cd:d3: 46:d5:19:28:58:69:10:56:67:4d:a7:99:27:ba:2f:6f: be:af:4d:ed:84:46:17:d7:6d:5c:f9:df:eb:ca:cb:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9b:88:8e:e3:39:d9:80:19:0a:66:bc:b3:7e:af:f6:d5: 3c:16:1b:65:0e:06:df:08:71:63:bc:0b:b3:8d:72:2b: d7:d8:e7:12:9e:a3:ce:35:fb:6f:c6:76:46:8f:41:8e: 96:20:04:0e:a5:34:26:b0:9d:94:c3:24:33:d5:61:8e: 96:cd:09:63:92:0d:bf:25:9e:1c:2e:08:b5:73:2f:f4: 2c:2d:b1:3b:f0:fd:bc:b2:13:6d:3a:e2:6e:5c:da:7d: 93:00:69:3d:df:35:79:7b:b7:63:87:46:b1:3a:84:35: da:67:e0:96:94:4f:63:5c:8b:9e:8d:d0:63:b2:39:64: ae:dc:24:e8:38:f2:a3:40:e7:c6:23:33:7b:62:4e:87: dc:7f:34:b3:09:57:6d:e0:ca:60:af:ee:16:66:06:70: 13:6e:6e:73:ee:d0:c9:01:6b:7c:af:cb:fd:71:f4:75: b8:b3:35:39:dc:bf:89:bc:e5:04:f5:f1:1a:06:c0:6d: 24:68:eb:98:21:25:fc:c4:75:48:16:2a:6a:9c:d0:1d: a5:b5:aa:e8:1b:98:fb:61:73:fa:02:c4:31:62:8a:c9: 15:9d:ea:4f:31:79:b9:d3:85:ae:ee:27:32:80:df:80: ed:bc:d7:c6:e5:59:cd:6e:c1:98:42:c3:3f:44:87:dc Fingerprint (SHA-256): E6:7B:C4:B9:DA:33:FF:BB:26:33:B7:C1:97:08:45:8B:45:8A:9E:55:8B:99:05:61:73:9E:60:46:55:9C:15:AC Fingerprint (SHA1): 3C:0A:D8:D0:DE:11:61:6C:59:09:A1:D7:65:33:28:B4:56:FB:28:A3 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #8268: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172573 (0x13bd4add) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Mar 31 17:59:34 2017 Not After : Thu Mar 31 17:59:34 2067 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:58:c9:32:56:e0:b6:9a:51:c2:67:52:9c:ac:ff:71: db:4b:61:5d:e4:01:29:6f:ff:16:7f:00:1e:74:c6:ca: 81:a1:77:1b:73:af:21:34:8b:9f:ee:89:1e:28:4c:48: 5b:59:35:ec:49:1d:98:bb:32:f7:46:8b:2a:2a:7a:04: 7f:88:9e:aa:1e:64:95:d8:4b:bf:87:09:ac:9b:7e:83: 03:d9:4a:59:0a:b5:8c:a4:c8:4b:7b:72:95:50:a5:3a: bd:71:e9:4c:f7:71:59:ba:1a:42:ad:41:57:44:0e:0d: 8a:12:36:30:f1:df:b6:47:3b:36:02:b2:97:34:e5:17: 68:82:ed:58:0f:ae:67:07:0e:ed:45:21:cd:7f:14:aa: 49:4f:c4:56:74:dd:cd:45:35:08:18:05:7d:2f:bc:8d: aa:c2:d9:cc:b3:62:88:68:fd:ed:14:bc:45:b4:9e:88: 9a:bb:4f:18:d5:15:96:a6:9a:1b:b9:50:f7:07:1a:8f: 25:27:3e:b3:eb:0e:8e:30:03:b0:9b:14:f0:58:da:65: a1:2a:4b:5e:bf:71:60:b3:c4:b8:f6:d8:1e:6f:df:71: 7d:60:6c:3b:53:4d:a6:bc:74:fb:b3:b6:b0:3f:1d:2e: db:fb:fc:3b:f2:cc:6a:ca:b9:3e:11:98:f0:6f:49:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:d5:04:44:83:30:ee:a8:9e:3d:0c:d6:98:46:23:a6: e3:15:af:99:0c:18:0f:00:00:62:df:53:1a:98:8d:16: 85:29:06:7f:3d:58:ee:5a:d5:05:5d:2c:11:b8:f5:af: 9d:d1:74:2a:12:84:26:85:7f:36:b7:55:9d:38:bd:4e: 1b:6c:52:eb:73:26:16:36:5a:82:d6:44:9c:5a:58:85: 98:44:fd:3c:d4:ca:81:5c:2c:91:0a:4e:07:06:ba:2a: a3:64:20:29:24:5e:32:fb:44:5f:6a:66:d4:82:73:63: 57:b0:93:db:53:91:e2:5b:8b:ce:b0:0a:24:4f:e3:7e: d2:fa:a3:85:04:e5:6c:1c:2d:59:41:b3:5d:13:7d:dc: 7c:ad:91:64:65:6b:ac:19:4c:2b:53:0a:d1:c3:43:e9: dd:60:e7:e6:dc:09:d7:8c:d4:e0:c3:aa:a7:34:34:df: 2b:85:be:cf:80:b6:ef:12:6e:a1:f2:79:42:9d:50:fc: ce:a6:83:f0:19:cc:b5:d6:ac:c9:1b:ca:9f:c0:ae:15: f4:a2:3a:d2:73:82:8d:ec:b6:2e:6a:48:33:93:c1:e0: a0:ff:e6:f4:70:25:3d:a3:9e:cb:9e:8f:47:30:51:87: b8:12:1d:51:5b:e0:13:31:10:8c:53:29:52:99:fa:cc Fingerprint (SHA-256): 8E:CC:55:74:F7:B3:D5:C3:C2:72:3A:26:35:2C:90:C0:19:FD:1B:3F:A1:66:0C:94:6C:57:2B:B8:99:42:D5:BC Fingerprint (SHA1): 3B:13:8F:41:31:F7:05:8E:44:72:CF:15:18:9A:81:3C:9A:93:20:E0 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #8269: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172574 (0x13bd4ade) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Mar 31 17:59:51 2017 Not After : Thu Mar 31 17:59:51 2067 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:2d:da:44:8c:86:14:ef:c1:bd:c5:5a:fe:91:6f:36: 46:0e:d0:1c:10:80:8b:51:06:5c:c6:52:99:b1:3e:73: fb:bb:42:a0:f1:39:bc:37:76:3c:80:a4:59:b3:1a:be: e1:bf:15:53:de:5d:47:1a:d8:33:75:57:7d:ea:9b:84: eb:16:f9:4b:a8:7c:7b:33:a6:88:4a:18:64:44:09:56: ad:82:6f:b8:8b:4c:8a:72:07:d2:fc:eb:15:1e:88:4c: af:7b:25:48:cf:26:80:76:3d:d5:5d:3e:a9:ca:f5:0c: 92:9f:b9:a9:e4:a5:b8:a4:4f:80:5b:ef:a6:27:58:c2: 51:bd:c5:69:af:da:07:47:db:74:55:64:e2:e7:65:37: 58:fc:1d:6b:e6:7f:a0:24:16:df:fa:1e:cf:07:ff:2f: c9:93:de:23:47:44:40:be:c5:93:7a:19:29:36:ca:a0: b0:4a:3d:65:a7:e0:b6:b6:8b:3d:cd:91:c9:76:33:24: 28:23:83:2d:b6:ea:18:48:bf:63:34:44:57:83:42:d4: f3:0e:b3:f6:43:e4:df:63:9c:9e:07:31:f9:61:4d:9c: 87:81:81:2b:ba:5e:ea:13:3a:eb:7a:93:40:ad:f0:2e: e2:7c:d5:51:b0:68:17:ee:fc:ad:de:af:12:9b:e6:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 12:21:01:32:7d:b5:47:cd:78:23:84:3a:91:32:5f:15: b4:b0:3e:ef:b7:87:86:54:a6:2c:e5:06:29:d8:a3:1a: d7:48:3e:fb:59:ef:ac:a0:af:a3:e0:4b:96:99:d0:ed: 1d:45:1c:d0:33:ff:6f:32:e7:9d:1c:05:76:50:86:a1: 05:eb:7f:90:f6:16:d7:25:ac:d2:a8:ae:3e:b1:76:d5: e6:d0:ba:0d:46:43:2f:ae:6f:5a:7a:57:6a:07:a3:02: 1a:08:bd:21:13:ee:c0:1d:0f:93:db:8d:af:e1:12:88: 1b:92:4f:10:3f:a7:5a:20:d7:25:13:7c:69:28:fe:bc: e0:63:6d:4f:0a:60:0e:5b:55:76:a0:b4:cd:4b:cb:0d: 34:10:bd:3b:82:c2:5c:52:55:50:b5:c1:33:48:d4:23: 6e:15:f1:20:03:50:17:25:3a:74:c1:89:d0:92:b9:98: a1:1c:31:fb:a1:bd:48:6f:15:6e:cb:e3:db:f2:4e:7c: 01:c1:55:84:1b:a2:81:b0:78:67:da:26:8c:88:4e:55: 72:9a:c9:db:49:49:00:40:9e:54:ec:52:c7:9a:c2:f0: 6d:7a:a8:9c:6c:d4:88:c4:41:40:d0:df:2e:5a:db:cb: a9:d9:91:37:6f:f0:5f:92:20:dc:5b:1e:a7:be:d9:22 Fingerprint (SHA-256): C0:B6:AD:D3:4E:54:0C:78:9C:D8:FB:03:22:10:F8:FA:94:C7:85:51:4D:5D:4F:A4:A6:2C:1A:F9:63:C1:61:6B Fingerprint (SHA1): C6:5E:53:B6:4A:CB:66:F1:37:49:53:21:65:08:E0:F6:B2:8C:8F:4E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #8270: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172575 (0x13bd4adf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Mar 31 17:59:58 2017 Not After : Thu Mar 31 17:59:58 2067 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:ac:55:94:7b:88:71:f5:97:59:33:d1:f2:ea:d6:21: 11:0b:be:7a:d8:0a:5b:92:a2:6d:51:34:5b:46:5b:98: 1d:65:2a:1c:d8:0d:92:0a:6b:18:58:88:8b:98:8e:50: 0e:c6:ec:52:57:73:00:3b:4e:f3:bf:b8:af:29:94:1e: 8a:c5:7c:37:ee:02:d7:d9:0e:25:7d:cd:d4:5d:72:f5: b8:76:65:7f:d7:c0:a6:13:c3:14:39:2d:b7:7d:5a:61: df:5b:b1:2e:4d:d8:6c:61:1c:41:0f:78:8e:28:29:1a: a1:01:d0:9f:7a:23:b9:ea:e5:8a:6f:a9:cc:bf:f7:ac: 25:c7:ae:7c:2c:a0:77:8b:12:18:b6:e5:fe:64:3a:b0: 73:3a:91:8e:96:dd:14:3f:b8:8c:fc:2c:fe:dd:c7:d8: ec:47:dd:d5:24:cc:63:96:58:e9:59:05:62:ee:7e:64: 33:1f:7b:d2:46:bd:5d:4a:73:b0:87:99:91:07:7e:3f: 86:b9:5e:4d:9b:d1:33:ef:79:ac:d5:b9:47:4c:80:fd: a0:5a:45:94:db:a3:20:9b:23:83:9b:1b:b7:3d:68:05: 86:74:d1:cc:cc:0a:37:71:6f:4a:16:cc:6b:d6:9b:aa: dd:eb:41:29:61:aa:dd:92:ca:ad:9b:56:48:be:d6:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:fc:e8:02:8b:e8:bc:58:32:13:f9:3e:5f:c7:66:89: 61:af:05:a2:35:c9:3a:ce:ae:0a:06:f8:fb:db:28:29: 1d:c8:b6:57:68:ae:e0:5b:96:60:c9:77:e9:cc:f1:02: a5:26:c8:7e:31:a3:cf:9b:a3:7c:f4:6e:f1:cb:60:70: be:5f:7a:be:ca:df:76:05:77:99:37:fb:fd:a3:45:05: c0:7e:4b:9e:6f:69:98:8f:65:5e:3e:d5:c1:da:98:e9: 9a:a1:f1:af:13:45:df:ba:ea:5e:8f:8c:dc:d9:4d:47: fb:2f:9e:50:9a:26:e3:bc:b6:51:fb:34:f3:65:0f:89: 3c:89:f1:cd:bd:e9:4a:e9:68:43:fe:4b:57:a7:b6:77: c9:e6:d8:c1:92:2d:e3:37:55:27:8f:87:61:3f:74:51: cc:f0:6e:47:5a:4d:74:e3:44:89:bc:58:8c:da:3c:fd: a2:f0:b1:70:d4:69:ce:10:a4:98:f3:d9:54:a7:6c:df: be:33:53:e1:96:fc:e1:42:c1:df:a5:3c:8c:09:03:4a: d9:10:fe:d6:09:7c:59:9f:df:c7:13:18:77:9b:dd:97: 2e:8b:51:24:9f:9d:6e:ed:b0:3e:6e:f2:59:bf:1a:9b: 67:3d:8b:14:8f:5e:d5:5c:33:09:4f:96:a0:62:5e:a4 Fingerprint (SHA-256): BB:07:89:64:06:FE:33:41:08:56:87:4B:16:4E:F3:A1:A0:D9:55:CA:CE:80:0C:D5:63:4E:B4:AD:9D:DC:82:75 Fingerprint (SHA1): 3C:2B:03:5D:E1:48:98:80:61:57:CC:0E:93:16:F1:30:00:4A:40:5A Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #8271: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172576 (0x13bd4ae0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Mar 31 18:00:03 2017 Not After : Thu Mar 31 18:00:03 2067 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:95:40:bd:13:1a:2d:4e:f5:32:fd:13:8c:af:73:cd: 78:b1:32:79:18:05:29:3e:90:66:1a:9d:1e:95:2a:61: fc:c2:ad:46:a8:a6:1d:9f:2e:38:82:0a:1b:24:70:ba: 94:a3:47:c4:84:06:57:e3:3c:35:7e:a9:e1:4d:bc:eb: 52:06:13:30:67:b7:40:75:04:58:a5:f9:1a:c5:ca:92: 0b:5a:1d:7c:10:41:5a:29:d0:5b:a3:a8:a0:dc:02:df: 83:65:9b:ec:af:e0:9e:8b:d1:d7:f0:54:9e:3f:0a:ee: 6b:47:f5:c3:62:cc:69:7e:9b:ae:84:0c:32:28:96:f0: 0d:6f:03:ac:a6:f5:15:74:69:46:6c:af:39:41:65:49: 43:28:16:5a:37:53:17:1d:7e:7a:d7:de:96:8f:0b:6f: a6:8a:3b:ad:d5:b0:d3:b6:65:92:d3:fe:ba:78:81:e5: 32:04:aa:19:68:b1:35:e8:c7:8d:22:38:25:b1:7e:0c: 99:20:d0:d6:03:36:e3:e1:e0:b8:39:2f:88:41:c2:93: 3a:c4:93:91:10:46:a6:d4:5d:f1:01:a9:56:ec:86:20: 95:fd:a0:27:9f:0f:ec:b0:6e:81:15:a8:77:78:5a:d4: 28:d3:71:4e:b8:ea:07:64:ff:cb:c0:fe:57:6a:bf:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:61:0d:56:1d:94:4c:2a:56:81:1b:e5:a6:78:9d:61: 02:a1:b3:e7:e0:55:b0:f3:2d:5a:02:d7:bd:a8:ed:12: ec:7d:72:74:04:b8:13:14:08:56:10:0c:fc:8e:f5:73: eb:52:ea:9a:43:4e:22:3a:70:b2:89:85:f3:6b:2d:3a: b3:63:bc:7d:5a:40:49:d2:83:a1:f4:03:df:2c:ef:93: d9:3c:f2:0f:df:1a:3e:7b:87:45:fb:38:b6:83:95:37: 93:c7:12:00:80:04:36:40:49:d7:c3:71:ec:05:ae:ea: 3d:ed:16:5f:df:bc:45:62:23:9a:93:1d:92:83:cb:98: d7:de:12:7e:c9:fe:f8:47:d3:fb:99:39:9a:4c:4d:8a: 48:bc:94:50:78:db:5e:22:e5:62:c1:7d:6b:05:29:21: 82:2b:ed:e6:b9:9b:e0:3a:5e:60:7d:22:0a:b5:74:96: 1c:72:85:9b:43:39:9e:b9:91:83:14:97:02:77:fb:d8: 8f:87:06:69:f3:5a:1b:3e:76:55:cd:c5:9b:13:f6:39: d0:c5:79:85:da:80:1a:2f:06:ec:ce:1a:9c:17:8f:6d: e3:27:59:72:68:0b:28:f5:96:8d:17:ae:55:eb:d9:5e: 6c:ea:d8:73:d9:35:a7:18:03:4f:84:61:c9:4d:0d:11 Fingerprint (SHA-256): C9:0C:7C:DD:C6:75:08:EC:5C:0C:42:3C:AA:15:27:B1:CA:37:52:2A:79:0D:3E:EB:D4:56:33:07:FC:1E:3A:9F Fingerprint (SHA1): 72:23:29:85:0A:F0:1B:CC:52:AE:40:6A:CF:FE:A7:A4:71:B5:3B:E0 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #8272: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172577 (0x13bd4ae1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Mar 31 18:00:15 2017 Not After : Thu Mar 31 18:00:15 2067 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:0a:0b:c9:b8:1f:71:82:51:95:f6:8d:fb:66:d4:2a: 03:18:bf:64:10:b8:0d:28:c4:ca:2a:de:f3:33:77:e2: d0:80:02:d6:77:5a:48:0c:0d:27:75:25:83:f4:24:a1: 13:01:05:ef:40:ff:a6:7f:bf:77:d5:1d:05:f8:42:87: 1a:92:fb:51:72:5c:e2:eb:e8:48:3e:35:61:90:3c:bd: 7d:08:78:ce:51:3e:6f:fd:50:4b:15:a8:70:46:f9:3f: 96:83:db:6d:be:a8:59:a2:d7:db:69:a3:ae:bd:c9:f1: c4:8c:0c:b4:31:dd:e2:b0:e5:b3:ea:32:c4:2e:fd:6b: 68:7c:02:aa:ba:b2:f3:ab:f3:ec:85:f1:da:c0:ef:31: 71:7b:93:38:c8:89:49:b6:78:34:fd:33:0b:25:d4:a1: 00:3f:c5:e4:40:b1:12:a4:85:65:71:8d:31:13:e0:42: 2c:df:e8:0b:c9:36:e1:de:93:b1:4b:ea:71:c8:52:82: 0d:4d:88:af:44:58:14:1f:9c:43:86:c6:c7:22:37:b1: 08:86:b5:80:64:ba:f7:07:93:39:c0:76:18:e2:4a:13: 0d:b8:11:42:b8:44:e5:b3:f4:af:6a:71:a4:a2:73:ea: 66:39:be:b9:c3:1a:3c:6c:b6:60:3c:66:47:43:a1:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:44:4e:49:d5:e8:9b:cf:cf:7b:a7:03:f1:f8:fd:d8: d3:3e:cc:05:98:79:3c:17:92:4c:b0:1b:bd:3b:ac:bd: 8f:fa:bb:cf:2c:c7:d0:89:a1:4e:27:7c:05:7a:d9:72: 82:e8:47:14:eb:5f:ae:63:55:52:c8:b9:a0:6c:b6:e6: a4:e8:9a:93:14:64:fe:1b:84:32:48:72:d2:64:79:fc: 0c:39:1b:33:21:b7:64:7b:f8:df:c4:b5:f6:97:d2:cb: ce:b2:ac:73:2e:ca:61:c6:45:68:c3:40:93:2f:c4:c2: d8:c3:a5:fd:80:c7:1e:1f:5c:9a:b7:a8:1a:53:63:87: c7:71:56:f9:f7:88:f4:5e:b4:db:92:5f:6d:2b:04:93: e4:86:71:af:5e:d6:59:70:2f:e9:e9:c2:18:e8:9d:7c: f3:c2:df:2d:9d:af:1f:3f:b1:8d:cd:f1:a7:a7:67:4d: c2:e4:9f:d5:cc:63:bb:ae:80:10:5f:89:d8:45:a0:04: 97:4e:28:87:d9:63:4e:94:6b:cc:54:24:38:ff:d6:06: 07:ec:47:84:45:2a:a3:89:25:31:ce:78:48:bd:a7:bb: b6:39:da:f2:50:65:3c:6f:46:07:63:82:b2:06:75:d0: 4c:8d:11:60:7c:c2:ab:6f:ba:d8:ba:f0:86:60:c8:6b Fingerprint (SHA-256): D1:40:53:9C:10:6B:5C:40:F6:2B:AB:B9:4A:4C:EA:EB:6F:B3:59:BB:1A:48:7F:EB:B0:06:F6:D6:5D:4F:4E:11 Fingerprint (SHA1): 78:6D:7E:33:42:F9:60:9E:72:59:15:77:7C:A1:8D:63:3F:D4:E1:5F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #8273: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172578 (0x13bd4ae2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Mar 31 18:00:29 2017 Not After : Thu Mar 31 18:00:29 2067 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:92:8a:eb:37:f6:3c:f3:00:b1:4b:b4:34:55:7d:36: 3b:db:5b:50:02:3b:85:34:e1:33:d1:ac:4b:92:1c:8b: 47:b1:ab:1e:84:26:60:17:9b:a3:85:d7:56:f2:3f:a2: 61:4c:bf:b5:52:46:82:93:af:1c:8f:66:08:bf:f0:6d: 78:76:77:48:e3:d9:cd:3c:51:e8:09:ea:5d:9c:b3:50: 92:8b:c2:cc:30:68:4a:19:41:12:6a:88:6a:f2:56:95: 02:2d:a9:1f:ce:3b:88:72:2d:78:9b:4c:cb:d3:a9:63: d0:87:d0:09:bb:33:bb:04:3e:f8:c9:7a:24:51:0a:bb: 1b:7e:81:33:fc:6a:57:81:69:c7:69:bd:08:d0:dd:f6: f6:2a:dc:de:bd:6b:be:7a:e1:33:09:93:31:7d:62:24: 97:f8:04:b7:09:5c:a2:c0:fd:41:87:a1:67:dc:35:c4: e5:2e:97:e4:54:a3:52:d9:e9:86:13:76:c4:84:b8:fa: e0:2f:7e:b8:57:fb:43:4e:0e:ea:26:64:83:c4:e1:5c: 2e:3b:80:4a:80:32:3d:bd:35:e7:ae:cc:fa:5c:4c:72: f1:c5:36:92:21:f6:f0:76:d0:23:88:64:10:86:76:3c: 49:93:dc:3f:a0:aa:0b:e6:ea:b4:73:83:e1:da:da:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:6c:c4:f9:13:1c:5e:1e:78:52:67:19:9e:5a:d9:86: e0:87:fa:32:d3:7b:e3:2c:fe:2d:60:64:c0:24:db:99: bc:2e:92:83:6b:4d:2b:83:49:23:75:ad:15:59:8b:de: 7d:c6:67:2c:1b:95:9d:33:a4:a1:b8:14:ac:73:cb:d0: 64:8f:63:51:82:37:de:2a:2b:ca:7f:33:55:63:57:4d: 8a:32:fa:95:a5:30:5d:18:f9:4c:df:20:8c:53:2a:32: e4:6f:3b:41:f4:b2:5b:ba:b8:f3:d6:26:6f:1d:5a:fd: 04:a3:bf:a5:93:5a:9a:ed:0c:ca:00:39:dd:2c:aa:dc: e8:fc:61:0d:8a:49:eb:2c:98:f6:8d:e4:55:5b:93:d8: 2b:5f:0f:de:e0:8e:4b:d9:b9:57:cc:7b:2c:ff:57:91: 09:54:4e:bc:48:81:5c:b2:75:c9:0a:bf:ab:08:36:77: 53:d0:7e:56:d4:33:07:b9:f5:e7:cf:e2:55:b1:10:e4: 97:8c:a1:e0:b6:a4:80:f0:06:ff:e6:e1:a6:7a:06:38: 55:33:6e:81:ea:ef:ce:ab:b3:8e:0f:ec:fd:18:11:54: 41:4e:4b:87:a3:b4:92:73:bf:1d:14:f3:50:40:da:b2: e7:52:9b:31:7e:79:a0:e2:63:de:11:1f:b8:0b:be:d9 Fingerprint (SHA-256): D5:63:B1:FA:6F:30:43:3A:A6:36:72:D2:4B:48:F3:4B:2D:1C:07:0E:B0:28:63:AD:FE:18:93:5C:18:2C:32:E5 Fingerprint (SHA1): 30:08:23:C6:4E:F7:BB:E5:05:15:07:2F:AF:30:D8:38:08:47:2D:48 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #8274: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172579 (0x13bd4ae3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Mar 31 18:00:32 2017 Not After : Thu Mar 31 18:00:32 2067 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:0c:cc:cc:20:11:ca:cb:f9:9d:86:3b:04:e1:13:e9: d2:74:f3:f5:63:34:10:64:20:46:15:f7:a5:11:6b:d6: 5d:6c:4f:ef:25:a7:39:7d:2e:40:12:36:3d:e3:61:17: 92:ed:e2:88:b3:39:86:c9:02:01:fb:a9:3d:8a:2a:a4: ca:66:2c:fa:0d:a6:56:9b:c1:9b:35:b9:f7:e1:af:e5: dd:fb:9a:47:9c:27:4b:7a:27:95:34:e9:5f:0f:74:83: 73:42:15:02:1b:8c:d2:6a:a1:47:7b:7e:ee:0f:09:3d: f0:5b:56:0b:af:c4:78:dc:a3:d6:25:47:83:67:1e:53: 20:41:88:b7:c0:a6:88:41:7a:0e:8b:ca:42:84:bd:7b: 46:69:a0:d5:3d:7a:34:c8:f1:83:36:e8:93:af:e2:60: 97:85:98:4f:84:65:41:e4:db:01:5f:9c:63:3e:c2:96: aa:bb:8f:64:f1:80:cf:f6:4a:93:e1:c2:5c:8c:95:a3: d2:c3:a0:4c:c9:de:d9:95:27:b2:84:d0:53:ac:b3:32: 96:7b:bf:d3:a7:8f:9d:0d:95:d5:80:57:42:c8:96:be: c5:9c:9b:33:7f:8e:62:ed:84:ca:2f:42:7d:b6:45:9f: 8e:52:de:cd:f3:a8:77:34:e5:59:5d:41:60:67:2a:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c0:0a:05:3b:a0:d3:76:79:7a:af:dd:4a:88:39:5d:32: 94:d1:b9:58:d2:a0:3e:8f:84:4d:b5:7c:fc:03:f9:e8: 2b:97:57:38:63:56:4e:72:d6:e9:2c:2c:69:19:af:b7: 42:4b:98:18:bf:47:1a:5f:b9:12:78:55:7d:d1:ec:55: 13:3c:90:f4:9f:61:e7:67:df:5c:69:a6:3a:c8:8f:23: 5f:c0:1b:14:a6:fe:79:28:d8:2a:84:e4:06:6f:9c:f2: 24:59:95:6e:49:5e:5e:a7:4c:47:d2:72:4d:3a:03:f6: 6b:ed:24:4a:d0:24:c0:11:ae:e8:87:e1:77:af:20:f0: f1:5a:51:e4:13:91:81:d0:19:66:d3:95:1d:66:69:03: 3a:e2:db:05:6b:89:ce:06:9c:0e:a9:89:dc:82:ee:79: 77:08:73:c4:ae:88:a9:4d:02:dc:27:67:53:3d:75:ca: ce:b7:cf:83:0f:55:42:29:ee:46:3e:9b:42:20:d4:f3: b4:c4:d7:2c:67:f8:90:49:0b:c7:66:4c:a5:20:2a:e6: db:43:9b:86:55:b4:f4:5a:e2:d3:fc:d4:4a:56:c0:e3: 6d:df:3a:cf:ae:2e:eb:1a:bf:ce:d3:58:84:1f:2e:9e: 1d:18:45:09:fb:ba:4b:21:86:ae:c7:62:36:52:29:6c Fingerprint (SHA-256): 23:27:13:0E:74:CA:D0:67:20:EA:AC:E1:47:CB:3C:E1:D1:08:29:B8:44:35:D1:5A:E8:DC:91:07:D5:AF:BB:2E Fingerprint (SHA1): 58:66:B4:CE:1A:12:7F:F9:0D:27:AF:FC:78:B3:AE:59:41:A1:D8:E9 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #8275: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8276: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172594 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8277: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8278: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8279: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8280: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331172595 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8281: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8282: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8283: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8284: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331172596 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8285: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8286: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #8287: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8288: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 331172597 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8289: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8290: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8291: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172594 (0x13bd4af2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:02:32 2017 Not After : Thu Mar 31 18:02:32 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:68:66:89:a4:2c:36:34:bc:40:0d:a6:8e:65:98:18: b9:82:9a:1a:2e:a5:50:99:19:0f:96:db:23:59:ee:b8: f5:b0:76:c8:83:d3:6f:80:d3:d1:b4:8e:28:c3:44:16: 4c:4a:f1:51:fe:37:9c:5f:a2:ac:b6:83:f5:08:1e:09: a5:7b:c7:34:1e:28:14:07:7c:d1:5c:e1:45:bc:ae:51: 49:29:8c:a3:5d:e3:d6:da:69:94:91:3b:e9:df:97:aa: 12:05:14:a4:44:48:c7:2d:79:5e:47:52:15:64:ed:dd: 33:20:ac:a8:c8:b8:f8:4f:02:4f:1b:90:57:39:e0:99: 33:60:c2:e1:34:b8:3b:45:7d:e1:d9:e0:64:21:f9:31: bf:13:7e:9a:de:54:5f:0d:04:3f:40:39:e7:78:12:1c: 98:78:5a:e2:86:1e:8a:46:73:ff:02:f6:25:af:29:1a: 65:2d:48:30:db:04:03:c1:11:1a:3b:f0:e6:60:23:54: d3:44:16:f3:7b:eb:e4:10:e3:c8:47:4f:74:ed:ec:08: f1:80:a3:1f:67:75:63:5c:0b:7e:23:ac:be:2b:02:fb: e7:f4:ea:ba:2b:7e:a0:09:bb:6e:64:ea:a8:d6:91:e1: 5c:31:63:76:5c:85:fd:b0:7e:3d:47:d1:dd:a4:ed:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:18:26:69:26:78:35:91:f2:48:9a:e7:5a:91:d2:18: 44:27:a8:07:11:1a:0c:4d:70:b3:53:84:11:bc:33:c4: 2c:5d:d5:13:a5:a2:9c:40:a0:70:70:c1:16:49:65:8a: fb:4f:e7:9a:ba:fa:17:5e:64:0f:b7:db:ba:27:97:02: f5:6e:7d:c7:c7:fc:c9:92:ba:5c:af:aa:59:f0:0d:57: 9a:c3:88:ea:bd:5b:f6:01:01:d9:66:f8:e0:3a:c8:a8: 19:51:bf:08:8e:d7:e5:b6:0a:ac:65:5e:61:31:f0:20: 15:a6:01:12:e1:e6:b5:95:b1:ec:c2:ea:d4:5b:e0:3d: 67:04:ac:ea:98:a3:05:ae:c1:51:4e:c5:cd:82:92:29: bd:8e:32:31:24:c2:58:60:ff:73:3a:5b:7b:94:ee:1f: c8:51:33:1a:07:c4:bf:65:13:40:3c:52:af:2a:ba:74: ce:f5:28:25:64:4a:14:49:ef:76:90:18:ab:a8:81:2b: ee:ca:ae:6a:8b:6b:9b:90:d6:3c:74:42:19:a6:c2:dc: 78:be:c2:75:41:00:94:65:23:06:ac:b6:10:da:43:c3: 8b:e8:92:03:6f:8f:30:c8:4e:0e:1a:f2:58:eb:64:09: 19:3b:d6:d6:34:29:7d:d0:26:1d:41:4c:ed:2f:64:ee Fingerprint (SHA-256): 03:F8:E0:91:0E:10:34:59:C2:01:BD:A6:52:0C:74:67:DB:09:CB:4C:0E:9E:B8:3E:30:E6:FB:61:AB:E9:71:FB Fingerprint (SHA1): 9D:32:60:5A:B8:A6:8A:B5:85:D0:FF:E2:6F:0D:37:0D:BD:1C:A0:44 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8292: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8293: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172595 (0x13bd4af3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:02:40 2017 Not After : Thu Mar 31 18:02:40 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:8b:86:44:8c:3b:ee:df:34:a7:fd:f7:14:a5:ee:04: d8:3c:f1:6d:57:40:4c:e5:63:22:22:78:4a:bd:7c:a2: 51:00:20:b0:42:1c:31:b0:b9:4b:f8:1f:05:82:30:7b: b8:56:4a:69:16:30:dd:17:4b:a2:4b:67:67:41:1d:ba: d7:2f:5c:56:97:70:7c:3d:65:14:30:0c:8d:d9:c2:89: ac:2a:ec:cb:34:a8:89:4a:3a:08:bc:45:0e:59:ee:e9: 18:9b:97:3d:0f:21:a5:26:d3:3c:6e:06:76:7d:c4:95: c5:b2:82:88:07:6b:a2:b3:b1:d6:4e:81:dd:59:ff:dd: 18:1a:5a:46:7f:df:66:76:18:7b:80:f9:66:2d:86:fa: 89:be:8b:d4:9f:0a:72:6e:14:e1:5e:d8:7f:fe:c6:35: 5d:f7:a2:57:fd:33:70:01:6f:06:9e:f0:30:8b:19:b9: b6:95:c7:d0:d5:66:35:6d:5e:f3:93:ab:a9:cd:de:3b: ba:ec:91:73:62:d0:56:d6:cb:b1:15:61:48:72:95:b7: 7c:ab:6c:b6:46:95:00:d7:b4:f6:6b:4f:d9:b6:b4:80: 87:6e:86:b6:a9:02:62:80:24:66:d7:b8:93:bc:bf:f2: ae:1c:cc:0e:13:49:db:a7:11:a3:ce:68:5e:40:dc:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:18:bb:f4:ed:0f:90:e7:ea:91:6a:49:95:3b:40:57: 23:18:46:b4:75:1d:f5:f4:10:94:75:f9:39:9b:1f:59: d1:8c:40:95:4d:bf:c0:ca:dd:a8:38:b3:59:f1:1e:a5: 6f:37:91:76:f3:e0:0a:e0:ae:2a:2d:fe:19:8b:a9:05: a8:e8:08:ce:5f:61:e9:8e:0c:a4:f2:b3:47:ae:73:9a: 85:3c:39:2e:61:5b:de:1f:55:1f:6c:ed:14:3f:27:b4: ea:af:df:f3:c8:be:31:a4:25:05:15:4f:6c:48:ba:98: 42:c0:4f:3d:8f:90:cf:86:df:a5:29:f7:42:21:ab:08: 5b:a9:62:9e:9d:cd:54:4f:c8:9d:be:ff:d6:ac:bb:52: 78:2b:80:bc:d6:6a:b8:19:8e:aa:f6:db:5e:62:07:ad: f3:38:4a:65:be:8f:e0:42:e7:ab:81:25:7d:39:11:2c: ee:5f:f9:63:99:e8:78:0c:ae:d3:10:8d:f0:d4:5e:76: dd:c2:41:6a:9b:de:f8:50:2f:47:c9:1f:82:7e:f3:d3: fc:13:e0:84:c4:5d:22:6b:58:77:ae:79:d6:09:18:f4: 50:1a:a7:49:3a:5a:1e:5d:e5:c0:20:1a:fd:fa:b1:3e: b2:14:12:9c:44:f2:0b:f8:ee:69:1d:6c:0c:64:70:63 Fingerprint (SHA-256): 60:42:62:C5:7B:5E:62:A9:F5:D4:BB:EB:84:F2:84:4A:E9:BF:AE:C7:B3:94:D5:76:2C:96:8B:8C:E5:EB:D7:77 Fingerprint (SHA1): C1:D8:9A:28:23:1E:A5:BB:7E:E2:3F:BF:4F:AB:00:EA:12:46:B0:FC Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8294: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8295: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172596 (0x13bd4af4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 18:02:50 2017 Not After : Thu Mar 31 18:02:50 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:65:1e:ce:94:85:99:a3:4b:61:b4:32:e8:ac:ac:aa: e0:71:fa:2c:55:4b:62:e4:f3:26:5f:44:26:cb:a8:15: f8:3a:3f:e3:dc:9c:67:10:88:b1:e9:9c:59:40:6e:ce: c0:64:46:11:aa:80:a7:93:41:d8:dc:3f:ce:41:47:59: 4c:c6:50:80:1d:f7:3f:7d:7f:9e:ef:62:07:78:1d:31: 0e:eb:55:56:53:c4:61:af:a7:2e:7e:83:63:a4:13:16: 78:c1:1d:41:ab:32:51:0b:9d:bc:3c:f9:ba:08:c2:84: 1b:f0:2c:78:66:0d:dd:8e:f9:cf:ac:6b:72:bc:be:bd: 51:11:b6:40:45:6f:45:62:66:cc:54:f2:4a:b4:14:de: 5b:47:77:6e:89:ea:b7:52:d7:b5:dd:e2:17:6b:14:c5: a3:21:19:1c:25:d2:af:8f:00:54:e8:d6:62:3c:78:f9: 09:40:ae:03:bf:87:c3:47:44:55:32:a9:31:0b:0f:47: f2:78:95:2d:76:f2:0d:1c:b6:7f:1c:76:b3:b6:cd:bf: fb:af:6a:95:ed:0c:16:1c:bb:a4:d7:01:f7:f9:33:0e: ef:c1:ca:0e:5f:5f:87:f0:ed:3e:ec:c8:ef:b5:e3:ea: 04:bc:87:5a:c2:e2:3d:22:ff:5d:ab:70:c6:3c:bc:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: de:22:d5:9d:19:2d:33:b5:0d:f2:4a:ed:17:c5:31:5f: 99:24:69:c3:6f:e3:35:da:62:01:d4:eb:66:06:e8:d3: af:5d:69:94:9d:43:88:bc:94:63:5c:be:57:3c:f9:7b: ea:29:e3:3c:59:58:a5:15:6b:9e:1e:96:7d:bc:8b:21: 26:03:ae:a3:8f:6c:1e:e7:15:65:73:5a:2f:61:80:0a: df:e8:0a:85:f5:4c:30:99:10:0e:a4:15:26:31:84:bd: c1:36:57:1a:01:d9:7a:bb:c3:01:88:fa:47:29:7d:80: a9:ab:92:66:76:f9:31:14:45:d8:29:fc:d2:0c:54:b6: 57:f2:8b:f1:cb:8c:28:18:8d:8d:6e:3f:5a:dd:bd:b9: 16:e6:c7:ac:02:0c:28:14:6d:86:ce:71:e4:16:f3:c2: 65:c7:f7:2d:fd:3e:53:7c:d3:7e:04:f4:97:44:12:4f: 4b:a7:7b:c1:f0:19:b7:74:74:d4:92:4f:18:4c:fa:e0: 15:91:9f:e1:b0:99:3e:7f:03:f0:7f:72:a3:c6:fe:48: 20:bf:75:2b:5d:b8:c7:ac:31:56:2d:f9:5d:a1:05:c0: c7:be:62:9c:5c:b7:11:c7:4a:d3:ce:80:a7:54:c8:47: 58:d4:77:4b:7c:0e:f9:ea:0e:dd:c6:ef:d3:ae:8e:2e Fingerprint (SHA-256): 0F:84:DA:8D:6C:7B:DA:B3:80:D0:FC:8F:BA:9E:67:7B:1C:48:B8:4E:C7:7B:72:BA:38:A2:C0:4A:D4:79:CB:A2 Fingerprint (SHA1): 6D:35:01:FF:CB:5D:8E:C7:CE:FD:4B:55:3A:C9:78:02:5F:A3:00:44 Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #8296: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8297: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #8298: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #8299: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #8300: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172594 (0x13bd4af2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:02:32 2017 Not After : Thu Mar 31 18:02:32 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:68:66:89:a4:2c:36:34:bc:40:0d:a6:8e:65:98:18: b9:82:9a:1a:2e:a5:50:99:19:0f:96:db:23:59:ee:b8: f5:b0:76:c8:83:d3:6f:80:d3:d1:b4:8e:28:c3:44:16: 4c:4a:f1:51:fe:37:9c:5f:a2:ac:b6:83:f5:08:1e:09: a5:7b:c7:34:1e:28:14:07:7c:d1:5c:e1:45:bc:ae:51: 49:29:8c:a3:5d:e3:d6:da:69:94:91:3b:e9:df:97:aa: 12:05:14:a4:44:48:c7:2d:79:5e:47:52:15:64:ed:dd: 33:20:ac:a8:c8:b8:f8:4f:02:4f:1b:90:57:39:e0:99: 33:60:c2:e1:34:b8:3b:45:7d:e1:d9:e0:64:21:f9:31: bf:13:7e:9a:de:54:5f:0d:04:3f:40:39:e7:78:12:1c: 98:78:5a:e2:86:1e:8a:46:73:ff:02:f6:25:af:29:1a: 65:2d:48:30:db:04:03:c1:11:1a:3b:f0:e6:60:23:54: d3:44:16:f3:7b:eb:e4:10:e3:c8:47:4f:74:ed:ec:08: f1:80:a3:1f:67:75:63:5c:0b:7e:23:ac:be:2b:02:fb: e7:f4:ea:ba:2b:7e:a0:09:bb:6e:64:ea:a8:d6:91:e1: 5c:31:63:76:5c:85:fd:b0:7e:3d:47:d1:dd:a4:ed:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:18:26:69:26:78:35:91:f2:48:9a:e7:5a:91:d2:18: 44:27:a8:07:11:1a:0c:4d:70:b3:53:84:11:bc:33:c4: 2c:5d:d5:13:a5:a2:9c:40:a0:70:70:c1:16:49:65:8a: fb:4f:e7:9a:ba:fa:17:5e:64:0f:b7:db:ba:27:97:02: f5:6e:7d:c7:c7:fc:c9:92:ba:5c:af:aa:59:f0:0d:57: 9a:c3:88:ea:bd:5b:f6:01:01:d9:66:f8:e0:3a:c8:a8: 19:51:bf:08:8e:d7:e5:b6:0a:ac:65:5e:61:31:f0:20: 15:a6:01:12:e1:e6:b5:95:b1:ec:c2:ea:d4:5b:e0:3d: 67:04:ac:ea:98:a3:05:ae:c1:51:4e:c5:cd:82:92:29: bd:8e:32:31:24:c2:58:60:ff:73:3a:5b:7b:94:ee:1f: c8:51:33:1a:07:c4:bf:65:13:40:3c:52:af:2a:ba:74: ce:f5:28:25:64:4a:14:49:ef:76:90:18:ab:a8:81:2b: ee:ca:ae:6a:8b:6b:9b:90:d6:3c:74:42:19:a6:c2:dc: 78:be:c2:75:41:00:94:65:23:06:ac:b6:10:da:43:c3: 8b:e8:92:03:6f:8f:30:c8:4e:0e:1a:f2:58:eb:64:09: 19:3b:d6:d6:34:29:7d:d0:26:1d:41:4c:ed:2f:64:ee Fingerprint (SHA-256): 03:F8:E0:91:0E:10:34:59:C2:01:BD:A6:52:0C:74:67:DB:09:CB:4C:0E:9E:B8:3E:30:E6:FB:61:AB:E9:71:FB Fingerprint (SHA1): 9D:32:60:5A:B8:A6:8A:B5:85:D0:FF:E2:6F:0D:37:0D:BD:1C:A0:44 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8301: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8302: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172595 (0x13bd4af3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:02:40 2017 Not After : Thu Mar 31 18:02:40 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:8b:86:44:8c:3b:ee:df:34:a7:fd:f7:14:a5:ee:04: d8:3c:f1:6d:57:40:4c:e5:63:22:22:78:4a:bd:7c:a2: 51:00:20:b0:42:1c:31:b0:b9:4b:f8:1f:05:82:30:7b: b8:56:4a:69:16:30:dd:17:4b:a2:4b:67:67:41:1d:ba: d7:2f:5c:56:97:70:7c:3d:65:14:30:0c:8d:d9:c2:89: ac:2a:ec:cb:34:a8:89:4a:3a:08:bc:45:0e:59:ee:e9: 18:9b:97:3d:0f:21:a5:26:d3:3c:6e:06:76:7d:c4:95: c5:b2:82:88:07:6b:a2:b3:b1:d6:4e:81:dd:59:ff:dd: 18:1a:5a:46:7f:df:66:76:18:7b:80:f9:66:2d:86:fa: 89:be:8b:d4:9f:0a:72:6e:14:e1:5e:d8:7f:fe:c6:35: 5d:f7:a2:57:fd:33:70:01:6f:06:9e:f0:30:8b:19:b9: b6:95:c7:d0:d5:66:35:6d:5e:f3:93:ab:a9:cd:de:3b: ba:ec:91:73:62:d0:56:d6:cb:b1:15:61:48:72:95:b7: 7c:ab:6c:b6:46:95:00:d7:b4:f6:6b:4f:d9:b6:b4:80: 87:6e:86:b6:a9:02:62:80:24:66:d7:b8:93:bc:bf:f2: ae:1c:cc:0e:13:49:db:a7:11:a3:ce:68:5e:40:dc:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:18:bb:f4:ed:0f:90:e7:ea:91:6a:49:95:3b:40:57: 23:18:46:b4:75:1d:f5:f4:10:94:75:f9:39:9b:1f:59: d1:8c:40:95:4d:bf:c0:ca:dd:a8:38:b3:59:f1:1e:a5: 6f:37:91:76:f3:e0:0a:e0:ae:2a:2d:fe:19:8b:a9:05: a8:e8:08:ce:5f:61:e9:8e:0c:a4:f2:b3:47:ae:73:9a: 85:3c:39:2e:61:5b:de:1f:55:1f:6c:ed:14:3f:27:b4: ea:af:df:f3:c8:be:31:a4:25:05:15:4f:6c:48:ba:98: 42:c0:4f:3d:8f:90:cf:86:df:a5:29:f7:42:21:ab:08: 5b:a9:62:9e:9d:cd:54:4f:c8:9d:be:ff:d6:ac:bb:52: 78:2b:80:bc:d6:6a:b8:19:8e:aa:f6:db:5e:62:07:ad: f3:38:4a:65:be:8f:e0:42:e7:ab:81:25:7d:39:11:2c: ee:5f:f9:63:99:e8:78:0c:ae:d3:10:8d:f0:d4:5e:76: dd:c2:41:6a:9b:de:f8:50:2f:47:c9:1f:82:7e:f3:d3: fc:13:e0:84:c4:5d:22:6b:58:77:ae:79:d6:09:18:f4: 50:1a:a7:49:3a:5a:1e:5d:e5:c0:20:1a:fd:fa:b1:3e: b2:14:12:9c:44:f2:0b:f8:ee:69:1d:6c:0c:64:70:63 Fingerprint (SHA-256): 60:42:62:C5:7B:5E:62:A9:F5:D4:BB:EB:84:F2:84:4A:E9:BF:AE:C7:B3:94:D5:76:2C:96:8B:8C:E5:EB:D7:77 Fingerprint (SHA1): C1:D8:9A:28:23:1E:A5:BB:7E:E2:3F:BF:4F:AB:00:EA:12:46:B0:FC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8303: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8304: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172596 (0x13bd4af4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 18:02:50 2017 Not After : Thu Mar 31 18:02:50 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:65:1e:ce:94:85:99:a3:4b:61:b4:32:e8:ac:ac:aa: e0:71:fa:2c:55:4b:62:e4:f3:26:5f:44:26:cb:a8:15: f8:3a:3f:e3:dc:9c:67:10:88:b1:e9:9c:59:40:6e:ce: c0:64:46:11:aa:80:a7:93:41:d8:dc:3f:ce:41:47:59: 4c:c6:50:80:1d:f7:3f:7d:7f:9e:ef:62:07:78:1d:31: 0e:eb:55:56:53:c4:61:af:a7:2e:7e:83:63:a4:13:16: 78:c1:1d:41:ab:32:51:0b:9d:bc:3c:f9:ba:08:c2:84: 1b:f0:2c:78:66:0d:dd:8e:f9:cf:ac:6b:72:bc:be:bd: 51:11:b6:40:45:6f:45:62:66:cc:54:f2:4a:b4:14:de: 5b:47:77:6e:89:ea:b7:52:d7:b5:dd:e2:17:6b:14:c5: a3:21:19:1c:25:d2:af:8f:00:54:e8:d6:62:3c:78:f9: 09:40:ae:03:bf:87:c3:47:44:55:32:a9:31:0b:0f:47: f2:78:95:2d:76:f2:0d:1c:b6:7f:1c:76:b3:b6:cd:bf: fb:af:6a:95:ed:0c:16:1c:bb:a4:d7:01:f7:f9:33:0e: ef:c1:ca:0e:5f:5f:87:f0:ed:3e:ec:c8:ef:b5:e3:ea: 04:bc:87:5a:c2:e2:3d:22:ff:5d:ab:70:c6:3c:bc:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: de:22:d5:9d:19:2d:33:b5:0d:f2:4a:ed:17:c5:31:5f: 99:24:69:c3:6f:e3:35:da:62:01:d4:eb:66:06:e8:d3: af:5d:69:94:9d:43:88:bc:94:63:5c:be:57:3c:f9:7b: ea:29:e3:3c:59:58:a5:15:6b:9e:1e:96:7d:bc:8b:21: 26:03:ae:a3:8f:6c:1e:e7:15:65:73:5a:2f:61:80:0a: df:e8:0a:85:f5:4c:30:99:10:0e:a4:15:26:31:84:bd: c1:36:57:1a:01:d9:7a:bb:c3:01:88:fa:47:29:7d:80: a9:ab:92:66:76:f9:31:14:45:d8:29:fc:d2:0c:54:b6: 57:f2:8b:f1:cb:8c:28:18:8d:8d:6e:3f:5a:dd:bd:b9: 16:e6:c7:ac:02:0c:28:14:6d:86:ce:71:e4:16:f3:c2: 65:c7:f7:2d:fd:3e:53:7c:d3:7e:04:f4:97:44:12:4f: 4b:a7:7b:c1:f0:19:b7:74:74:d4:92:4f:18:4c:fa:e0: 15:91:9f:e1:b0:99:3e:7f:03:f0:7f:72:a3:c6:fe:48: 20:bf:75:2b:5d:b8:c7:ac:31:56:2d:f9:5d:a1:05:c0: c7:be:62:9c:5c:b7:11:c7:4a:d3:ce:80:a7:54:c8:47: 58:d4:77:4b:7c:0e:f9:ea:0e:dd:c6:ef:d3:ae:8e:2e Fingerprint (SHA-256): 0F:84:DA:8D:6C:7B:DA:B3:80:D0:FC:8F:BA:9E:67:7B:1C:48:B8:4E:C7:7B:72:BA:38:A2:C0:4A:D4:79:CB:A2 Fingerprint (SHA1): 6D:35:01:FF:CB:5D:8E:C7:CE:FD:4B:55:3A:C9:78:02:5F:A3:00:44 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #8305: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8306: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8307: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172598 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8308: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8309: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8310: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8311: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331172599 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8312: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8313: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8314: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8315: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331172600 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8316: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8317: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #8318: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8319: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 331172601 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8320: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8321: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #8322: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8323: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 331172602 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8324: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8325: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8326: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172598 (0x13bd4af6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:03:24 2017 Not After : Thu Mar 31 18:03:24 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:95:69:e7:87:f7:ed:d3:f3:c2:08:bb:d0:8d:78:01: 69:4d:d8:9e:5c:b1:7e:06:b2:e5:e1:87:2a:42:b0:cf: 0c:bd:6c:d3:7a:d5:ca:46:88:de:30:9f:e0:38:f2:69: ff:01:b2:bd:34:f9:bd:8c:27:b8:37:c2:e4:e4:67:15: a1:e3:5b:f6:ec:0e:1e:b5:38:e0:ba:7b:95:55:39:15: e7:52:68:80:06:85:12:5a:57:ea:64:2a:76:b9:35:ca: d8:cd:b9:c9:20:d1:33:29:59:bd:27:b0:0a:75:d3:4d: b4:eb:d5:30:05:5e:8c:2c:f8:da:c7:76:f0:9d:2b:86: 0f:8d:a2:9b:3f:3c:eb:bc:f3:4b:1f:58:9b:e2:e0:63: cd:d1:db:92:f0:6e:c8:98:39:23:21:23:c5:4e:d6:38: 35:fe:1e:9e:9f:59:b0:0d:0d:ae:c2:b1:b9:61:02:27: fb:63:95:76:9c:9f:b8:c4:cc:b9:da:a4:07:d0:36:0a: 7e:87:1e:ec:96:85:f9:bd:48:4e:b4:31:b3:d8:85:f2: 47:36:4c:08:6e:9e:38:01:26:3d:99:cf:c1:f2:27:18: 89:f2:5c:af:56:be:7d:d5:ec:9a:5e:b5:ef:14:c0:cf: 62:6a:e5:58:67:2a:fb:e0:81:2e:c2:47:14:3c:d4:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:98:fc:3b:0a:04:79:07:5c:ab:a0:1f:0f:15:75:79: 5a:3f:fd:b3:ff:57:7e:1c:f6:5d:71:75:d1:61:95:3b: 06:84:19:ea:a3:d2:b8:c4:4c:fc:eb:86:2a:c4:b6:1b: 7a:b1:5e:fd:12:8e:ee:9e:e3:ab:8b:7e:6a:24:af:0f: 33:22:4e:8a:24:60:ed:b9:25:15:01:13:2d:d8:86:de: d0:a6:85:27:da:7a:c7:ab:ad:de:32:05:83:8d:22:1b: 39:4d:08:c1:0a:57:ce:84:cb:0b:51:1f:ef:d0:55:07: 46:44:26:1f:4e:52:f7:40:e2:55:9b:48:18:4b:3e:29: a6:4d:f4:ef:f6:43:2c:dc:f7:4a:2b:eb:54:02:8b:18: 80:de:89:a0:9b:3c:7c:c4:25:a5:b1:5e:15:4b:37:b8: 7a:90:91:01:67:8a:ec:94:35:a1:5d:ca:48:17:25:f3: ef:0c:14:d0:44:b5:af:6d:83:9d:ac:f7:73:14:90:86: 4f:92:25:d7:9b:ab:bc:e5:88:1a:4f:24:14:63:70:13: e3:24:c8:e0:0e:9e:67:4c:85:b7:f8:3a:52:0d:88:28: d2:07:79:f1:3e:81:00:c6:f3:44:99:36:8b:b9:46:84: 9b:d1:1d:b0:33:36:2a:50:f1:1f:c1:ef:2a:34:b2:d3 Fingerprint (SHA-256): 0F:55:80:98:EA:DD:13:8B:22:DF:66:7D:C2:F7:FB:28:85:19:07:87:25:F6:25:B9:E1:61:A7:80:10:0F:61:82 Fingerprint (SHA1): 2C:61:E4:BE:2F:3F:45:39:2B:FC:9F:69:9C:AC:BF:5A:E4:0C:57:12 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8327: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8328: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172599 (0x13bd4af7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:03:29 2017 Not After : Thu Mar 31 18:03:29 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:5d:58:ac:8f:46:11:e9:c8:24:c3:98:59:6a:26:b8: 3a:3f:77:ce:21:ce:de:5f:ef:a5:d1:9d:a9:f8:30:52: 85:ae:d0:9e:41:b9:11:fb:e0:7c:53:6c:20:2e:ea:07: 8a:07:bf:30:81:08:b7:7c:64:ca:55:7f:a9:94:84:c9: a9:91:19:ea:b2:91:5a:19:36:4d:9b:a2:ba:1f:e8:cb: 1a:c8:c9:68:1a:07:ff:f4:e4:c5:84:f8:20:63:8d:bf: e4:e9:c4:61:1e:86:0f:c1:7b:4f:45:f7:2a:3d:45:1e: 07:df:62:9f:0c:3c:df:bd:58:8d:e8:f0:52:a0:1f:43: 94:68:a4:05:6d:a2:43:ee:fe:18:a1:3c:b4:3b:c3:d0: 04:db:3b:35:8a:b8:e5:e4:4b:3c:1f:22:15:dc:80:c1: 32:af:53:4c:bd:56:11:cf:dd:ec:62:0f:2d:72:db:d1: 28:1e:64:01:be:b3:fb:4f:99:7b:4e:2e:fb:63:36:00: 24:0c:d4:f3:dc:d0:43:58:14:1a:ae:47:56:56:f3:57: da:6d:11:ff:81:4f:ab:f5:b7:d3:28:2d:e4:e2:8f:75: 66:78:c6:f1:7b:e9:1b:bc:9d:38:76:a7:71:48:00:41: f0:a5:7a:41:2c:95:d0:ff:1c:9a:4b:99:51:b3:31:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:d9:bc:6d:49:66:16:6f:d4:6e:dd:ff:f3:d7:62:d8: 80:de:ed:96:2e:ed:ea:d0:55:5b:1e:4b:7c:69:5a:cc: 8c:ad:55:c6:27:80:ae:5a:96:b7:90:64:41:1d:7d:3a: 62:fe:ed:11:ec:a8:14:5f:78:27:b3:78:cd:e6:aa:9c: 0a:b6:f4:a4:f4:9f:d4:2d:63:98:dc:d4:b1:37:0f:2f: 91:50:e9:ed:b5:1c:55:1d:43:de:36:dd:aa:67:b0:b8: 94:f7:9e:3d:48:f9:48:4f:7a:fa:c1:8f:d0:94:81:e3: 71:db:ce:1c:bf:25:41:38:ef:96:bc:ac:34:da:20:db: 76:c0:72:75:8d:42:12:96:20:75:be:5b:42:d6:77:54: d9:ce:65:25:fb:34:e8:dc:e9:4e:f3:1e:60:1d:62:0e: cb:ce:fd:7b:1d:28:9c:2a:28:32:30:0c:eb:96:2a:d3: 6e:af:38:cc:42:97:d6:a1:f3:d9:ca:77:c3:cc:df:cc: 32:85:42:a0:ed:f2:fc:d7:14:7b:41:bb:7f:f5:4b:e9: 30:69:7b:37:6b:7b:c4:f6:27:af:f8:13:fe:4d:42:e9: 22:15:27:56:01:97:39:6e:d1:97:7f:ca:9e:92:1e:e3: 4c:54:5e:7a:0a:95:ee:fa:65:e3:a8:61:fc:3e:b8:4b Fingerprint (SHA-256): 39:20:F6:42:C8:53:CD:86:F3:D6:6D:4B:85:ED:BF:AD:CE:C6:32:62:F0:ED:0C:CA:DD:DC:9B:AE:6E:E5:60:35 Fingerprint (SHA1): E3:C2:F8:FA:08:FC:21:10:2B:BC:53:92:D2:A9:62:8E:0B:21:7D:4B Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8329: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8330: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172600 (0x13bd4af8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 18:03:40 2017 Not After : Thu Mar 31 18:03:40 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e0:bc:4f:44:53:09:ee:58:79:3a:cf:f2:9f:9b:64: da:f6:ab:89:36:04:db:98:d5:bc:b8:8d:4d:66:06:db: d4:a0:93:cd:2f:a2:e7:eb:c1:28:6d:2b:ca:3a:53:ae: 5a:a2:2c:29:69:a3:dc:f1:a1:07:54:89:fb:0e:e1:7e: 4b:ee:55:c6:03:de:de:bf:ce:37:23:f7:f7:77:38:0f: 1a:5e:af:5f:c8:ac:4d:f8:28:62:f9:ab:ee:a6:3c:1a: 6d:e5:66:68:a9:b1:94:b4:a8:75:4e:08:cd:52:4a:f4: a5:c8:a0:91:ed:41:87:88:dc:82:35:d4:74:8b:2a:91: 38:0f:77:35:09:10:3b:7d:cb:9c:6e:7e:92:1d:3b:a1: 78:94:65:eb:ec:07:70:09:7c:0e:37:12:1d:7c:e4:3f: e8:23:05:4b:af:5d:30:c4:06:15:b8:d3:6c:3d:ef:28: e8:69:4f:13:23:42:30:de:44:8a:85:d8:f7:fd:46:7d: 9d:1c:b8:c9:fa:4c:c6:ee:42:cc:15:f6:6c:27:a8:01: d5:17:0d:62:78:cc:a1:99:3f:9b:dd:67:d5:ff:85:cb: b6:44:28:ff:e5:51:59:5e:ab:ae:85:79:09:cf:6c:96: 24:89:88:cf:0f:90:b3:c3:3f:c6:f0:0d:fb:69:17:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 50:f3:ae:3a:27:a9:f6:8a:b7:99:cd:74:74:ba:1d:16: 0f:9c:f2:45:ed:2e:a7:c6:1d:b2:8b:cf:22:a9:b3:82: 37:f6:f0:a1:b8:9c:88:28:5b:83:14:eb:f3:b3:dd:70: 06:96:6f:b7:14:3f:48:b6:bc:36:69:15:df:3e:1b:19: 55:91:66:2d:2a:8a:c7:22:49:33:08:f2:61:4d:ee:09: ae:b0:1c:ca:ec:42:b9:b4:4f:5c:5a:c9:3a:3b:fb:10: 84:51:fb:2b:9a:dc:db:15:6c:c9:8b:9e:3d:0c:1c:4a: fa:7f:12:af:e9:34:7f:e5:7c:88:8f:84:78:1b:68:a7: 45:a6:ad:e4:8c:3a:6c:1c:f1:5e:cf:99:fc:a3:6d:12: e5:ed:06:19:33:c9:8e:0c:f2:72:e5:3b:bc:5d:ec:6f: 8f:88:ed:0e:49:fc:e0:04:e3:58:e2:13:2d:b0:93:7f: cb:4f:f8:d7:db:25:2e:69:c4:8c:67:24:3e:dc:01:4c: 29:91:22:30:dd:17:71:3b:3d:12:cd:51:c7:41:3e:88: 25:93:73:3a:ed:82:61:08:8d:83:fb:cd:93:95:1d:60: ea:c0:ee:8a:b6:f3:9e:c2:af:4f:63:cd:2b:09:41:1f: f0:94:20:a5:52:04:52:a0:c4:7e:b0:94:00:ad:4e:a0 Fingerprint (SHA-256): 7C:2D:7B:28:C6:79:70:40:AA:E2:59:AE:ED:6B:9C:76:64:5B:A4:E9:FB:EE:E8:F3:4F:79:B3:37:65:4B:7C:95 Fingerprint (SHA1): EB:BC:58:A9:E1:DE:97:C6:CB:E7:2A:A2:21:34:3D:05:5A:E6:93:24 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #8331: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8332: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #8333: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #8334: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #8335: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172598 (0x13bd4af6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:03:24 2017 Not After : Thu Mar 31 18:03:24 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:95:69:e7:87:f7:ed:d3:f3:c2:08:bb:d0:8d:78:01: 69:4d:d8:9e:5c:b1:7e:06:b2:e5:e1:87:2a:42:b0:cf: 0c:bd:6c:d3:7a:d5:ca:46:88:de:30:9f:e0:38:f2:69: ff:01:b2:bd:34:f9:bd:8c:27:b8:37:c2:e4:e4:67:15: a1:e3:5b:f6:ec:0e:1e:b5:38:e0:ba:7b:95:55:39:15: e7:52:68:80:06:85:12:5a:57:ea:64:2a:76:b9:35:ca: d8:cd:b9:c9:20:d1:33:29:59:bd:27:b0:0a:75:d3:4d: b4:eb:d5:30:05:5e:8c:2c:f8:da:c7:76:f0:9d:2b:86: 0f:8d:a2:9b:3f:3c:eb:bc:f3:4b:1f:58:9b:e2:e0:63: cd:d1:db:92:f0:6e:c8:98:39:23:21:23:c5:4e:d6:38: 35:fe:1e:9e:9f:59:b0:0d:0d:ae:c2:b1:b9:61:02:27: fb:63:95:76:9c:9f:b8:c4:cc:b9:da:a4:07:d0:36:0a: 7e:87:1e:ec:96:85:f9:bd:48:4e:b4:31:b3:d8:85:f2: 47:36:4c:08:6e:9e:38:01:26:3d:99:cf:c1:f2:27:18: 89:f2:5c:af:56:be:7d:d5:ec:9a:5e:b5:ef:14:c0:cf: 62:6a:e5:58:67:2a:fb:e0:81:2e:c2:47:14:3c:d4:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:98:fc:3b:0a:04:79:07:5c:ab:a0:1f:0f:15:75:79: 5a:3f:fd:b3:ff:57:7e:1c:f6:5d:71:75:d1:61:95:3b: 06:84:19:ea:a3:d2:b8:c4:4c:fc:eb:86:2a:c4:b6:1b: 7a:b1:5e:fd:12:8e:ee:9e:e3:ab:8b:7e:6a:24:af:0f: 33:22:4e:8a:24:60:ed:b9:25:15:01:13:2d:d8:86:de: d0:a6:85:27:da:7a:c7:ab:ad:de:32:05:83:8d:22:1b: 39:4d:08:c1:0a:57:ce:84:cb:0b:51:1f:ef:d0:55:07: 46:44:26:1f:4e:52:f7:40:e2:55:9b:48:18:4b:3e:29: a6:4d:f4:ef:f6:43:2c:dc:f7:4a:2b:eb:54:02:8b:18: 80:de:89:a0:9b:3c:7c:c4:25:a5:b1:5e:15:4b:37:b8: 7a:90:91:01:67:8a:ec:94:35:a1:5d:ca:48:17:25:f3: ef:0c:14:d0:44:b5:af:6d:83:9d:ac:f7:73:14:90:86: 4f:92:25:d7:9b:ab:bc:e5:88:1a:4f:24:14:63:70:13: e3:24:c8:e0:0e:9e:67:4c:85:b7:f8:3a:52:0d:88:28: d2:07:79:f1:3e:81:00:c6:f3:44:99:36:8b:b9:46:84: 9b:d1:1d:b0:33:36:2a:50:f1:1f:c1:ef:2a:34:b2:d3 Fingerprint (SHA-256): 0F:55:80:98:EA:DD:13:8B:22:DF:66:7D:C2:F7:FB:28:85:19:07:87:25:F6:25:B9:E1:61:A7:80:10:0F:61:82 Fingerprint (SHA1): 2C:61:E4:BE:2F:3F:45:39:2B:FC:9F:69:9C:AC:BF:5A:E4:0C:57:12 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8336: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8337: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172599 (0x13bd4af7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:03:29 2017 Not After : Thu Mar 31 18:03:29 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:5d:58:ac:8f:46:11:e9:c8:24:c3:98:59:6a:26:b8: 3a:3f:77:ce:21:ce:de:5f:ef:a5:d1:9d:a9:f8:30:52: 85:ae:d0:9e:41:b9:11:fb:e0:7c:53:6c:20:2e:ea:07: 8a:07:bf:30:81:08:b7:7c:64:ca:55:7f:a9:94:84:c9: a9:91:19:ea:b2:91:5a:19:36:4d:9b:a2:ba:1f:e8:cb: 1a:c8:c9:68:1a:07:ff:f4:e4:c5:84:f8:20:63:8d:bf: e4:e9:c4:61:1e:86:0f:c1:7b:4f:45:f7:2a:3d:45:1e: 07:df:62:9f:0c:3c:df:bd:58:8d:e8:f0:52:a0:1f:43: 94:68:a4:05:6d:a2:43:ee:fe:18:a1:3c:b4:3b:c3:d0: 04:db:3b:35:8a:b8:e5:e4:4b:3c:1f:22:15:dc:80:c1: 32:af:53:4c:bd:56:11:cf:dd:ec:62:0f:2d:72:db:d1: 28:1e:64:01:be:b3:fb:4f:99:7b:4e:2e:fb:63:36:00: 24:0c:d4:f3:dc:d0:43:58:14:1a:ae:47:56:56:f3:57: da:6d:11:ff:81:4f:ab:f5:b7:d3:28:2d:e4:e2:8f:75: 66:78:c6:f1:7b:e9:1b:bc:9d:38:76:a7:71:48:00:41: f0:a5:7a:41:2c:95:d0:ff:1c:9a:4b:99:51:b3:31:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:d9:bc:6d:49:66:16:6f:d4:6e:dd:ff:f3:d7:62:d8: 80:de:ed:96:2e:ed:ea:d0:55:5b:1e:4b:7c:69:5a:cc: 8c:ad:55:c6:27:80:ae:5a:96:b7:90:64:41:1d:7d:3a: 62:fe:ed:11:ec:a8:14:5f:78:27:b3:78:cd:e6:aa:9c: 0a:b6:f4:a4:f4:9f:d4:2d:63:98:dc:d4:b1:37:0f:2f: 91:50:e9:ed:b5:1c:55:1d:43:de:36:dd:aa:67:b0:b8: 94:f7:9e:3d:48:f9:48:4f:7a:fa:c1:8f:d0:94:81:e3: 71:db:ce:1c:bf:25:41:38:ef:96:bc:ac:34:da:20:db: 76:c0:72:75:8d:42:12:96:20:75:be:5b:42:d6:77:54: d9:ce:65:25:fb:34:e8:dc:e9:4e:f3:1e:60:1d:62:0e: cb:ce:fd:7b:1d:28:9c:2a:28:32:30:0c:eb:96:2a:d3: 6e:af:38:cc:42:97:d6:a1:f3:d9:ca:77:c3:cc:df:cc: 32:85:42:a0:ed:f2:fc:d7:14:7b:41:bb:7f:f5:4b:e9: 30:69:7b:37:6b:7b:c4:f6:27:af:f8:13:fe:4d:42:e9: 22:15:27:56:01:97:39:6e:d1:97:7f:ca:9e:92:1e:e3: 4c:54:5e:7a:0a:95:ee:fa:65:e3:a8:61:fc:3e:b8:4b Fingerprint (SHA-256): 39:20:F6:42:C8:53:CD:86:F3:D6:6D:4B:85:ED:BF:AD:CE:C6:32:62:F0:ED:0C:CA:DD:DC:9B:AE:6E:E5:60:35 Fingerprint (SHA1): E3:C2:F8:FA:08:FC:21:10:2B:BC:53:92:D2:A9:62:8E:0B:21:7D:4B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8338: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8339: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172600 (0x13bd4af8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 18:03:40 2017 Not After : Thu Mar 31 18:03:40 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e0:bc:4f:44:53:09:ee:58:79:3a:cf:f2:9f:9b:64: da:f6:ab:89:36:04:db:98:d5:bc:b8:8d:4d:66:06:db: d4:a0:93:cd:2f:a2:e7:eb:c1:28:6d:2b:ca:3a:53:ae: 5a:a2:2c:29:69:a3:dc:f1:a1:07:54:89:fb:0e:e1:7e: 4b:ee:55:c6:03:de:de:bf:ce:37:23:f7:f7:77:38:0f: 1a:5e:af:5f:c8:ac:4d:f8:28:62:f9:ab:ee:a6:3c:1a: 6d:e5:66:68:a9:b1:94:b4:a8:75:4e:08:cd:52:4a:f4: a5:c8:a0:91:ed:41:87:88:dc:82:35:d4:74:8b:2a:91: 38:0f:77:35:09:10:3b:7d:cb:9c:6e:7e:92:1d:3b:a1: 78:94:65:eb:ec:07:70:09:7c:0e:37:12:1d:7c:e4:3f: e8:23:05:4b:af:5d:30:c4:06:15:b8:d3:6c:3d:ef:28: e8:69:4f:13:23:42:30:de:44:8a:85:d8:f7:fd:46:7d: 9d:1c:b8:c9:fa:4c:c6:ee:42:cc:15:f6:6c:27:a8:01: d5:17:0d:62:78:cc:a1:99:3f:9b:dd:67:d5:ff:85:cb: b6:44:28:ff:e5:51:59:5e:ab:ae:85:79:09:cf:6c:96: 24:89:88:cf:0f:90:b3:c3:3f:c6:f0:0d:fb:69:17:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 50:f3:ae:3a:27:a9:f6:8a:b7:99:cd:74:74:ba:1d:16: 0f:9c:f2:45:ed:2e:a7:c6:1d:b2:8b:cf:22:a9:b3:82: 37:f6:f0:a1:b8:9c:88:28:5b:83:14:eb:f3:b3:dd:70: 06:96:6f:b7:14:3f:48:b6:bc:36:69:15:df:3e:1b:19: 55:91:66:2d:2a:8a:c7:22:49:33:08:f2:61:4d:ee:09: ae:b0:1c:ca:ec:42:b9:b4:4f:5c:5a:c9:3a:3b:fb:10: 84:51:fb:2b:9a:dc:db:15:6c:c9:8b:9e:3d:0c:1c:4a: fa:7f:12:af:e9:34:7f:e5:7c:88:8f:84:78:1b:68:a7: 45:a6:ad:e4:8c:3a:6c:1c:f1:5e:cf:99:fc:a3:6d:12: e5:ed:06:19:33:c9:8e:0c:f2:72:e5:3b:bc:5d:ec:6f: 8f:88:ed:0e:49:fc:e0:04:e3:58:e2:13:2d:b0:93:7f: cb:4f:f8:d7:db:25:2e:69:c4:8c:67:24:3e:dc:01:4c: 29:91:22:30:dd:17:71:3b:3d:12:cd:51:c7:41:3e:88: 25:93:73:3a:ed:82:61:08:8d:83:fb:cd:93:95:1d:60: ea:c0:ee:8a:b6:f3:9e:c2:af:4f:63:cd:2b:09:41:1f: f0:94:20:a5:52:04:52:a0:c4:7e:b0:94:00:ad:4e:a0 Fingerprint (SHA-256): 7C:2D:7B:28:C6:79:70:40:AA:E2:59:AE:ED:6B:9C:76:64:5B:A4:E9:FB:EE:E8:F3:4F:79:B3:37:65:4B:7C:95 Fingerprint (SHA1): EB:BC:58:A9:E1:DE:97:C6:CB:E7:2A:A2:21:34:3D:05:5A:E6:93:24 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #8340: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8341: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172598 (0x13bd4af6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:03:24 2017 Not After : Thu Mar 31 18:03:24 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:95:69:e7:87:f7:ed:d3:f3:c2:08:bb:d0:8d:78:01: 69:4d:d8:9e:5c:b1:7e:06:b2:e5:e1:87:2a:42:b0:cf: 0c:bd:6c:d3:7a:d5:ca:46:88:de:30:9f:e0:38:f2:69: ff:01:b2:bd:34:f9:bd:8c:27:b8:37:c2:e4:e4:67:15: a1:e3:5b:f6:ec:0e:1e:b5:38:e0:ba:7b:95:55:39:15: e7:52:68:80:06:85:12:5a:57:ea:64:2a:76:b9:35:ca: d8:cd:b9:c9:20:d1:33:29:59:bd:27:b0:0a:75:d3:4d: b4:eb:d5:30:05:5e:8c:2c:f8:da:c7:76:f0:9d:2b:86: 0f:8d:a2:9b:3f:3c:eb:bc:f3:4b:1f:58:9b:e2:e0:63: cd:d1:db:92:f0:6e:c8:98:39:23:21:23:c5:4e:d6:38: 35:fe:1e:9e:9f:59:b0:0d:0d:ae:c2:b1:b9:61:02:27: fb:63:95:76:9c:9f:b8:c4:cc:b9:da:a4:07:d0:36:0a: 7e:87:1e:ec:96:85:f9:bd:48:4e:b4:31:b3:d8:85:f2: 47:36:4c:08:6e:9e:38:01:26:3d:99:cf:c1:f2:27:18: 89:f2:5c:af:56:be:7d:d5:ec:9a:5e:b5:ef:14:c0:cf: 62:6a:e5:58:67:2a:fb:e0:81:2e:c2:47:14:3c:d4:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:98:fc:3b:0a:04:79:07:5c:ab:a0:1f:0f:15:75:79: 5a:3f:fd:b3:ff:57:7e:1c:f6:5d:71:75:d1:61:95:3b: 06:84:19:ea:a3:d2:b8:c4:4c:fc:eb:86:2a:c4:b6:1b: 7a:b1:5e:fd:12:8e:ee:9e:e3:ab:8b:7e:6a:24:af:0f: 33:22:4e:8a:24:60:ed:b9:25:15:01:13:2d:d8:86:de: d0:a6:85:27:da:7a:c7:ab:ad:de:32:05:83:8d:22:1b: 39:4d:08:c1:0a:57:ce:84:cb:0b:51:1f:ef:d0:55:07: 46:44:26:1f:4e:52:f7:40:e2:55:9b:48:18:4b:3e:29: a6:4d:f4:ef:f6:43:2c:dc:f7:4a:2b:eb:54:02:8b:18: 80:de:89:a0:9b:3c:7c:c4:25:a5:b1:5e:15:4b:37:b8: 7a:90:91:01:67:8a:ec:94:35:a1:5d:ca:48:17:25:f3: ef:0c:14:d0:44:b5:af:6d:83:9d:ac:f7:73:14:90:86: 4f:92:25:d7:9b:ab:bc:e5:88:1a:4f:24:14:63:70:13: e3:24:c8:e0:0e:9e:67:4c:85:b7:f8:3a:52:0d:88:28: d2:07:79:f1:3e:81:00:c6:f3:44:99:36:8b:b9:46:84: 9b:d1:1d:b0:33:36:2a:50:f1:1f:c1:ef:2a:34:b2:d3 Fingerprint (SHA-256): 0F:55:80:98:EA:DD:13:8B:22:DF:66:7D:C2:F7:FB:28:85:19:07:87:25:F6:25:B9:E1:61:A7:80:10:0F:61:82 Fingerprint (SHA1): 2C:61:E4:BE:2F:3F:45:39:2B:FC:9F:69:9C:AC:BF:5A:E4:0C:57:12 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8342: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172598 (0x13bd4af6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:03:24 2017 Not After : Thu Mar 31 18:03:24 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:95:69:e7:87:f7:ed:d3:f3:c2:08:bb:d0:8d:78:01: 69:4d:d8:9e:5c:b1:7e:06:b2:e5:e1:87:2a:42:b0:cf: 0c:bd:6c:d3:7a:d5:ca:46:88:de:30:9f:e0:38:f2:69: ff:01:b2:bd:34:f9:bd:8c:27:b8:37:c2:e4:e4:67:15: a1:e3:5b:f6:ec:0e:1e:b5:38:e0:ba:7b:95:55:39:15: e7:52:68:80:06:85:12:5a:57:ea:64:2a:76:b9:35:ca: d8:cd:b9:c9:20:d1:33:29:59:bd:27:b0:0a:75:d3:4d: b4:eb:d5:30:05:5e:8c:2c:f8:da:c7:76:f0:9d:2b:86: 0f:8d:a2:9b:3f:3c:eb:bc:f3:4b:1f:58:9b:e2:e0:63: cd:d1:db:92:f0:6e:c8:98:39:23:21:23:c5:4e:d6:38: 35:fe:1e:9e:9f:59:b0:0d:0d:ae:c2:b1:b9:61:02:27: fb:63:95:76:9c:9f:b8:c4:cc:b9:da:a4:07:d0:36:0a: 7e:87:1e:ec:96:85:f9:bd:48:4e:b4:31:b3:d8:85:f2: 47:36:4c:08:6e:9e:38:01:26:3d:99:cf:c1:f2:27:18: 89:f2:5c:af:56:be:7d:d5:ec:9a:5e:b5:ef:14:c0:cf: 62:6a:e5:58:67:2a:fb:e0:81:2e:c2:47:14:3c:d4:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:98:fc:3b:0a:04:79:07:5c:ab:a0:1f:0f:15:75:79: 5a:3f:fd:b3:ff:57:7e:1c:f6:5d:71:75:d1:61:95:3b: 06:84:19:ea:a3:d2:b8:c4:4c:fc:eb:86:2a:c4:b6:1b: 7a:b1:5e:fd:12:8e:ee:9e:e3:ab:8b:7e:6a:24:af:0f: 33:22:4e:8a:24:60:ed:b9:25:15:01:13:2d:d8:86:de: d0:a6:85:27:da:7a:c7:ab:ad:de:32:05:83:8d:22:1b: 39:4d:08:c1:0a:57:ce:84:cb:0b:51:1f:ef:d0:55:07: 46:44:26:1f:4e:52:f7:40:e2:55:9b:48:18:4b:3e:29: a6:4d:f4:ef:f6:43:2c:dc:f7:4a:2b:eb:54:02:8b:18: 80:de:89:a0:9b:3c:7c:c4:25:a5:b1:5e:15:4b:37:b8: 7a:90:91:01:67:8a:ec:94:35:a1:5d:ca:48:17:25:f3: ef:0c:14:d0:44:b5:af:6d:83:9d:ac:f7:73:14:90:86: 4f:92:25:d7:9b:ab:bc:e5:88:1a:4f:24:14:63:70:13: e3:24:c8:e0:0e:9e:67:4c:85:b7:f8:3a:52:0d:88:28: d2:07:79:f1:3e:81:00:c6:f3:44:99:36:8b:b9:46:84: 9b:d1:1d:b0:33:36:2a:50:f1:1f:c1:ef:2a:34:b2:d3 Fingerprint (SHA-256): 0F:55:80:98:EA:DD:13:8B:22:DF:66:7D:C2:F7:FB:28:85:19:07:87:25:F6:25:B9:E1:61:A7:80:10:0F:61:82 Fingerprint (SHA1): 2C:61:E4:BE:2F:3F:45:39:2B:FC:9F:69:9C:AC:BF:5A:E4:0C:57:12 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8343: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172599 (0x13bd4af7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:03:29 2017 Not After : Thu Mar 31 18:03:29 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:5d:58:ac:8f:46:11:e9:c8:24:c3:98:59:6a:26:b8: 3a:3f:77:ce:21:ce:de:5f:ef:a5:d1:9d:a9:f8:30:52: 85:ae:d0:9e:41:b9:11:fb:e0:7c:53:6c:20:2e:ea:07: 8a:07:bf:30:81:08:b7:7c:64:ca:55:7f:a9:94:84:c9: a9:91:19:ea:b2:91:5a:19:36:4d:9b:a2:ba:1f:e8:cb: 1a:c8:c9:68:1a:07:ff:f4:e4:c5:84:f8:20:63:8d:bf: e4:e9:c4:61:1e:86:0f:c1:7b:4f:45:f7:2a:3d:45:1e: 07:df:62:9f:0c:3c:df:bd:58:8d:e8:f0:52:a0:1f:43: 94:68:a4:05:6d:a2:43:ee:fe:18:a1:3c:b4:3b:c3:d0: 04:db:3b:35:8a:b8:e5:e4:4b:3c:1f:22:15:dc:80:c1: 32:af:53:4c:bd:56:11:cf:dd:ec:62:0f:2d:72:db:d1: 28:1e:64:01:be:b3:fb:4f:99:7b:4e:2e:fb:63:36:00: 24:0c:d4:f3:dc:d0:43:58:14:1a:ae:47:56:56:f3:57: da:6d:11:ff:81:4f:ab:f5:b7:d3:28:2d:e4:e2:8f:75: 66:78:c6:f1:7b:e9:1b:bc:9d:38:76:a7:71:48:00:41: f0:a5:7a:41:2c:95:d0:ff:1c:9a:4b:99:51:b3:31:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:d9:bc:6d:49:66:16:6f:d4:6e:dd:ff:f3:d7:62:d8: 80:de:ed:96:2e:ed:ea:d0:55:5b:1e:4b:7c:69:5a:cc: 8c:ad:55:c6:27:80:ae:5a:96:b7:90:64:41:1d:7d:3a: 62:fe:ed:11:ec:a8:14:5f:78:27:b3:78:cd:e6:aa:9c: 0a:b6:f4:a4:f4:9f:d4:2d:63:98:dc:d4:b1:37:0f:2f: 91:50:e9:ed:b5:1c:55:1d:43:de:36:dd:aa:67:b0:b8: 94:f7:9e:3d:48:f9:48:4f:7a:fa:c1:8f:d0:94:81:e3: 71:db:ce:1c:bf:25:41:38:ef:96:bc:ac:34:da:20:db: 76:c0:72:75:8d:42:12:96:20:75:be:5b:42:d6:77:54: d9:ce:65:25:fb:34:e8:dc:e9:4e:f3:1e:60:1d:62:0e: cb:ce:fd:7b:1d:28:9c:2a:28:32:30:0c:eb:96:2a:d3: 6e:af:38:cc:42:97:d6:a1:f3:d9:ca:77:c3:cc:df:cc: 32:85:42:a0:ed:f2:fc:d7:14:7b:41:bb:7f:f5:4b:e9: 30:69:7b:37:6b:7b:c4:f6:27:af:f8:13:fe:4d:42:e9: 22:15:27:56:01:97:39:6e:d1:97:7f:ca:9e:92:1e:e3: 4c:54:5e:7a:0a:95:ee:fa:65:e3:a8:61:fc:3e:b8:4b Fingerprint (SHA-256): 39:20:F6:42:C8:53:CD:86:F3:D6:6D:4B:85:ED:BF:AD:CE:C6:32:62:F0:ED:0C:CA:DD:DC:9B:AE:6E:E5:60:35 Fingerprint (SHA1): E3:C2:F8:FA:08:FC:21:10:2B:BC:53:92:D2:A9:62:8E:0B:21:7D:4B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8344: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172599 (0x13bd4af7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:03:29 2017 Not After : Thu Mar 31 18:03:29 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:5d:58:ac:8f:46:11:e9:c8:24:c3:98:59:6a:26:b8: 3a:3f:77:ce:21:ce:de:5f:ef:a5:d1:9d:a9:f8:30:52: 85:ae:d0:9e:41:b9:11:fb:e0:7c:53:6c:20:2e:ea:07: 8a:07:bf:30:81:08:b7:7c:64:ca:55:7f:a9:94:84:c9: a9:91:19:ea:b2:91:5a:19:36:4d:9b:a2:ba:1f:e8:cb: 1a:c8:c9:68:1a:07:ff:f4:e4:c5:84:f8:20:63:8d:bf: e4:e9:c4:61:1e:86:0f:c1:7b:4f:45:f7:2a:3d:45:1e: 07:df:62:9f:0c:3c:df:bd:58:8d:e8:f0:52:a0:1f:43: 94:68:a4:05:6d:a2:43:ee:fe:18:a1:3c:b4:3b:c3:d0: 04:db:3b:35:8a:b8:e5:e4:4b:3c:1f:22:15:dc:80:c1: 32:af:53:4c:bd:56:11:cf:dd:ec:62:0f:2d:72:db:d1: 28:1e:64:01:be:b3:fb:4f:99:7b:4e:2e:fb:63:36:00: 24:0c:d4:f3:dc:d0:43:58:14:1a:ae:47:56:56:f3:57: da:6d:11:ff:81:4f:ab:f5:b7:d3:28:2d:e4:e2:8f:75: 66:78:c6:f1:7b:e9:1b:bc:9d:38:76:a7:71:48:00:41: f0:a5:7a:41:2c:95:d0:ff:1c:9a:4b:99:51:b3:31:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:d9:bc:6d:49:66:16:6f:d4:6e:dd:ff:f3:d7:62:d8: 80:de:ed:96:2e:ed:ea:d0:55:5b:1e:4b:7c:69:5a:cc: 8c:ad:55:c6:27:80:ae:5a:96:b7:90:64:41:1d:7d:3a: 62:fe:ed:11:ec:a8:14:5f:78:27:b3:78:cd:e6:aa:9c: 0a:b6:f4:a4:f4:9f:d4:2d:63:98:dc:d4:b1:37:0f:2f: 91:50:e9:ed:b5:1c:55:1d:43:de:36:dd:aa:67:b0:b8: 94:f7:9e:3d:48:f9:48:4f:7a:fa:c1:8f:d0:94:81:e3: 71:db:ce:1c:bf:25:41:38:ef:96:bc:ac:34:da:20:db: 76:c0:72:75:8d:42:12:96:20:75:be:5b:42:d6:77:54: d9:ce:65:25:fb:34:e8:dc:e9:4e:f3:1e:60:1d:62:0e: cb:ce:fd:7b:1d:28:9c:2a:28:32:30:0c:eb:96:2a:d3: 6e:af:38:cc:42:97:d6:a1:f3:d9:ca:77:c3:cc:df:cc: 32:85:42:a0:ed:f2:fc:d7:14:7b:41:bb:7f:f5:4b:e9: 30:69:7b:37:6b:7b:c4:f6:27:af:f8:13:fe:4d:42:e9: 22:15:27:56:01:97:39:6e:d1:97:7f:ca:9e:92:1e:e3: 4c:54:5e:7a:0a:95:ee:fa:65:e3:a8:61:fc:3e:b8:4b Fingerprint (SHA-256): 39:20:F6:42:C8:53:CD:86:F3:D6:6D:4B:85:ED:BF:AD:CE:C6:32:62:F0:ED:0C:CA:DD:DC:9B:AE:6E:E5:60:35 Fingerprint (SHA1): E3:C2:F8:FA:08:FC:21:10:2B:BC:53:92:D2:A9:62:8E:0B:21:7D:4B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8345: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172600 (0x13bd4af8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 18:03:40 2017 Not After : Thu Mar 31 18:03:40 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e0:bc:4f:44:53:09:ee:58:79:3a:cf:f2:9f:9b:64: da:f6:ab:89:36:04:db:98:d5:bc:b8:8d:4d:66:06:db: d4:a0:93:cd:2f:a2:e7:eb:c1:28:6d:2b:ca:3a:53:ae: 5a:a2:2c:29:69:a3:dc:f1:a1:07:54:89:fb:0e:e1:7e: 4b:ee:55:c6:03:de:de:bf:ce:37:23:f7:f7:77:38:0f: 1a:5e:af:5f:c8:ac:4d:f8:28:62:f9:ab:ee:a6:3c:1a: 6d:e5:66:68:a9:b1:94:b4:a8:75:4e:08:cd:52:4a:f4: a5:c8:a0:91:ed:41:87:88:dc:82:35:d4:74:8b:2a:91: 38:0f:77:35:09:10:3b:7d:cb:9c:6e:7e:92:1d:3b:a1: 78:94:65:eb:ec:07:70:09:7c:0e:37:12:1d:7c:e4:3f: e8:23:05:4b:af:5d:30:c4:06:15:b8:d3:6c:3d:ef:28: e8:69:4f:13:23:42:30:de:44:8a:85:d8:f7:fd:46:7d: 9d:1c:b8:c9:fa:4c:c6:ee:42:cc:15:f6:6c:27:a8:01: d5:17:0d:62:78:cc:a1:99:3f:9b:dd:67:d5:ff:85:cb: b6:44:28:ff:e5:51:59:5e:ab:ae:85:79:09:cf:6c:96: 24:89:88:cf:0f:90:b3:c3:3f:c6:f0:0d:fb:69:17:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 50:f3:ae:3a:27:a9:f6:8a:b7:99:cd:74:74:ba:1d:16: 0f:9c:f2:45:ed:2e:a7:c6:1d:b2:8b:cf:22:a9:b3:82: 37:f6:f0:a1:b8:9c:88:28:5b:83:14:eb:f3:b3:dd:70: 06:96:6f:b7:14:3f:48:b6:bc:36:69:15:df:3e:1b:19: 55:91:66:2d:2a:8a:c7:22:49:33:08:f2:61:4d:ee:09: ae:b0:1c:ca:ec:42:b9:b4:4f:5c:5a:c9:3a:3b:fb:10: 84:51:fb:2b:9a:dc:db:15:6c:c9:8b:9e:3d:0c:1c:4a: fa:7f:12:af:e9:34:7f:e5:7c:88:8f:84:78:1b:68:a7: 45:a6:ad:e4:8c:3a:6c:1c:f1:5e:cf:99:fc:a3:6d:12: e5:ed:06:19:33:c9:8e:0c:f2:72:e5:3b:bc:5d:ec:6f: 8f:88:ed:0e:49:fc:e0:04:e3:58:e2:13:2d:b0:93:7f: cb:4f:f8:d7:db:25:2e:69:c4:8c:67:24:3e:dc:01:4c: 29:91:22:30:dd:17:71:3b:3d:12:cd:51:c7:41:3e:88: 25:93:73:3a:ed:82:61:08:8d:83:fb:cd:93:95:1d:60: ea:c0:ee:8a:b6:f3:9e:c2:af:4f:63:cd:2b:09:41:1f: f0:94:20:a5:52:04:52:a0:c4:7e:b0:94:00:ad:4e:a0 Fingerprint (SHA-256): 7C:2D:7B:28:C6:79:70:40:AA:E2:59:AE:ED:6B:9C:76:64:5B:A4:E9:FB:EE:E8:F3:4F:79:B3:37:65:4B:7C:95 Fingerprint (SHA1): EB:BC:58:A9:E1:DE:97:C6:CB:E7:2A:A2:21:34:3D:05:5A:E6:93:24 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #8346: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172600 (0x13bd4af8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 18:03:40 2017 Not After : Thu Mar 31 18:03:40 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e0:bc:4f:44:53:09:ee:58:79:3a:cf:f2:9f:9b:64: da:f6:ab:89:36:04:db:98:d5:bc:b8:8d:4d:66:06:db: d4:a0:93:cd:2f:a2:e7:eb:c1:28:6d:2b:ca:3a:53:ae: 5a:a2:2c:29:69:a3:dc:f1:a1:07:54:89:fb:0e:e1:7e: 4b:ee:55:c6:03:de:de:bf:ce:37:23:f7:f7:77:38:0f: 1a:5e:af:5f:c8:ac:4d:f8:28:62:f9:ab:ee:a6:3c:1a: 6d:e5:66:68:a9:b1:94:b4:a8:75:4e:08:cd:52:4a:f4: a5:c8:a0:91:ed:41:87:88:dc:82:35:d4:74:8b:2a:91: 38:0f:77:35:09:10:3b:7d:cb:9c:6e:7e:92:1d:3b:a1: 78:94:65:eb:ec:07:70:09:7c:0e:37:12:1d:7c:e4:3f: e8:23:05:4b:af:5d:30:c4:06:15:b8:d3:6c:3d:ef:28: e8:69:4f:13:23:42:30:de:44:8a:85:d8:f7:fd:46:7d: 9d:1c:b8:c9:fa:4c:c6:ee:42:cc:15:f6:6c:27:a8:01: d5:17:0d:62:78:cc:a1:99:3f:9b:dd:67:d5:ff:85:cb: b6:44:28:ff:e5:51:59:5e:ab:ae:85:79:09:cf:6c:96: 24:89:88:cf:0f:90:b3:c3:3f:c6:f0:0d:fb:69:17:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 50:f3:ae:3a:27:a9:f6:8a:b7:99:cd:74:74:ba:1d:16: 0f:9c:f2:45:ed:2e:a7:c6:1d:b2:8b:cf:22:a9:b3:82: 37:f6:f0:a1:b8:9c:88:28:5b:83:14:eb:f3:b3:dd:70: 06:96:6f:b7:14:3f:48:b6:bc:36:69:15:df:3e:1b:19: 55:91:66:2d:2a:8a:c7:22:49:33:08:f2:61:4d:ee:09: ae:b0:1c:ca:ec:42:b9:b4:4f:5c:5a:c9:3a:3b:fb:10: 84:51:fb:2b:9a:dc:db:15:6c:c9:8b:9e:3d:0c:1c:4a: fa:7f:12:af:e9:34:7f:e5:7c:88:8f:84:78:1b:68:a7: 45:a6:ad:e4:8c:3a:6c:1c:f1:5e:cf:99:fc:a3:6d:12: e5:ed:06:19:33:c9:8e:0c:f2:72:e5:3b:bc:5d:ec:6f: 8f:88:ed:0e:49:fc:e0:04:e3:58:e2:13:2d:b0:93:7f: cb:4f:f8:d7:db:25:2e:69:c4:8c:67:24:3e:dc:01:4c: 29:91:22:30:dd:17:71:3b:3d:12:cd:51:c7:41:3e:88: 25:93:73:3a:ed:82:61:08:8d:83:fb:cd:93:95:1d:60: ea:c0:ee:8a:b6:f3:9e:c2:af:4f:63:cd:2b:09:41:1f: f0:94:20:a5:52:04:52:a0:c4:7e:b0:94:00:ad:4e:a0 Fingerprint (SHA-256): 7C:2D:7B:28:C6:79:70:40:AA:E2:59:AE:ED:6B:9C:76:64:5B:A4:E9:FB:EE:E8:F3:4F:79:B3:37:65:4B:7C:95 Fingerprint (SHA1): EB:BC:58:A9:E1:DE:97:C6:CB:E7:2A:A2:21:34:3D:05:5A:E6:93:24 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #8347: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #8348: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172603 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8349: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #8350: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8351: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8352: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 331172604 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8353: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8354: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8355: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8356: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331172605 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #8357: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8358: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #8359: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8360: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 331172606 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8361: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8362: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #8363: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8364: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 331172607 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8365: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8366: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #8367: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8368: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 331172608 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8369: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8370: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #8371: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8372: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 331172609 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8373: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8374: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8375: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #8376: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #8377: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #8378: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #8379: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172603 (0x13bd4afb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 18:04:38 2017 Not After : Thu Mar 31 18:04:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:c5:88:73:4f:22:ae:4b:bc:4f:00:a9:f2:1a:3b:0c: e9:42:12:b0:54:8c:13:ae:87:5a:ef:0a:cf:d4:05:f8: e9:c7:df:2d:82:c4:36:cf:35:c5:eb:86:f4:d5:51:5d: 9e:7f:77:6e:ce:1f:4d:c5:39:f7:79:0a:af:ba:1c:87: ad:39:d4:30:28:f7:89:d0:e7:1a:2d:fb:14:c4:a7:0e: b0:a1:df:15:d4:00:61:0b:4c:3a:fc:5c:e5:d3:48:c1: 18:5b:59:b1:c5:8a:1b:d7:2b:66:e1:2e:c3:8d:1e:ee: 8c:9d:9f:73:c7:d1:3b:fd:15:f8:53:39:e0:1a:e0:70: 97:9c:87:19:c9:0a:61:97:54:be:5a:b6:b8:c2:40:90: ad:6c:4e:4a:98:53:47:17:98:ce:32:e9:8a:6e:48:fb: 1d:45:43:32:36:44:15:ab:81:52:bc:b5:f8:bd:b9:7e: 71:06:8e:33:51:1f:be:88:fb:a3:0f:a7:11:5e:ca:1d: c9:33:91:ce:20:f2:24:48:fb:10:73:a4:e1:79:17:9a: 47:1c:0d:1b:31:be:08:ac:a9:32:0f:57:c9:95:42:e5: 82:e1:7e:36:dc:d4:b9:b7:69:13:39:44:1d:87:b5:9f: c9:1e:00:a0:91:19:e0:f2:8b:46:c0:50:ef:9f:68:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:b5:97:ca:ae:78:30:ff:01:62:a7:73:54:4d:b5:a6: 0e:9c:57:1a:16:e0:2e:d4:70:5b:66:26:f1:65:27:24: df:77:94:e0:37:ae:b5:78:e2:c7:e0:85:7c:49:cc:de: 4a:8d:0e:a2:00:02:4e:32:9a:8f:fc:30:e5:8c:cc:dd: ea:10:44:8e:14:6d:b7:f7:7a:92:e2:8c:4c:91:88:78: 5f:0f:02:34:e3:e1:b8:0a:ee:4f:f5:70:94:d5:db:58: 71:1f:0e:88:a4:b3:d8:8d:2f:f8:b7:d4:d5:3d:8f:a6: d0:11:aa:d8:cc:07:75:97:2f:65:22:a5:40:83:94:5b: 9e:74:92:8c:3d:73:87:d1:6c:4b:2e:1a:8a:04:c9:da: d3:ef:5e:db:0a:ea:4e:81:30:91:05:ea:a2:d4:7a:99: 87:f3:a1:1c:73:59:d9:c7:36:90:94:da:aa:3b:b7:f9: 69:f3:ac:b8:21:48:22:04:ec:39:e2:af:5e:86:e7:ed: c1:de:a1:9c:f2:6e:e6:ed:99:09:7e:26:d1:47:a7:12: 8d:d2:8f:9e:fe:c9:b6:b2:98:c8:ed:2e:87:16:08:3b: 71:31:96:4a:72:48:e7:1a:59:d7:88:1f:96:3d:69:10: 53:75:9c:5b:73:b3:a5:2a:cb:0f:09:95:2b:10:d8:1d Fingerprint (SHA-256): D9:8A:F4:81:B0:67:A9:76:39:E4:8E:73:DB:20:15:91:10:72:0F:5E:5D:6B:09:6B:FD:18:F9:41:80:1F:A8:B4 Fingerprint (SHA1): 97:39:26:BD:4D:83:B6:A5:22:7F:76:99:73:FA:91:D1:BC:3E:5B:15 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8380: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8381: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8382: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8383: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172603 (0x13bd4afb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 18:04:38 2017 Not After : Thu Mar 31 18:04:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:c5:88:73:4f:22:ae:4b:bc:4f:00:a9:f2:1a:3b:0c: e9:42:12:b0:54:8c:13:ae:87:5a:ef:0a:cf:d4:05:f8: e9:c7:df:2d:82:c4:36:cf:35:c5:eb:86:f4:d5:51:5d: 9e:7f:77:6e:ce:1f:4d:c5:39:f7:79:0a:af:ba:1c:87: ad:39:d4:30:28:f7:89:d0:e7:1a:2d:fb:14:c4:a7:0e: b0:a1:df:15:d4:00:61:0b:4c:3a:fc:5c:e5:d3:48:c1: 18:5b:59:b1:c5:8a:1b:d7:2b:66:e1:2e:c3:8d:1e:ee: 8c:9d:9f:73:c7:d1:3b:fd:15:f8:53:39:e0:1a:e0:70: 97:9c:87:19:c9:0a:61:97:54:be:5a:b6:b8:c2:40:90: ad:6c:4e:4a:98:53:47:17:98:ce:32:e9:8a:6e:48:fb: 1d:45:43:32:36:44:15:ab:81:52:bc:b5:f8:bd:b9:7e: 71:06:8e:33:51:1f:be:88:fb:a3:0f:a7:11:5e:ca:1d: c9:33:91:ce:20:f2:24:48:fb:10:73:a4:e1:79:17:9a: 47:1c:0d:1b:31:be:08:ac:a9:32:0f:57:c9:95:42:e5: 82:e1:7e:36:dc:d4:b9:b7:69:13:39:44:1d:87:b5:9f: c9:1e:00:a0:91:19:e0:f2:8b:46:c0:50:ef:9f:68:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:b5:97:ca:ae:78:30:ff:01:62:a7:73:54:4d:b5:a6: 0e:9c:57:1a:16:e0:2e:d4:70:5b:66:26:f1:65:27:24: df:77:94:e0:37:ae:b5:78:e2:c7:e0:85:7c:49:cc:de: 4a:8d:0e:a2:00:02:4e:32:9a:8f:fc:30:e5:8c:cc:dd: ea:10:44:8e:14:6d:b7:f7:7a:92:e2:8c:4c:91:88:78: 5f:0f:02:34:e3:e1:b8:0a:ee:4f:f5:70:94:d5:db:58: 71:1f:0e:88:a4:b3:d8:8d:2f:f8:b7:d4:d5:3d:8f:a6: d0:11:aa:d8:cc:07:75:97:2f:65:22:a5:40:83:94:5b: 9e:74:92:8c:3d:73:87:d1:6c:4b:2e:1a:8a:04:c9:da: d3:ef:5e:db:0a:ea:4e:81:30:91:05:ea:a2:d4:7a:99: 87:f3:a1:1c:73:59:d9:c7:36:90:94:da:aa:3b:b7:f9: 69:f3:ac:b8:21:48:22:04:ec:39:e2:af:5e:86:e7:ed: c1:de:a1:9c:f2:6e:e6:ed:99:09:7e:26:d1:47:a7:12: 8d:d2:8f:9e:fe:c9:b6:b2:98:c8:ed:2e:87:16:08:3b: 71:31:96:4a:72:48:e7:1a:59:d7:88:1f:96:3d:69:10: 53:75:9c:5b:73:b3:a5:2a:cb:0f:09:95:2b:10:d8:1d Fingerprint (SHA-256): D9:8A:F4:81:B0:67:A9:76:39:E4:8E:73:DB:20:15:91:10:72:0F:5E:5D:6B:09:6B:FD:18:F9:41:80:1F:A8:B4 Fingerprint (SHA1): 97:39:26:BD:4D:83:B6:A5:22:7F:76:99:73:FA:91:D1:BC:3E:5B:15 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8384: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8385: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #8386: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172610 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8387: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #8388: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8389: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8390: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 331172611 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #8391: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8392: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #8393: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8394: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 331172612 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8395: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8396: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #8397: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8398: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 331172613 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8399: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8400: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8401: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8402: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 331172614 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8403: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8404: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #8405: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8406: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 331172615 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8407: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8408: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #8409: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8410: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 331172616 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8411: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8412: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #8413: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8414: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 331172617 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8415: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8416: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #8417: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8418: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 331172618 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #8419: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8420: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #8421: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8422: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 331172619 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8423: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8424: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #8425: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8426: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 331172620 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8427: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8428: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #8429: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8430: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 331172621 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8431: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8432: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #8433: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8434: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 331172622 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8435: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8436: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #8437: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8438: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 331172623 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8439: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8440: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #8441: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8442: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 331172624 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8443: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8444: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #8445: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8446: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 331172625 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8447: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8448: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #8449: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8450: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 331172626 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8451: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8452: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #8453: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8454: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 331172627 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #8455: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8456: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #8457: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8458: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 331172628 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8459: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8460: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #8461: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8462: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 331172629 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8463: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8464: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #8465: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8466: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 331172630 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8467: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8468: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #8469: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8470: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 331172631 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8471: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8472: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #8473: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8474: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 331172632 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8475: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8476: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #8477: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8478: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 331172633 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8479: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8480: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #8481: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8482: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 331172634 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8483: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8484: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #8485: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8486: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 331172635 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8487: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8488: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #8489: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8490: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 331172636 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8491: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8492: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #8493: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8494: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 331172637 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8495: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8496: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #8497: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8498: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 331172638 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8499: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8500: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #8501: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8502: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 331172639 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8503: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8504: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8505: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172610 (0x13bd4b02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 18:07:15 2017 Not After : Thu Mar 31 18:07:15 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c8:70:e2:53:cb:7d:a7:a7:af:29:89:96:b2:17:54: e0:d3:71:de:c5:aa:f6:f9:6e:84:85:ea:ea:e4:3e:2c: 4e:c7:b5:46:c6:b6:cc:df:7f:b9:b2:20:84:8e:c0:ef: 73:1b:8a:ce:2f:1f:78:7c:f2:f1:ed:7e:eb:93:c3:f2: 2e:3b:65:09:5f:27:1b:c6:2c:8f:b6:7c:ca:a6:f1:8c: a2:b8:d3:e5:03:3c:27:13:e5:77:bd:7d:f2:47:11:da: 8a:71:d2:84:1a:7c:4a:92:71:77:85:6b:2d:8d:d6:aa: d1:30:72:d6:16:4e:51:86:3e:eb:4c:0b:ce:30:c1:86: 82:9d:a1:6c:51:23:28:b6:9e:0e:5a:b4:75:d6:0a:96: 8f:7e:8c:3e:a8:3f:fe:37:87:8f:96:b0:45:42:fe:fb: 43:a9:1a:f9:91:d6:92:3f:1c:9b:c4:3c:99:c9:27:68: c2:13:84:73:a1:a2:7d:7a:85:13:4e:f7:23:fb:f0:f4: 1e:28:8f:e9:c9:d5:25:a7:aa:a9:0c:be:51:c5:f4:bf: ed:bd:54:fb:4d:cc:83:42:a1:a8:1a:56:42:9e:63:35: 80:d6:67:5f:a2:2e:32:95:74:2f:ce:0c:8e:e4:78:db: b5:ef:ec:fc:6e:31:e2:31:c0:4b:8b:20:f8:51:f5:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:ef:d2:bd:2b:7c:2f:ba:8e:d7:8e:47:2b:57:7b:6c: e7:a6:36:5d:cf:22:f4:ba:63:6c:c1:56:8e:fc:7e:0a: 25:40:38:a1:45:01:db:4f:cc:df:b6:99:38:17:59:9a: 01:bb:01:c5:1b:6a:5c:02:20:dd:88:b8:19:ec:76:fc: 6d:3b:fb:66:8b:b1:a2:ac:32:37:b5:c8:62:cc:79:a9: 29:38:fd:fd:1f:50:6f:52:8d:f7:94:d8:31:74:72:44: 3b:da:46:df:63:61:d1:4c:38:6e:cd:a9:b4:cf:e3:40: c9:e6:d9:3a:47:8c:3a:65:80:1c:da:23:7c:5b:ef:af: fc:21:b7:1d:c0:34:7f:8b:74:c6:ce:2f:93:88:b4:cf: ee:16:82:28:f3:65:6b:23:7e:bb:db:1d:3d:67:f2:c8: da:1a:ce:c6:64:cc:66:4c:c4:a7:c2:57:8c:0c:7d:25: 1d:e8:e9:4f:b3:1d:9c:45:a0:9f:6a:77:4f:5e:ea:bc: 3a:da:21:f7:4a:cd:b0:16:8e:9f:0d:7b:ba:39:63:67: 0b:13:03:cb:f8:a9:53:00:51:e0:fe:ec:fe:40:d2:10: 00:4b:fa:6c:9b:d8:a9:28:fe:69:3c:92:8a:11:ca:83: 12:34:33:2c:f1:bf:e4:5f:7f:0f:b4:be:aa:cb:f7:69 Fingerprint (SHA-256): B6:CB:53:5B:49:0E:F2:DE:31:0A:8D:EB:05:99:5A:E0:61:CF:8C:09:86:E9:65:A0:5D:7E:EC:5C:A7:4D:50:F9 Fingerprint (SHA1): 02:40:F4:42:D4:8A:8B:17:48:D3:BE:6D:8B:6C:00:C3:EA:7D:1A:79 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8506: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8507: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172610 (0x13bd4b02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 18:07:15 2017 Not After : Thu Mar 31 18:07:15 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c8:70:e2:53:cb:7d:a7:a7:af:29:89:96:b2:17:54: e0:d3:71:de:c5:aa:f6:f9:6e:84:85:ea:ea:e4:3e:2c: 4e:c7:b5:46:c6:b6:cc:df:7f:b9:b2:20:84:8e:c0:ef: 73:1b:8a:ce:2f:1f:78:7c:f2:f1:ed:7e:eb:93:c3:f2: 2e:3b:65:09:5f:27:1b:c6:2c:8f:b6:7c:ca:a6:f1:8c: a2:b8:d3:e5:03:3c:27:13:e5:77:bd:7d:f2:47:11:da: 8a:71:d2:84:1a:7c:4a:92:71:77:85:6b:2d:8d:d6:aa: d1:30:72:d6:16:4e:51:86:3e:eb:4c:0b:ce:30:c1:86: 82:9d:a1:6c:51:23:28:b6:9e:0e:5a:b4:75:d6:0a:96: 8f:7e:8c:3e:a8:3f:fe:37:87:8f:96:b0:45:42:fe:fb: 43:a9:1a:f9:91:d6:92:3f:1c:9b:c4:3c:99:c9:27:68: c2:13:84:73:a1:a2:7d:7a:85:13:4e:f7:23:fb:f0:f4: 1e:28:8f:e9:c9:d5:25:a7:aa:a9:0c:be:51:c5:f4:bf: ed:bd:54:fb:4d:cc:83:42:a1:a8:1a:56:42:9e:63:35: 80:d6:67:5f:a2:2e:32:95:74:2f:ce:0c:8e:e4:78:db: b5:ef:ec:fc:6e:31:e2:31:c0:4b:8b:20:f8:51:f5:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:ef:d2:bd:2b:7c:2f:ba:8e:d7:8e:47:2b:57:7b:6c: e7:a6:36:5d:cf:22:f4:ba:63:6c:c1:56:8e:fc:7e:0a: 25:40:38:a1:45:01:db:4f:cc:df:b6:99:38:17:59:9a: 01:bb:01:c5:1b:6a:5c:02:20:dd:88:b8:19:ec:76:fc: 6d:3b:fb:66:8b:b1:a2:ac:32:37:b5:c8:62:cc:79:a9: 29:38:fd:fd:1f:50:6f:52:8d:f7:94:d8:31:74:72:44: 3b:da:46:df:63:61:d1:4c:38:6e:cd:a9:b4:cf:e3:40: c9:e6:d9:3a:47:8c:3a:65:80:1c:da:23:7c:5b:ef:af: fc:21:b7:1d:c0:34:7f:8b:74:c6:ce:2f:93:88:b4:cf: ee:16:82:28:f3:65:6b:23:7e:bb:db:1d:3d:67:f2:c8: da:1a:ce:c6:64:cc:66:4c:c4:a7:c2:57:8c:0c:7d:25: 1d:e8:e9:4f:b3:1d:9c:45:a0:9f:6a:77:4f:5e:ea:bc: 3a:da:21:f7:4a:cd:b0:16:8e:9f:0d:7b:ba:39:63:67: 0b:13:03:cb:f8:a9:53:00:51:e0:fe:ec:fe:40:d2:10: 00:4b:fa:6c:9b:d8:a9:28:fe:69:3c:92:8a:11:ca:83: 12:34:33:2c:f1:bf:e4:5f:7f:0f:b4:be:aa:cb:f7:69 Fingerprint (SHA-256): B6:CB:53:5B:49:0E:F2:DE:31:0A:8D:EB:05:99:5A:E0:61:CF:8C:09:86:E9:65:A0:5D:7E:EC:5C:A7:4D:50:F9 Fingerprint (SHA1): 02:40:F4:42:D4:8A:8B:17:48:D3:BE:6D:8B:6C:00:C3:EA:7D:1A:79 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8508: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8509: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8510: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8511: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172610 (0x13bd4b02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 18:07:15 2017 Not After : Thu Mar 31 18:07:15 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c8:70:e2:53:cb:7d:a7:a7:af:29:89:96:b2:17:54: e0:d3:71:de:c5:aa:f6:f9:6e:84:85:ea:ea:e4:3e:2c: 4e:c7:b5:46:c6:b6:cc:df:7f:b9:b2:20:84:8e:c0:ef: 73:1b:8a:ce:2f:1f:78:7c:f2:f1:ed:7e:eb:93:c3:f2: 2e:3b:65:09:5f:27:1b:c6:2c:8f:b6:7c:ca:a6:f1:8c: a2:b8:d3:e5:03:3c:27:13:e5:77:bd:7d:f2:47:11:da: 8a:71:d2:84:1a:7c:4a:92:71:77:85:6b:2d:8d:d6:aa: d1:30:72:d6:16:4e:51:86:3e:eb:4c:0b:ce:30:c1:86: 82:9d:a1:6c:51:23:28:b6:9e:0e:5a:b4:75:d6:0a:96: 8f:7e:8c:3e:a8:3f:fe:37:87:8f:96:b0:45:42:fe:fb: 43:a9:1a:f9:91:d6:92:3f:1c:9b:c4:3c:99:c9:27:68: c2:13:84:73:a1:a2:7d:7a:85:13:4e:f7:23:fb:f0:f4: 1e:28:8f:e9:c9:d5:25:a7:aa:a9:0c:be:51:c5:f4:bf: ed:bd:54:fb:4d:cc:83:42:a1:a8:1a:56:42:9e:63:35: 80:d6:67:5f:a2:2e:32:95:74:2f:ce:0c:8e:e4:78:db: b5:ef:ec:fc:6e:31:e2:31:c0:4b:8b:20:f8:51:f5:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:ef:d2:bd:2b:7c:2f:ba:8e:d7:8e:47:2b:57:7b:6c: e7:a6:36:5d:cf:22:f4:ba:63:6c:c1:56:8e:fc:7e:0a: 25:40:38:a1:45:01:db:4f:cc:df:b6:99:38:17:59:9a: 01:bb:01:c5:1b:6a:5c:02:20:dd:88:b8:19:ec:76:fc: 6d:3b:fb:66:8b:b1:a2:ac:32:37:b5:c8:62:cc:79:a9: 29:38:fd:fd:1f:50:6f:52:8d:f7:94:d8:31:74:72:44: 3b:da:46:df:63:61:d1:4c:38:6e:cd:a9:b4:cf:e3:40: c9:e6:d9:3a:47:8c:3a:65:80:1c:da:23:7c:5b:ef:af: fc:21:b7:1d:c0:34:7f:8b:74:c6:ce:2f:93:88:b4:cf: ee:16:82:28:f3:65:6b:23:7e:bb:db:1d:3d:67:f2:c8: da:1a:ce:c6:64:cc:66:4c:c4:a7:c2:57:8c:0c:7d:25: 1d:e8:e9:4f:b3:1d:9c:45:a0:9f:6a:77:4f:5e:ea:bc: 3a:da:21:f7:4a:cd:b0:16:8e:9f:0d:7b:ba:39:63:67: 0b:13:03:cb:f8:a9:53:00:51:e0:fe:ec:fe:40:d2:10: 00:4b:fa:6c:9b:d8:a9:28:fe:69:3c:92:8a:11:ca:83: 12:34:33:2c:f1:bf:e4:5f:7f:0f:b4:be:aa:cb:f7:69 Fingerprint (SHA-256): B6:CB:53:5B:49:0E:F2:DE:31:0A:8D:EB:05:99:5A:E0:61:CF:8C:09:86:E9:65:A0:5D:7E:EC:5C:A7:4D:50:F9 Fingerprint (SHA1): 02:40:F4:42:D4:8A:8B:17:48:D3:BE:6D:8B:6C:00:C3:EA:7D:1A:79 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8512: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8513: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8514: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8515: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172610 (0x13bd4b02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 18:07:15 2017 Not After : Thu Mar 31 18:07:15 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c8:70:e2:53:cb:7d:a7:a7:af:29:89:96:b2:17:54: e0:d3:71:de:c5:aa:f6:f9:6e:84:85:ea:ea:e4:3e:2c: 4e:c7:b5:46:c6:b6:cc:df:7f:b9:b2:20:84:8e:c0:ef: 73:1b:8a:ce:2f:1f:78:7c:f2:f1:ed:7e:eb:93:c3:f2: 2e:3b:65:09:5f:27:1b:c6:2c:8f:b6:7c:ca:a6:f1:8c: a2:b8:d3:e5:03:3c:27:13:e5:77:bd:7d:f2:47:11:da: 8a:71:d2:84:1a:7c:4a:92:71:77:85:6b:2d:8d:d6:aa: d1:30:72:d6:16:4e:51:86:3e:eb:4c:0b:ce:30:c1:86: 82:9d:a1:6c:51:23:28:b6:9e:0e:5a:b4:75:d6:0a:96: 8f:7e:8c:3e:a8:3f:fe:37:87:8f:96:b0:45:42:fe:fb: 43:a9:1a:f9:91:d6:92:3f:1c:9b:c4:3c:99:c9:27:68: c2:13:84:73:a1:a2:7d:7a:85:13:4e:f7:23:fb:f0:f4: 1e:28:8f:e9:c9:d5:25:a7:aa:a9:0c:be:51:c5:f4:bf: ed:bd:54:fb:4d:cc:83:42:a1:a8:1a:56:42:9e:63:35: 80:d6:67:5f:a2:2e:32:95:74:2f:ce:0c:8e:e4:78:db: b5:ef:ec:fc:6e:31:e2:31:c0:4b:8b:20:f8:51:f5:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:ef:d2:bd:2b:7c:2f:ba:8e:d7:8e:47:2b:57:7b:6c: e7:a6:36:5d:cf:22:f4:ba:63:6c:c1:56:8e:fc:7e:0a: 25:40:38:a1:45:01:db:4f:cc:df:b6:99:38:17:59:9a: 01:bb:01:c5:1b:6a:5c:02:20:dd:88:b8:19:ec:76:fc: 6d:3b:fb:66:8b:b1:a2:ac:32:37:b5:c8:62:cc:79:a9: 29:38:fd:fd:1f:50:6f:52:8d:f7:94:d8:31:74:72:44: 3b:da:46:df:63:61:d1:4c:38:6e:cd:a9:b4:cf:e3:40: c9:e6:d9:3a:47:8c:3a:65:80:1c:da:23:7c:5b:ef:af: fc:21:b7:1d:c0:34:7f:8b:74:c6:ce:2f:93:88:b4:cf: ee:16:82:28:f3:65:6b:23:7e:bb:db:1d:3d:67:f2:c8: da:1a:ce:c6:64:cc:66:4c:c4:a7:c2:57:8c:0c:7d:25: 1d:e8:e9:4f:b3:1d:9c:45:a0:9f:6a:77:4f:5e:ea:bc: 3a:da:21:f7:4a:cd:b0:16:8e:9f:0d:7b:ba:39:63:67: 0b:13:03:cb:f8:a9:53:00:51:e0:fe:ec:fe:40:d2:10: 00:4b:fa:6c:9b:d8:a9:28:fe:69:3c:92:8a:11:ca:83: 12:34:33:2c:f1:bf:e4:5f:7f:0f:b4:be:aa:cb:f7:69 Fingerprint (SHA-256): B6:CB:53:5B:49:0E:F2:DE:31:0A:8D:EB:05:99:5A:E0:61:CF:8C:09:86:E9:65:A0:5D:7E:EC:5C:A7:4D:50:F9 Fingerprint (SHA1): 02:40:F4:42:D4:8A:8B:17:48:D3:BE:6D:8B:6C:00:C3:EA:7D:1A:79 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8516: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172610 (0x13bd4b02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 18:07:15 2017 Not After : Thu Mar 31 18:07:15 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c8:70:e2:53:cb:7d:a7:a7:af:29:89:96:b2:17:54: e0:d3:71:de:c5:aa:f6:f9:6e:84:85:ea:ea:e4:3e:2c: 4e:c7:b5:46:c6:b6:cc:df:7f:b9:b2:20:84:8e:c0:ef: 73:1b:8a:ce:2f:1f:78:7c:f2:f1:ed:7e:eb:93:c3:f2: 2e:3b:65:09:5f:27:1b:c6:2c:8f:b6:7c:ca:a6:f1:8c: a2:b8:d3:e5:03:3c:27:13:e5:77:bd:7d:f2:47:11:da: 8a:71:d2:84:1a:7c:4a:92:71:77:85:6b:2d:8d:d6:aa: d1:30:72:d6:16:4e:51:86:3e:eb:4c:0b:ce:30:c1:86: 82:9d:a1:6c:51:23:28:b6:9e:0e:5a:b4:75:d6:0a:96: 8f:7e:8c:3e:a8:3f:fe:37:87:8f:96:b0:45:42:fe:fb: 43:a9:1a:f9:91:d6:92:3f:1c:9b:c4:3c:99:c9:27:68: c2:13:84:73:a1:a2:7d:7a:85:13:4e:f7:23:fb:f0:f4: 1e:28:8f:e9:c9:d5:25:a7:aa:a9:0c:be:51:c5:f4:bf: ed:bd:54:fb:4d:cc:83:42:a1:a8:1a:56:42:9e:63:35: 80:d6:67:5f:a2:2e:32:95:74:2f:ce:0c:8e:e4:78:db: b5:ef:ec:fc:6e:31:e2:31:c0:4b:8b:20:f8:51:f5:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:ef:d2:bd:2b:7c:2f:ba:8e:d7:8e:47:2b:57:7b:6c: e7:a6:36:5d:cf:22:f4:ba:63:6c:c1:56:8e:fc:7e:0a: 25:40:38:a1:45:01:db:4f:cc:df:b6:99:38:17:59:9a: 01:bb:01:c5:1b:6a:5c:02:20:dd:88:b8:19:ec:76:fc: 6d:3b:fb:66:8b:b1:a2:ac:32:37:b5:c8:62:cc:79:a9: 29:38:fd:fd:1f:50:6f:52:8d:f7:94:d8:31:74:72:44: 3b:da:46:df:63:61:d1:4c:38:6e:cd:a9:b4:cf:e3:40: c9:e6:d9:3a:47:8c:3a:65:80:1c:da:23:7c:5b:ef:af: fc:21:b7:1d:c0:34:7f:8b:74:c6:ce:2f:93:88:b4:cf: ee:16:82:28:f3:65:6b:23:7e:bb:db:1d:3d:67:f2:c8: da:1a:ce:c6:64:cc:66:4c:c4:a7:c2:57:8c:0c:7d:25: 1d:e8:e9:4f:b3:1d:9c:45:a0:9f:6a:77:4f:5e:ea:bc: 3a:da:21:f7:4a:cd:b0:16:8e:9f:0d:7b:ba:39:63:67: 0b:13:03:cb:f8:a9:53:00:51:e0:fe:ec:fe:40:d2:10: 00:4b:fa:6c:9b:d8:a9:28:fe:69:3c:92:8a:11:ca:83: 12:34:33:2c:f1:bf:e4:5f:7f:0f:b4:be:aa:cb:f7:69 Fingerprint (SHA-256): B6:CB:53:5B:49:0E:F2:DE:31:0A:8D:EB:05:99:5A:E0:61:CF:8C:09:86:E9:65:A0:5D:7E:EC:5C:A7:4D:50:F9 Fingerprint (SHA1): 02:40:F4:42:D4:8A:8B:17:48:D3:BE:6D:8B:6C:00:C3:EA:7D:1A:79 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8517: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8518: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172610 (0x13bd4b02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 18:07:15 2017 Not After : Thu Mar 31 18:07:15 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c8:70:e2:53:cb:7d:a7:a7:af:29:89:96:b2:17:54: e0:d3:71:de:c5:aa:f6:f9:6e:84:85:ea:ea:e4:3e:2c: 4e:c7:b5:46:c6:b6:cc:df:7f:b9:b2:20:84:8e:c0:ef: 73:1b:8a:ce:2f:1f:78:7c:f2:f1:ed:7e:eb:93:c3:f2: 2e:3b:65:09:5f:27:1b:c6:2c:8f:b6:7c:ca:a6:f1:8c: a2:b8:d3:e5:03:3c:27:13:e5:77:bd:7d:f2:47:11:da: 8a:71:d2:84:1a:7c:4a:92:71:77:85:6b:2d:8d:d6:aa: d1:30:72:d6:16:4e:51:86:3e:eb:4c:0b:ce:30:c1:86: 82:9d:a1:6c:51:23:28:b6:9e:0e:5a:b4:75:d6:0a:96: 8f:7e:8c:3e:a8:3f:fe:37:87:8f:96:b0:45:42:fe:fb: 43:a9:1a:f9:91:d6:92:3f:1c:9b:c4:3c:99:c9:27:68: c2:13:84:73:a1:a2:7d:7a:85:13:4e:f7:23:fb:f0:f4: 1e:28:8f:e9:c9:d5:25:a7:aa:a9:0c:be:51:c5:f4:bf: ed:bd:54:fb:4d:cc:83:42:a1:a8:1a:56:42:9e:63:35: 80:d6:67:5f:a2:2e:32:95:74:2f:ce:0c:8e:e4:78:db: b5:ef:ec:fc:6e:31:e2:31:c0:4b:8b:20:f8:51:f5:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:ef:d2:bd:2b:7c:2f:ba:8e:d7:8e:47:2b:57:7b:6c: e7:a6:36:5d:cf:22:f4:ba:63:6c:c1:56:8e:fc:7e:0a: 25:40:38:a1:45:01:db:4f:cc:df:b6:99:38:17:59:9a: 01:bb:01:c5:1b:6a:5c:02:20:dd:88:b8:19:ec:76:fc: 6d:3b:fb:66:8b:b1:a2:ac:32:37:b5:c8:62:cc:79:a9: 29:38:fd:fd:1f:50:6f:52:8d:f7:94:d8:31:74:72:44: 3b:da:46:df:63:61:d1:4c:38:6e:cd:a9:b4:cf:e3:40: c9:e6:d9:3a:47:8c:3a:65:80:1c:da:23:7c:5b:ef:af: fc:21:b7:1d:c0:34:7f:8b:74:c6:ce:2f:93:88:b4:cf: ee:16:82:28:f3:65:6b:23:7e:bb:db:1d:3d:67:f2:c8: da:1a:ce:c6:64:cc:66:4c:c4:a7:c2:57:8c:0c:7d:25: 1d:e8:e9:4f:b3:1d:9c:45:a0:9f:6a:77:4f:5e:ea:bc: 3a:da:21:f7:4a:cd:b0:16:8e:9f:0d:7b:ba:39:63:67: 0b:13:03:cb:f8:a9:53:00:51:e0:fe:ec:fe:40:d2:10: 00:4b:fa:6c:9b:d8:a9:28:fe:69:3c:92:8a:11:ca:83: 12:34:33:2c:f1:bf:e4:5f:7f:0f:b4:be:aa:cb:f7:69 Fingerprint (SHA-256): B6:CB:53:5B:49:0E:F2:DE:31:0A:8D:EB:05:99:5A:E0:61:CF:8C:09:86:E9:65:A0:5D:7E:EC:5C:A7:4D:50:F9 Fingerprint (SHA1): 02:40:F4:42:D4:8A:8B:17:48:D3:BE:6D:8B:6C:00:C3:EA:7D:1A:79 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8519: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8520: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8521: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8522: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172610 (0x13bd4b02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 18:07:15 2017 Not After : Thu Mar 31 18:07:15 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c8:70:e2:53:cb:7d:a7:a7:af:29:89:96:b2:17:54: e0:d3:71:de:c5:aa:f6:f9:6e:84:85:ea:ea:e4:3e:2c: 4e:c7:b5:46:c6:b6:cc:df:7f:b9:b2:20:84:8e:c0:ef: 73:1b:8a:ce:2f:1f:78:7c:f2:f1:ed:7e:eb:93:c3:f2: 2e:3b:65:09:5f:27:1b:c6:2c:8f:b6:7c:ca:a6:f1:8c: a2:b8:d3:e5:03:3c:27:13:e5:77:bd:7d:f2:47:11:da: 8a:71:d2:84:1a:7c:4a:92:71:77:85:6b:2d:8d:d6:aa: d1:30:72:d6:16:4e:51:86:3e:eb:4c:0b:ce:30:c1:86: 82:9d:a1:6c:51:23:28:b6:9e:0e:5a:b4:75:d6:0a:96: 8f:7e:8c:3e:a8:3f:fe:37:87:8f:96:b0:45:42:fe:fb: 43:a9:1a:f9:91:d6:92:3f:1c:9b:c4:3c:99:c9:27:68: c2:13:84:73:a1:a2:7d:7a:85:13:4e:f7:23:fb:f0:f4: 1e:28:8f:e9:c9:d5:25:a7:aa:a9:0c:be:51:c5:f4:bf: ed:bd:54:fb:4d:cc:83:42:a1:a8:1a:56:42:9e:63:35: 80:d6:67:5f:a2:2e:32:95:74:2f:ce:0c:8e:e4:78:db: b5:ef:ec:fc:6e:31:e2:31:c0:4b:8b:20:f8:51:f5:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:ef:d2:bd:2b:7c:2f:ba:8e:d7:8e:47:2b:57:7b:6c: e7:a6:36:5d:cf:22:f4:ba:63:6c:c1:56:8e:fc:7e:0a: 25:40:38:a1:45:01:db:4f:cc:df:b6:99:38:17:59:9a: 01:bb:01:c5:1b:6a:5c:02:20:dd:88:b8:19:ec:76:fc: 6d:3b:fb:66:8b:b1:a2:ac:32:37:b5:c8:62:cc:79:a9: 29:38:fd:fd:1f:50:6f:52:8d:f7:94:d8:31:74:72:44: 3b:da:46:df:63:61:d1:4c:38:6e:cd:a9:b4:cf:e3:40: c9:e6:d9:3a:47:8c:3a:65:80:1c:da:23:7c:5b:ef:af: fc:21:b7:1d:c0:34:7f:8b:74:c6:ce:2f:93:88:b4:cf: ee:16:82:28:f3:65:6b:23:7e:bb:db:1d:3d:67:f2:c8: da:1a:ce:c6:64:cc:66:4c:c4:a7:c2:57:8c:0c:7d:25: 1d:e8:e9:4f:b3:1d:9c:45:a0:9f:6a:77:4f:5e:ea:bc: 3a:da:21:f7:4a:cd:b0:16:8e:9f:0d:7b:ba:39:63:67: 0b:13:03:cb:f8:a9:53:00:51:e0:fe:ec:fe:40:d2:10: 00:4b:fa:6c:9b:d8:a9:28:fe:69:3c:92:8a:11:ca:83: 12:34:33:2c:f1:bf:e4:5f:7f:0f:b4:be:aa:cb:f7:69 Fingerprint (SHA-256): B6:CB:53:5B:49:0E:F2:DE:31:0A:8D:EB:05:99:5A:E0:61:CF:8C:09:86:E9:65:A0:5D:7E:EC:5C:A7:4D:50:F9 Fingerprint (SHA1): 02:40:F4:42:D4:8A:8B:17:48:D3:BE:6D:8B:6C:00:C3:EA:7D:1A:79 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8523: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172610 (0x13bd4b02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 18:07:15 2017 Not After : Thu Mar 31 18:07:15 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c8:70:e2:53:cb:7d:a7:a7:af:29:89:96:b2:17:54: e0:d3:71:de:c5:aa:f6:f9:6e:84:85:ea:ea:e4:3e:2c: 4e:c7:b5:46:c6:b6:cc:df:7f:b9:b2:20:84:8e:c0:ef: 73:1b:8a:ce:2f:1f:78:7c:f2:f1:ed:7e:eb:93:c3:f2: 2e:3b:65:09:5f:27:1b:c6:2c:8f:b6:7c:ca:a6:f1:8c: a2:b8:d3:e5:03:3c:27:13:e5:77:bd:7d:f2:47:11:da: 8a:71:d2:84:1a:7c:4a:92:71:77:85:6b:2d:8d:d6:aa: d1:30:72:d6:16:4e:51:86:3e:eb:4c:0b:ce:30:c1:86: 82:9d:a1:6c:51:23:28:b6:9e:0e:5a:b4:75:d6:0a:96: 8f:7e:8c:3e:a8:3f:fe:37:87:8f:96:b0:45:42:fe:fb: 43:a9:1a:f9:91:d6:92:3f:1c:9b:c4:3c:99:c9:27:68: c2:13:84:73:a1:a2:7d:7a:85:13:4e:f7:23:fb:f0:f4: 1e:28:8f:e9:c9:d5:25:a7:aa:a9:0c:be:51:c5:f4:bf: ed:bd:54:fb:4d:cc:83:42:a1:a8:1a:56:42:9e:63:35: 80:d6:67:5f:a2:2e:32:95:74:2f:ce:0c:8e:e4:78:db: b5:ef:ec:fc:6e:31:e2:31:c0:4b:8b:20:f8:51:f5:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:ef:d2:bd:2b:7c:2f:ba:8e:d7:8e:47:2b:57:7b:6c: e7:a6:36:5d:cf:22:f4:ba:63:6c:c1:56:8e:fc:7e:0a: 25:40:38:a1:45:01:db:4f:cc:df:b6:99:38:17:59:9a: 01:bb:01:c5:1b:6a:5c:02:20:dd:88:b8:19:ec:76:fc: 6d:3b:fb:66:8b:b1:a2:ac:32:37:b5:c8:62:cc:79:a9: 29:38:fd:fd:1f:50:6f:52:8d:f7:94:d8:31:74:72:44: 3b:da:46:df:63:61:d1:4c:38:6e:cd:a9:b4:cf:e3:40: c9:e6:d9:3a:47:8c:3a:65:80:1c:da:23:7c:5b:ef:af: fc:21:b7:1d:c0:34:7f:8b:74:c6:ce:2f:93:88:b4:cf: ee:16:82:28:f3:65:6b:23:7e:bb:db:1d:3d:67:f2:c8: da:1a:ce:c6:64:cc:66:4c:c4:a7:c2:57:8c:0c:7d:25: 1d:e8:e9:4f:b3:1d:9c:45:a0:9f:6a:77:4f:5e:ea:bc: 3a:da:21:f7:4a:cd:b0:16:8e:9f:0d:7b:ba:39:63:67: 0b:13:03:cb:f8:a9:53:00:51:e0:fe:ec:fe:40:d2:10: 00:4b:fa:6c:9b:d8:a9:28:fe:69:3c:92:8a:11:ca:83: 12:34:33:2c:f1:bf:e4:5f:7f:0f:b4:be:aa:cb:f7:69 Fingerprint (SHA-256): B6:CB:53:5B:49:0E:F2:DE:31:0A:8D:EB:05:99:5A:E0:61:CF:8C:09:86:E9:65:A0:5D:7E:EC:5C:A7:4D:50:F9 Fingerprint (SHA1): 02:40:F4:42:D4:8A:8B:17:48:D3:BE:6D:8B:6C:00:C3:EA:7D:1A:79 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #8524: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172610 (0x13bd4b02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 18:07:15 2017 Not After : Thu Mar 31 18:07:15 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c8:70:e2:53:cb:7d:a7:a7:af:29:89:96:b2:17:54: e0:d3:71:de:c5:aa:f6:f9:6e:84:85:ea:ea:e4:3e:2c: 4e:c7:b5:46:c6:b6:cc:df:7f:b9:b2:20:84:8e:c0:ef: 73:1b:8a:ce:2f:1f:78:7c:f2:f1:ed:7e:eb:93:c3:f2: 2e:3b:65:09:5f:27:1b:c6:2c:8f:b6:7c:ca:a6:f1:8c: a2:b8:d3:e5:03:3c:27:13:e5:77:bd:7d:f2:47:11:da: 8a:71:d2:84:1a:7c:4a:92:71:77:85:6b:2d:8d:d6:aa: d1:30:72:d6:16:4e:51:86:3e:eb:4c:0b:ce:30:c1:86: 82:9d:a1:6c:51:23:28:b6:9e:0e:5a:b4:75:d6:0a:96: 8f:7e:8c:3e:a8:3f:fe:37:87:8f:96:b0:45:42:fe:fb: 43:a9:1a:f9:91:d6:92:3f:1c:9b:c4:3c:99:c9:27:68: c2:13:84:73:a1:a2:7d:7a:85:13:4e:f7:23:fb:f0:f4: 1e:28:8f:e9:c9:d5:25:a7:aa:a9:0c:be:51:c5:f4:bf: ed:bd:54:fb:4d:cc:83:42:a1:a8:1a:56:42:9e:63:35: 80:d6:67:5f:a2:2e:32:95:74:2f:ce:0c:8e:e4:78:db: b5:ef:ec:fc:6e:31:e2:31:c0:4b:8b:20:f8:51:f5:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:ef:d2:bd:2b:7c:2f:ba:8e:d7:8e:47:2b:57:7b:6c: e7:a6:36:5d:cf:22:f4:ba:63:6c:c1:56:8e:fc:7e:0a: 25:40:38:a1:45:01:db:4f:cc:df:b6:99:38:17:59:9a: 01:bb:01:c5:1b:6a:5c:02:20:dd:88:b8:19:ec:76:fc: 6d:3b:fb:66:8b:b1:a2:ac:32:37:b5:c8:62:cc:79:a9: 29:38:fd:fd:1f:50:6f:52:8d:f7:94:d8:31:74:72:44: 3b:da:46:df:63:61:d1:4c:38:6e:cd:a9:b4:cf:e3:40: c9:e6:d9:3a:47:8c:3a:65:80:1c:da:23:7c:5b:ef:af: fc:21:b7:1d:c0:34:7f:8b:74:c6:ce:2f:93:88:b4:cf: ee:16:82:28:f3:65:6b:23:7e:bb:db:1d:3d:67:f2:c8: da:1a:ce:c6:64:cc:66:4c:c4:a7:c2:57:8c:0c:7d:25: 1d:e8:e9:4f:b3:1d:9c:45:a0:9f:6a:77:4f:5e:ea:bc: 3a:da:21:f7:4a:cd:b0:16:8e:9f:0d:7b:ba:39:63:67: 0b:13:03:cb:f8:a9:53:00:51:e0:fe:ec:fe:40:d2:10: 00:4b:fa:6c:9b:d8:a9:28:fe:69:3c:92:8a:11:ca:83: 12:34:33:2c:f1:bf:e4:5f:7f:0f:b4:be:aa:cb:f7:69 Fingerprint (SHA-256): B6:CB:53:5B:49:0E:F2:DE:31:0A:8D:EB:05:99:5A:E0:61:CF:8C:09:86:E9:65:A0:5D:7E:EC:5C:A7:4D:50:F9 Fingerprint (SHA1): 02:40:F4:42:D4:8A:8B:17:48:D3:BE:6D:8B:6C:00:C3:EA:7D:1A:79 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #8525: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172610 (0x13bd4b02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 18:07:15 2017 Not After : Thu Mar 31 18:07:15 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c8:70:e2:53:cb:7d:a7:a7:af:29:89:96:b2:17:54: e0:d3:71:de:c5:aa:f6:f9:6e:84:85:ea:ea:e4:3e:2c: 4e:c7:b5:46:c6:b6:cc:df:7f:b9:b2:20:84:8e:c0:ef: 73:1b:8a:ce:2f:1f:78:7c:f2:f1:ed:7e:eb:93:c3:f2: 2e:3b:65:09:5f:27:1b:c6:2c:8f:b6:7c:ca:a6:f1:8c: a2:b8:d3:e5:03:3c:27:13:e5:77:bd:7d:f2:47:11:da: 8a:71:d2:84:1a:7c:4a:92:71:77:85:6b:2d:8d:d6:aa: d1:30:72:d6:16:4e:51:86:3e:eb:4c:0b:ce:30:c1:86: 82:9d:a1:6c:51:23:28:b6:9e:0e:5a:b4:75:d6:0a:96: 8f:7e:8c:3e:a8:3f:fe:37:87:8f:96:b0:45:42:fe:fb: 43:a9:1a:f9:91:d6:92:3f:1c:9b:c4:3c:99:c9:27:68: c2:13:84:73:a1:a2:7d:7a:85:13:4e:f7:23:fb:f0:f4: 1e:28:8f:e9:c9:d5:25:a7:aa:a9:0c:be:51:c5:f4:bf: ed:bd:54:fb:4d:cc:83:42:a1:a8:1a:56:42:9e:63:35: 80:d6:67:5f:a2:2e:32:95:74:2f:ce:0c:8e:e4:78:db: b5:ef:ec:fc:6e:31:e2:31:c0:4b:8b:20:f8:51:f5:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:ef:d2:bd:2b:7c:2f:ba:8e:d7:8e:47:2b:57:7b:6c: e7:a6:36:5d:cf:22:f4:ba:63:6c:c1:56:8e:fc:7e:0a: 25:40:38:a1:45:01:db:4f:cc:df:b6:99:38:17:59:9a: 01:bb:01:c5:1b:6a:5c:02:20:dd:88:b8:19:ec:76:fc: 6d:3b:fb:66:8b:b1:a2:ac:32:37:b5:c8:62:cc:79:a9: 29:38:fd:fd:1f:50:6f:52:8d:f7:94:d8:31:74:72:44: 3b:da:46:df:63:61:d1:4c:38:6e:cd:a9:b4:cf:e3:40: c9:e6:d9:3a:47:8c:3a:65:80:1c:da:23:7c:5b:ef:af: fc:21:b7:1d:c0:34:7f:8b:74:c6:ce:2f:93:88:b4:cf: ee:16:82:28:f3:65:6b:23:7e:bb:db:1d:3d:67:f2:c8: da:1a:ce:c6:64:cc:66:4c:c4:a7:c2:57:8c:0c:7d:25: 1d:e8:e9:4f:b3:1d:9c:45:a0:9f:6a:77:4f:5e:ea:bc: 3a:da:21:f7:4a:cd:b0:16:8e:9f:0d:7b:ba:39:63:67: 0b:13:03:cb:f8:a9:53:00:51:e0:fe:ec:fe:40:d2:10: 00:4b:fa:6c:9b:d8:a9:28:fe:69:3c:92:8a:11:ca:83: 12:34:33:2c:f1:bf:e4:5f:7f:0f:b4:be:aa:cb:f7:69 Fingerprint (SHA-256): B6:CB:53:5B:49:0E:F2:DE:31:0A:8D:EB:05:99:5A:E0:61:CF:8C:09:86:E9:65:A0:5D:7E:EC:5C:A7:4D:50:F9 Fingerprint (SHA1): 02:40:F4:42:D4:8A:8B:17:48:D3:BE:6D:8B:6C:00:C3:EA:7D:1A:79 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #8526: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172610 (0x13bd4b02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 18:07:15 2017 Not After : Thu Mar 31 18:07:15 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c8:70:e2:53:cb:7d:a7:a7:af:29:89:96:b2:17:54: e0:d3:71:de:c5:aa:f6:f9:6e:84:85:ea:ea:e4:3e:2c: 4e:c7:b5:46:c6:b6:cc:df:7f:b9:b2:20:84:8e:c0:ef: 73:1b:8a:ce:2f:1f:78:7c:f2:f1:ed:7e:eb:93:c3:f2: 2e:3b:65:09:5f:27:1b:c6:2c:8f:b6:7c:ca:a6:f1:8c: a2:b8:d3:e5:03:3c:27:13:e5:77:bd:7d:f2:47:11:da: 8a:71:d2:84:1a:7c:4a:92:71:77:85:6b:2d:8d:d6:aa: d1:30:72:d6:16:4e:51:86:3e:eb:4c:0b:ce:30:c1:86: 82:9d:a1:6c:51:23:28:b6:9e:0e:5a:b4:75:d6:0a:96: 8f:7e:8c:3e:a8:3f:fe:37:87:8f:96:b0:45:42:fe:fb: 43:a9:1a:f9:91:d6:92:3f:1c:9b:c4:3c:99:c9:27:68: c2:13:84:73:a1:a2:7d:7a:85:13:4e:f7:23:fb:f0:f4: 1e:28:8f:e9:c9:d5:25:a7:aa:a9:0c:be:51:c5:f4:bf: ed:bd:54:fb:4d:cc:83:42:a1:a8:1a:56:42:9e:63:35: 80:d6:67:5f:a2:2e:32:95:74:2f:ce:0c:8e:e4:78:db: b5:ef:ec:fc:6e:31:e2:31:c0:4b:8b:20:f8:51:f5:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:ef:d2:bd:2b:7c:2f:ba:8e:d7:8e:47:2b:57:7b:6c: e7:a6:36:5d:cf:22:f4:ba:63:6c:c1:56:8e:fc:7e:0a: 25:40:38:a1:45:01:db:4f:cc:df:b6:99:38:17:59:9a: 01:bb:01:c5:1b:6a:5c:02:20:dd:88:b8:19:ec:76:fc: 6d:3b:fb:66:8b:b1:a2:ac:32:37:b5:c8:62:cc:79:a9: 29:38:fd:fd:1f:50:6f:52:8d:f7:94:d8:31:74:72:44: 3b:da:46:df:63:61:d1:4c:38:6e:cd:a9:b4:cf:e3:40: c9:e6:d9:3a:47:8c:3a:65:80:1c:da:23:7c:5b:ef:af: fc:21:b7:1d:c0:34:7f:8b:74:c6:ce:2f:93:88:b4:cf: ee:16:82:28:f3:65:6b:23:7e:bb:db:1d:3d:67:f2:c8: da:1a:ce:c6:64:cc:66:4c:c4:a7:c2:57:8c:0c:7d:25: 1d:e8:e9:4f:b3:1d:9c:45:a0:9f:6a:77:4f:5e:ea:bc: 3a:da:21:f7:4a:cd:b0:16:8e:9f:0d:7b:ba:39:63:67: 0b:13:03:cb:f8:a9:53:00:51:e0:fe:ec:fe:40:d2:10: 00:4b:fa:6c:9b:d8:a9:28:fe:69:3c:92:8a:11:ca:83: 12:34:33:2c:f1:bf:e4:5f:7f:0f:b4:be:aa:cb:f7:69 Fingerprint (SHA-256): B6:CB:53:5B:49:0E:F2:DE:31:0A:8D:EB:05:99:5A:E0:61:CF:8C:09:86:E9:65:A0:5D:7E:EC:5C:A7:4D:50:F9 Fingerprint (SHA1): 02:40:F4:42:D4:8A:8B:17:48:D3:BE:6D:8B:6C:00:C3:EA:7D:1A:79 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #8527: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172610 (0x13bd4b02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 18:07:15 2017 Not After : Thu Mar 31 18:07:15 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c8:70:e2:53:cb:7d:a7:a7:af:29:89:96:b2:17:54: e0:d3:71:de:c5:aa:f6:f9:6e:84:85:ea:ea:e4:3e:2c: 4e:c7:b5:46:c6:b6:cc:df:7f:b9:b2:20:84:8e:c0:ef: 73:1b:8a:ce:2f:1f:78:7c:f2:f1:ed:7e:eb:93:c3:f2: 2e:3b:65:09:5f:27:1b:c6:2c:8f:b6:7c:ca:a6:f1:8c: a2:b8:d3:e5:03:3c:27:13:e5:77:bd:7d:f2:47:11:da: 8a:71:d2:84:1a:7c:4a:92:71:77:85:6b:2d:8d:d6:aa: d1:30:72:d6:16:4e:51:86:3e:eb:4c:0b:ce:30:c1:86: 82:9d:a1:6c:51:23:28:b6:9e:0e:5a:b4:75:d6:0a:96: 8f:7e:8c:3e:a8:3f:fe:37:87:8f:96:b0:45:42:fe:fb: 43:a9:1a:f9:91:d6:92:3f:1c:9b:c4:3c:99:c9:27:68: c2:13:84:73:a1:a2:7d:7a:85:13:4e:f7:23:fb:f0:f4: 1e:28:8f:e9:c9:d5:25:a7:aa:a9:0c:be:51:c5:f4:bf: ed:bd:54:fb:4d:cc:83:42:a1:a8:1a:56:42:9e:63:35: 80:d6:67:5f:a2:2e:32:95:74:2f:ce:0c:8e:e4:78:db: b5:ef:ec:fc:6e:31:e2:31:c0:4b:8b:20:f8:51:f5:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:ef:d2:bd:2b:7c:2f:ba:8e:d7:8e:47:2b:57:7b:6c: e7:a6:36:5d:cf:22:f4:ba:63:6c:c1:56:8e:fc:7e:0a: 25:40:38:a1:45:01:db:4f:cc:df:b6:99:38:17:59:9a: 01:bb:01:c5:1b:6a:5c:02:20:dd:88:b8:19:ec:76:fc: 6d:3b:fb:66:8b:b1:a2:ac:32:37:b5:c8:62:cc:79:a9: 29:38:fd:fd:1f:50:6f:52:8d:f7:94:d8:31:74:72:44: 3b:da:46:df:63:61:d1:4c:38:6e:cd:a9:b4:cf:e3:40: c9:e6:d9:3a:47:8c:3a:65:80:1c:da:23:7c:5b:ef:af: fc:21:b7:1d:c0:34:7f:8b:74:c6:ce:2f:93:88:b4:cf: ee:16:82:28:f3:65:6b:23:7e:bb:db:1d:3d:67:f2:c8: da:1a:ce:c6:64:cc:66:4c:c4:a7:c2:57:8c:0c:7d:25: 1d:e8:e9:4f:b3:1d:9c:45:a0:9f:6a:77:4f:5e:ea:bc: 3a:da:21:f7:4a:cd:b0:16:8e:9f:0d:7b:ba:39:63:67: 0b:13:03:cb:f8:a9:53:00:51:e0:fe:ec:fe:40:d2:10: 00:4b:fa:6c:9b:d8:a9:28:fe:69:3c:92:8a:11:ca:83: 12:34:33:2c:f1:bf:e4:5f:7f:0f:b4:be:aa:cb:f7:69 Fingerprint (SHA-256): B6:CB:53:5B:49:0E:F2:DE:31:0A:8D:EB:05:99:5A:E0:61:CF:8C:09:86:E9:65:A0:5D:7E:EC:5C:A7:4D:50:F9 Fingerprint (SHA1): 02:40:F4:42:D4:8A:8B:17:48:D3:BE:6D:8B:6C:00:C3:EA:7D:1A:79 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #8528: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8529: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8530: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172640 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8531: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8532: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #8533: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8534: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 331172641 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8535: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8536: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #8537: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8538: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 331172642 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8539: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8540: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #8541: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8542: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 331172643 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8543: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8544: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #8545: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8546: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 331172644 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8547: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8548: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #8549: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8550: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 331172645 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8551: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8552: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #8553: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8554: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 331172646 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8555: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8556: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8557: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172640 (0x13bd4b20) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:13:31 2017 Not After : Thu Mar 31 18:13:31 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:60:2f:4f:77:3c:4c:4b:62:c0:71:25:25:24:3c:50: b0:b8:13:b2:3d:39:4e:3c:4b:45:bf:de:fc:3e:53:b1: 23:48:c8:e5:3d:3b:7b:20:10:6c:8e:3a:31:93:64:41: c9:ed:c7:b1:e0:f7:c2:d8:b9:40:ef:fb:3e:46:24:8c: 74:cd:11:97:7f:46:66:60:fc:fa:83:ca:d3:dd:10:cc: b9:19:61:22:11:24:be:5b:c4:93:82:ee:95:39:8e:cb: 83:f7:49:d4:d0:71:ea:7c:84:c2:35:32:a7:0e:f9:af: 31:e6:6c:c9:4e:dc:9f:54:9f:b4:29:02:d0:52:df:d6: e6:95:3a:93:55:f4:7b:2d:00:11:5f:31:d4:65:fa:92: 0a:84:f5:8d:29:d9:a3:eb:7f:07:21:89:32:07:03:42: 58:e3:20:a1:b8:d7:51:dc:04:fd:fa:3d:0f:98:de:5b: 67:8c:0c:53:c0:db:fa:e7:cb:5c:ab:73:a5:45:e8:50: bf:c6:d1:9f:c0:bc:64:d9:79:cc:0f:ea:c6:d2:39:71: e2:7e:2f:fa:6c:53:71:7e:df:00:e7:ee:3a:c5:ed:15: 34:79:13:c5:d9:1b:3d:8e:f7:86:10:1b:2c:c8:3c:b7: cb:b9:6b:f8:88:d7:b0:e1:50:53:3d:9e:b3:11:e2:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 21:e2:5e:d7:27:f6:61:71:4a:c7:a9:d7:ee:67:07:48: 2e:e7:16:b9:05:96:2e:ab:35:11:bf:80:c7:32:ca:db: 74:92:48:ca:8d:55:9f:58:91:ab:7c:13:dc:31:ea:64: da:e8:11:55:15:a4:bd:fc:5e:77:9c:e9:83:b6:7a:15: 3c:4f:e6:c9:e6:c4:f7:10:3b:e8:4a:3c:0d:e8:c9:63: 66:4a:77:b1:f4:44:b4:29:a9:ca:38:08:77:da:0f:92: ed:64:08:66:1e:3f:65:33:d7:f9:89:a2:54:3a:2c:cf: 33:f8:cb:85:00:7d:13:71:c5:42:91:16:a5:77:f2:fd: c0:cf:76:0f:9e:90:cb:d2:f4:ef:de:b6:2e:3e:85:38: fb:da:01:59:2a:ba:bd:58:9d:be:26:54:97:ba:0a:9f: e5:22:e4:22:7f:ea:52:6d:c8:8f:42:d2:ca:1c:d9:2e: a9:5b:f5:ca:30:9c:20:18:a8:d5:8d:75:1c:e5:f0:09: 33:4e:c7:95:e6:f5:f5:15:ec:5e:f4:dd:b7:c3:a0:9a: f9:bd:80:e3:0d:2d:58:c1:9e:13:7c:a3:80:aa:c0:f8: 08:0e:a9:cf:06:ed:4f:a3:cd:c5:04:3d:e5:0d:11:30: 39:2b:68:cc:74:5b:d6:b6:19:4b:2c:93:93:5a:34:ed Fingerprint (SHA-256): 75:35:38:EF:0B:86:1A:A3:55:95:FD:50:3A:26:2F:E4:5F:0D:01:9B:1B:AE:E6:58:D1:19:7B:AA:B3:1B:EB:92 Fingerprint (SHA1): 4E:37:53:89:CF:68:19:6C:08:FA:B5:2C:6B:E0:47:0D:92:64:2F:81 Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #8558: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8559: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8560: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #8561: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172640 (0x13bd4b20) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:13:31 2017 Not After : Thu Mar 31 18:13:31 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:60:2f:4f:77:3c:4c:4b:62:c0:71:25:25:24:3c:50: b0:b8:13:b2:3d:39:4e:3c:4b:45:bf:de:fc:3e:53:b1: 23:48:c8:e5:3d:3b:7b:20:10:6c:8e:3a:31:93:64:41: c9:ed:c7:b1:e0:f7:c2:d8:b9:40:ef:fb:3e:46:24:8c: 74:cd:11:97:7f:46:66:60:fc:fa:83:ca:d3:dd:10:cc: b9:19:61:22:11:24:be:5b:c4:93:82:ee:95:39:8e:cb: 83:f7:49:d4:d0:71:ea:7c:84:c2:35:32:a7:0e:f9:af: 31:e6:6c:c9:4e:dc:9f:54:9f:b4:29:02:d0:52:df:d6: e6:95:3a:93:55:f4:7b:2d:00:11:5f:31:d4:65:fa:92: 0a:84:f5:8d:29:d9:a3:eb:7f:07:21:89:32:07:03:42: 58:e3:20:a1:b8:d7:51:dc:04:fd:fa:3d:0f:98:de:5b: 67:8c:0c:53:c0:db:fa:e7:cb:5c:ab:73:a5:45:e8:50: bf:c6:d1:9f:c0:bc:64:d9:79:cc:0f:ea:c6:d2:39:71: e2:7e:2f:fa:6c:53:71:7e:df:00:e7:ee:3a:c5:ed:15: 34:79:13:c5:d9:1b:3d:8e:f7:86:10:1b:2c:c8:3c:b7: cb:b9:6b:f8:88:d7:b0:e1:50:53:3d:9e:b3:11:e2:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 21:e2:5e:d7:27:f6:61:71:4a:c7:a9:d7:ee:67:07:48: 2e:e7:16:b9:05:96:2e:ab:35:11:bf:80:c7:32:ca:db: 74:92:48:ca:8d:55:9f:58:91:ab:7c:13:dc:31:ea:64: da:e8:11:55:15:a4:bd:fc:5e:77:9c:e9:83:b6:7a:15: 3c:4f:e6:c9:e6:c4:f7:10:3b:e8:4a:3c:0d:e8:c9:63: 66:4a:77:b1:f4:44:b4:29:a9:ca:38:08:77:da:0f:92: ed:64:08:66:1e:3f:65:33:d7:f9:89:a2:54:3a:2c:cf: 33:f8:cb:85:00:7d:13:71:c5:42:91:16:a5:77:f2:fd: c0:cf:76:0f:9e:90:cb:d2:f4:ef:de:b6:2e:3e:85:38: fb:da:01:59:2a:ba:bd:58:9d:be:26:54:97:ba:0a:9f: e5:22:e4:22:7f:ea:52:6d:c8:8f:42:d2:ca:1c:d9:2e: a9:5b:f5:ca:30:9c:20:18:a8:d5:8d:75:1c:e5:f0:09: 33:4e:c7:95:e6:f5:f5:15:ec:5e:f4:dd:b7:c3:a0:9a: f9:bd:80:e3:0d:2d:58:c1:9e:13:7c:a3:80:aa:c0:f8: 08:0e:a9:cf:06:ed:4f:a3:cd:c5:04:3d:e5:0d:11:30: 39:2b:68:cc:74:5b:d6:b6:19:4b:2c:93:93:5a:34:ed Fingerprint (SHA-256): 75:35:38:EF:0B:86:1A:A3:55:95:FD:50:3A:26:2F:E4:5F:0D:01:9B:1B:AE:E6:58:D1:19:7B:AA:B3:1B:EB:92 Fingerprint (SHA1): 4E:37:53:89:CF:68:19:6C:08:FA:B5:2C:6B:E0:47:0D:92:64:2F:81 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #8562: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8563: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8564: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8565: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172647 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8566: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8567: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8568: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8569: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331172648 --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #8570: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8571: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8572: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8573: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331172649 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8574: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8575: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #8576: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8577: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 331172650 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8578: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8579: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8580: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #8581: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #8582: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #8583: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172647 (0x13bd4b27) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:15:10 2017 Not After : Thu Mar 31 18:15:10 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:99:1a:fb:19:7c:10:30:08:da:2e:3a:42:69:27:62: 35:66:04:cf:32:03:07:ee:ad:92:41:35:b7:33:f3:e0: 78:2b:0a:80:9f:37:76:f5:7a:62:e4:46:e0:f4:10:e1: ff:3e:0c:47:8b:38:e6:28:e8:84:eb:5d:c9:7d:06:bf: 71:47:6a:fd:80:7a:2a:6d:7d:89:88:35:09:1a:4e:47: a4:23:b4:83:2b:1a:a0:5f:60:45:54:c3:1e:28:41:51: 38:24:d9:c8:3e:08:96:85:66:1d:bc:ee:3d:56:b0:12: 69:d8:bb:68:16:f1:a7:b7:78:59:f8:41:68:e1:6e:ba: 2d:9b:73:7e:7e:2f:39:06:86:63:aa:94:c6:7e:6f:76: 4c:59:4f:47:dc:4e:91:f1:5f:dc:f1:c8:45:95:ea:a4: ac:5e:9e:3f:e7:40:62:ff:0f:b8:1b:c8:54:bc:01:32: 8e:50:cc:20:8a:b2:86:f4:99:04:ea:54:01:d3:be:b4: d2:fd:63:d5:66:d1:d2:6b:ae:d7:09:3a:42:f3:89:37: 99:49:93:ac:20:72:e6:b6:6a:74:c7:de:44:aa:89:81: 12:d5:a2:85:e0:0c:a1:e0:47:e8:f7:79:9a:cf:6e:f1: 3b:69:ce:6f:59:43:60:dd:80:be:91:7a:a8:74:fd:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:33:74:76:e4:5d:08:aa:1a:86:9d:82:dc:7d:13:21: 82:e0:be:83:27:b1:7a:a3:d2:7c:c0:fd:9b:77:4d:83: 41:4c:e9:d0:cc:a4:0e:38:05:06:f2:56:a6:20:1f:07: 3c:63:ec:eb:ef:85:8c:c3:15:df:66:a7:5e:7e:4a:37: 6b:fa:a2:9d:7a:42:78:28:b6:57:55:ef:b1:14:2a:b2: e3:84:47:33:0f:d0:73:6e:9e:18:41:c0:07:35:a6:31: 6c:c3:e0:fe:79:c2:31:4b:22:8f:1a:9c:db:bf:0e:eb: 5f:8c:95:6b:99:5d:c1:dc:88:85:1e:e0:3f:01:a8:bf: ab:44:7f:7a:88:52:38:15:c2:a0:cd:db:a1:da:0e:32: f9:49:f5:cd:59:47:2f:62:2f:9c:ed:67:a6:5b:13:f6: eb:84:26:6f:f7:55:8b:fb:81:c1:03:43:e4:ad:18:0f: 2e:5c:53:f7:bb:ad:d7:b0:4a:b1:db:11:eb:72:28:e2: 44:cd:da:6e:10:10:4f:ec:9d:18:d4:f5:5f:99:68:13: 19:29:dd:e0:ec:02:1b:40:a9:87:c3:db:d0:49:25:8f: df:b9:f8:39:9c:ff:5d:ea:d0:e1:58:64:85:eb:d2:40: 40:93:9e:94:0e:c4:0e:16:c9:e0:e9:b3:f2:9b:7a:0c Fingerprint (SHA-256): 9A:81:83:F7:B6:03:FD:AA:C8:A6:39:9D:F2:C3:5E:ED:A0:57:4E:53:E1:D5:82:31:77:B0:72:D9:F6:6F:7E:11 Fingerprint (SHA1): 23:96:8F:20:68:0B:9A:28:B7:B9:2B:FE:D7:11:86:2E:D6:1A:5E:31 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8584: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8585: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8586: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172648 (0x13bd4b28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:15:17 2017 Not After : Thu Mar 31 18:15:17 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:d5:53:12:d1:a9:e0:3f:ab:9b:76:8a:8c:42:25:c1: 27:e3:b7:db:1f:3b:a7:79:12:42:40:3f:18:04:a4:db: 61:48:75:2f:35:a5:fe:5f:b9:39:76:f1:cb:b6:d3:f6: a8:ad:4e:94:1f:ac:54:ea:1a:b9:9c:72:d0:e8:bd:e8: 28:70:71:b6:01:b7:fa:32:d0:21:01:0f:48:b5:68:d1: e3:ab:07:d2:b9:14:60:00:4a:87:1f:ed:96:e9:37:a5: 6a:aa:0e:00:2a:f0:6b:04:73:13:df:6a:26:18:f4:a7: 6a:d3:53:3b:84:60:b5:c4:37:75:d1:ae:ce:ff:b0:22: ff:76:2d:08:cf:d5:98:f6:eb:89:9b:8e:57:a5:ee:e8: 96:35:d9:69:92:f3:ef:9d:81:16:b6:63:bc:38:a7:69: 06:23:59:40:e7:54:3f:29:5d:86:7a:10:96:13:65:e1: 2b:61:d1:75:9d:c7:79:b5:68:71:f8:f6:3b:ce:45:19: 6e:bd:6b:c6:b3:f6:bc:b6:6b:64:2f:0f:53:3b:6a:b3: ab:f4:fc:03:c0:50:ce:ea:8c:2b:ff:a2:c3:c4:00:ac: ab:f5:a3:c2:d3:82:e3:14:62:52:d8:57:f0:59:1b:7e: 47:56:e8:5c:98:59:d7:1f:7f:15:c8:b5:c8:96:f9:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:95:eb:b5:de:7f:41:27:3e:40:63:92:ac:89:b4:c0: 0c:9a:af:90:90:22:11:a1:d0:e4:ed:7d:15:b0:f3:af: 06:45:3f:14:f7:fe:8e:65:72:0a:31:44:ca:08:af:ed: 31:3d:6f:77:42:62:49:f6:d7:cb:76:28:a5:da:62:74: 27:38:e5:da:56:76:b4:e9:35:34:e9:3a:a4:24:74:c4: 9b:e7:bf:4a:dd:b2:28:09:65:3a:a3:ed:a1:e0:8e:ef: fa:a0:96:9b:30:96:ad:be:66:97:57:fd:13:9b:87:88: ba:fe:2a:45:c4:4b:1a:7e:da:41:04:43:d1:d0:a6:31: 41:36:79:5b:95:24:16:55:ea:15:2f:70:a8:ed:19:59: 49:3d:f7:ed:63:c0:b9:b1:cc:32:d3:c9:1f:b4:55:05: ae:64:62:14:05:da:85:0b:dc:15:e3:3a:6f:43:89:ab: 49:ee:f5:73:51:2d:ca:56:dc:9a:74:cc:cf:03:3a:f4: 62:5a:26:9c:5b:99:bd:8b:9e:a7:a5:6d:78:2d:0e:0f: 32:ea:26:d3:45:88:78:48:6c:da:86:ca:4b:4d:a5:d0: d9:bf:5b:61:bd:52:01:c3:92:b9:2e:7c:6d:3f:36:8c: 5b:9c:33:b8:de:ea:6a:9b:8f:69:b8:fe:1b:bc:6f:42 Fingerprint (SHA-256): 65:8A:BB:93:32:66:40:DD:13:AE:2C:87:24:7E:44:05:F3:9D:61:73:98:68:77:01:43:21:FE:64:C4:B5:F9:71 Fingerprint (SHA1): 33:33:01:21:F7:F3:72:90:4B:FB:B8:28:66:99:01:4E:18:93:C0:91 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8587: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8588: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172649 (0x13bd4b29) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 18:15:34 2017 Not After : Thu Mar 31 18:15:34 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:41:b9:57:7f:6f:52:04:77:31:5a:c8:0c:37:5c:90: 19:c3:84:4c:14:5f:80:10:c7:0e:7e:d6:91:0f:f3:8b: 6d:02:2d:83:6b:e8:e4:47:f9:0e:48:00:64:be:b1:f8: c7:ee:d5:1d:c9:ba:79:c2:45:23:c8:14:76:29:ad:6a: 05:0f:61:1f:9f:36:bf:23:f6:21:c2:c4:f1:fb:fb:65: d0:b8:7b:42:d1:4f:98:2c:f3:51:be:b4:80:db:73:0c: 48:36:e0:e5:89:0c:b1:00:99:e4:d3:3c:dc:80:a1:a7: 4a:f7:97:d9:df:83:12:76:c6:79:3a:2c:ae:90:42:3f: b1:6c:7b:dc:f5:b4:21:eb:5a:8a:b2:b5:8c:13:1f:ce: 4c:38:d1:e2:d7:fa:7e:f2:e8:2b:08:08:51:45:91:f8: b9:51:3d:3e:f4:48:25:1f:74:a2:82:ae:95:bb:8f:0a: 8e:be:a4:1a:54:f7:62:c0:46:b8:5a:d2:28:85:7e:5a: 88:a9:8f:5c:15:87:6b:c7:52:bc:d9:20:e8:86:23:81: 66:74:05:63:f2:6b:e0:bc:ae:0d:a8:cc:85:c2:46:34: 11:3d:27:61:28:2c:c5:61:f4:4b:c4:19:67:4c:b8:c7: f3:79:11:5d:b1:12:a4:33:7a:87:af:02:57:b0:c4:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:af:1a:80:ae:fd:e2:7f:b2:51:e6:0e:8f:5b:a2:9c: 91:2d:f0:5b:58:9c:84:8d:10:3d:14:a9:d5:23:12:89: 3c:c3:79:2b:47:d4:0a:35:7d:8a:3b:ea:d7:d6:db:42: 1b:82:c8:a5:d2:3f:59:a8:02:28:dd:af:9d:df:90:4b: fc:6c:ad:3c:f4:b5:9e:7d:12:01:cd:ce:24:0c:59:7b: 35:ba:50:73:ab:ef:b5:22:ae:98:c9:03:dc:f3:89:3b: 25:17:a8:12:da:bb:25:4b:a5:1c:e0:29:80:72:f3:6e: 44:16:bd:96:5e:70:3c:48:78:a2:73:ec:90:2f:90:e5: c7:b1:63:01:41:8a:92:7b:ad:bb:89:93:87:ae:b6:7f: e5:30:94:59:1b:a7:10:54:33:d4:71:48:35:4a:bf:de: 9d:34:0a:c5:bc:eb:6f:d5:4f:c3:b9:9a:0e:7c:89:cb: cb:a9:96:9f:ff:3d:d7:96:83:5a:c3:c8:c8:e4:6b:74: ec:73:73:39:a6:8e:2e:7a:65:8a:fa:32:78:9b:b6:7a: d0:da:f9:e1:29:c1:c9:ac:96:d2:7c:2d:09:96:de:1c: 43:f3:c1:a8:1c:ae:35:f8:77:b3:e7:f1:74:98:fb:53: ad:7b:5e:8d:78:10:3d:09:0b:b4:be:c8:ca:55:a3:ba Fingerprint (SHA-256): AA:C4:64:5D:7E:7D:CA:99:FD:F0:CB:B5:A2:BA:3E:4D:B3:8A:C9:30:90:27:AA:86:1F:1F:ED:E7:4F:D2:30:DC Fingerprint (SHA1): F0:7B:06:F5:FB:18:7C:10:E1:B7:8F:E5:DA:25:BA:96:52:E9:1B:F9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #8589: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8590: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172651 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8591: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8592: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8593: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8594: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331172652 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8595: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8596: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8597: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8598: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331172653 --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #8599: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8600: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #8601: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8602: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 331172654 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8603: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8604: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #8605: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8606: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 331172655 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8607: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8608: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8609: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #8610: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #8611: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #8612: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #8613: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172651 (0x13bd4b2b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:16:08 2017 Not After : Thu Mar 31 18:16:08 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:97:75:15:35:75:e2:e2:7d:e5:56:a9:d9:4d:75:7b: 0a:ca:03:17:c0:fb:17:fa:cd:b9:a0:eb:61:46:4a:35: 11:51:88:af:de:27:73:a7:a9:be:45:b4:0b:51:d3:b7: a6:70:ca:e4:f4:2c:94:b5:c9:e4:24:d7:f5:3a:2c:33: b4:dc:1b:82:79:3f:ce:e7:ee:fc:6d:32:c3:8d:aa:ec: d8:7c:88:18:53:52:1a:47:a1:d9:9f:1a:65:c9:30:be: 0f:fe:ba:d8:cf:4d:98:38:2c:7f:80:44:63:e8:29:6f: fe:9c:bd:f1:ac:46:cc:fa:65:59:ee:9f:ca:83:b4:97: 46:cd:24:ce:c8:3f:ae:27:af:f3:84:0c:3c:54:12:68: 70:e0:29:37:2d:e6:ae:f1:b7:b5:05:55:2a:0a:6b:bf: a9:5d:01:60:a5:a6:9b:8f:1d:17:9b:bc:3a:65:de:97: 3f:f0:78:4e:0e:80:2d:b1:5c:0d:cf:31:93:71:36:53: 22:66:83:e6:de:aa:cb:b5:6d:4a:91:ab:65:f2:4b:8f: 6b:a3:56:5e:72:53:9d:65:58:ee:23:bd:ec:2e:6f:80: 68:e2:4d:67:f9:21:06:8e:f0:27:78:3c:bf:30:9d:03: a9:e1:5e:8b:89:1c:ea:e6:04:ee:44:73:18:8d:08:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:94:b7:c2:43:fc:3c:d3:e8:28:53:bd:90:bf:ee:77: 8e:ba:9c:5e:7e:3a:cd:55:76:c3:02:7a:25:a4:df:21: ac:3d:a0:83:32:2d:ab:ff:d0:c2:e1:fd:c3:37:f9:f5: 00:a1:5b:c3:e7:d9:ef:da:87:dd:3e:d0:e7:e3:fb:cb: 7a:6c:af:d0:0b:0d:64:01:db:87:5b:69:c9:31:30:c3: 1c:39:ec:2a:b8:c8:21:77:9e:60:2f:da:f9:d6:70:4c: 5c:ea:c9:0b:a5:8b:e7:49:9d:29:36:1a:97:5f:b8:3b: 45:57:8c:ec:0a:93:43:a4:16:e9:85:ed:26:89:88:28: 2d:02:5b:bd:cf:99:26:7c:aa:ff:65:90:58:8d:fd:94: 75:36:49:fc:17:75:76:86:b1:68:72:6b:53:7d:5d:3a: 5c:d6:a5:45:9a:8f:d2:7d:bf:33:a1:a4:a6:8d:b7:62: 2d:bc:8d:85:3f:db:99:e1:e8:76:5d:f0:ff:d8:bb:17: 98:5f:dd:9a:67:ca:c1:ba:53:25:da:49:79:4c:ec:d7: 82:8c:44:33:88:16:08:b3:31:1b:39:87:ff:2f:43:36: 03:b9:2e:3d:ce:ea:6f:1f:66:37:62:9f:5c:40:8a:56: 93:4f:4b:13:67:b4:cb:56:f3:1f:36:e2:f0:68:68:57 Fingerprint (SHA-256): BA:D1:DD:D9:B7:4F:16:70:03:18:E7:45:D9:5A:86:40:17:7F:33:B0:6F:DD:DC:B7:41:70:FB:EB:A0:A5:4E:A1 Fingerprint (SHA1): 3E:8B:4F:48:03:08:49:A4:84:F2:16:68:64:4C:BA:FF:2E:F7:63:FD Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8614: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8615: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172652 (0x13bd4b2c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:16:21 2017 Not After : Thu Mar 31 18:16:21 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:2c:f8:86:c9:dd:0c:67:b1:45:81:98:6d:74:35:1a: 64:ea:6e:b8:63:46:8e:52:77:5c:65:b2:c7:f3:73:f4: 26:83:34:39:b8:3a:26:e8:05:44:1a:17:01:ae:51:83: bd:ee:15:51:63:8b:15:77:36:a3:c7:4f:94:18:6c:19: 93:4c:58:48:d2:cd:d5:d1:a0:aa:d7:88:77:26:77:49: 4e:db:bf:f1:5a:60:5a:be:02:2b:d8:f1:d1:a4:31:53: f0:53:d0:1e:ff:c5:33:fa:0c:91:00:0b:a4:8e:a1:fe: f9:77:b8:85:f6:26:e5:69:20:40:36:00:dc:6d:21:84: a8:06:0c:62:73:94:fc:a1:01:fb:b2:18:40:a4:c2:d1: 47:f3:7a:cf:23:6b:1a:e6:37:90:23:80:16:48:fd:38: 06:3e:48:b4:26:0f:7b:0b:ec:67:22:c0:f5:92:37:b8: c5:ee:6a:76:12:b9:95:3c:44:60:56:6b:e9:da:c0:f8: 01:1d:48:fd:db:30:61:bb:fe:84:bc:69:b9:20:8b:8b: bf:57:a0:13:2b:e7:9e:a2:a7:14:d5:95:b9:a9:67:84: 67:2a:8a:3c:cc:99:86:37:73:35:f2:b7:fe:2d:2b:18: c5:a3:05:39:50:dd:49:c2:3d:1c:18:c0:e0:9d:90:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:47:c2:31:62:71:fe:3c:e1:90:04:35:ef:f4:0d:0f: 98:f3:b4:42:a7:a4:2a:01:d3:9f:8f:07:d5:eb:f6:bb: 60:98:62:9f:e9:16:72:c7:8c:32:8f:ef:ae:c5:a1:32: e0:59:f9:60:ec:08:d7:5d:d6:a3:b0:47:37:f2:cd:53: de:e7:cf:6e:cd:76:28:51:90:a1:c3:7f:60:aa:24:00: 4d:71:87:58:77:2f:f2:39:23:5e:b1:ca:40:cd:7d:7d: f2:b0:38:69:bc:32:6d:22:b7:e6:19:7d:72:dd:ff:0f: ad:c5:ed:18:96:44:9e:d0:d2:d5:0f:b3:4a:88:a5:4c: 68:c9:a1:35:62:21:41:7c:17:53:bb:c7:c6:05:d8:46: 29:1d:4a:9e:31:b9:53:d3:3d:ce:32:6e:00:56:d8:df: 73:de:35:9b:ed:8b:66:27:83:55:74:4d:4f:1f:b3:3a: e1:62:70:e9:1f:d3:81:e8:fa:0b:65:db:80:63:62:27: 4b:d4:02:60:c8:92:60:08:6b:9e:bb:9f:a5:a7:3a:04: 64:a0:bf:eb:65:7c:e9:ff:55:23:e2:8e:b7:52:97:8a: 22:18:95:d0:4b:a8:95:1b:52:25:7d:79:26:a7:9c:18: e5:32:75:0b:f3:75:8c:0e:c4:15:b6:e3:21:90:45:7a Fingerprint (SHA-256): 37:E8:87:9C:A0:02:0E:E5:88:2D:1D:ED:85:CC:34:10:B3:7E:D4:70:EC:A6:AE:AC:F1:8D:3F:A6:54:B1:D2:41 Fingerprint (SHA1): 7A:9D:95:BA:1B:C6:BA:7D:8F:E1:3F:15:D7:B0:26:50:1C:7D:CE:7A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8616: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8617: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8618: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172653 (0x13bd4b2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 18:16:26 2017 Not After : Thu Mar 31 18:16:26 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:e2:ef:5b:bb:1a:e9:ba:27:55:5e:23:b9:42:75:2d: 75:2c:55:53:90:f4:d5:f8:a4:0b:ef:f9:63:f6:b9:c0: 19:21:ad:c3:18:a3:c1:50:32:fd:cd:f5:bc:b6:74:eb: f5:25:16:2f:04:63:1b:e8:6f:3e:3c:6f:9b:7a:76:3b: 18:7c:b7:aa:71:97:f0:67:81:41:ea:ea:12:c9:cf:86: 8d:d1:07:0b:cb:a9:87:54:fd:a0:93:96:e9:5e:53:ea: 49:4c:cd:ff:14:51:cf:db:05:8d:19:ec:cd:37:4c:d3: d0:b3:cb:2d:34:8b:68:f7:66:d2:64:77:81:b6:ef:56: 48:c2:72:e0:b7:82:57:bf:c4:64:6e:26:6d:3f:02:0a: ba:a4:05:bc:c0:6b:8a:c5:f7:61:c1:02:c8:c3:86:1c: 00:f0:1a:d0:b4:61:f7:d8:87:92:f2:90:95:53:a9:c9: fe:be:cd:3b:01:9f:98:ae:a1:b9:cd:21:af:ac:cd:80: 66:f7:b9:41:76:f8:b4:51:fc:28:12:38:f0:6e:79:e4: 5b:08:95:04:55:5f:14:cd:0a:20:ab:35:9e:9a:78:63: 89:9a:ab:69:d6:e4:1e:30:8b:14:dd:8d:3f:73:8a:3b: 1b:6f:15:85:a8:1b:23:c6:e7:79:3a:4d:d3:2d:12:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:dd:82:e0:f3:dd:7c:7f:8a:4f:b7:18:0e:75:ff:01: 11:93:56:22:20:87:b3:f0:d0:ff:51:b6:dc:2c:9b:b8: cf:53:1d:91:2e:65:85:c5:bb:4d:42:2f:f8:71:88:99: 89:a6:f2:be:4f:37:4c:62:09:38:3b:3c:30:2c:4e:45: 1b:c6:1b:cf:50:71:b0:a8:51:37:e1:cd:80:8f:bc:00: e1:df:70:f6:20:e2:1a:71:95:a6:58:30:41:a0:86:b6: 88:1f:c9:27:f7:2a:e3:66:1e:23:59:8f:3b:b3:05:1a: 39:f5:56:1c:0a:49:28:99:e9:cb:74:73:6b:02:c1:7f: c0:f7:68:70:a8:87:a1:00:9c:73:09:cd:b2:e0:8e:9d: fe:63:7b:d6:ef:85:17:6d:11:2c:b0:62:f7:e9:fc:a9: 8d:72:b3:3e:c5:2a:24:c6:36:77:4a:54:8e:9e:64:55: 6d:8e:96:1c:55:41:87:9e:7c:d0:ee:fd:a9:dd:aa:5f: ef:27:4c:13:f2:6d:7a:71:83:f9:3d:0e:0c:39:8d:20: 05:0c:41:e3:b1:f6:55:1b:92:44:9d:ff:a9:b4:99:65: ed:fc:2e:f3:ae:b0:62:79:38:08:2a:86:d9:7e:ae:bd: cb:81:03:10:df:5f:2e:3e:45:82:c0:33:2a:43:c0:e5 Fingerprint (SHA-256): DC:E4:1B:66:4A:D1:A2:B3:28:9A:61:3F:94:E5:CA:6C:96:EA:9E:ED:17:D4:A9:65:B5:C2:52:2D:E7:70:CB:D5 Fingerprint (SHA1): 55:11:AF:0B:FF:D3:9C:FA:A6:EE:27:CA:91:61:AB:8C:E6:C8:FD:93 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #8619: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8620: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172656 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8621: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8622: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8623: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8624: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331172657 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8625: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8626: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8627: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8628: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331172658 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA1Root-331172435.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8629: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8630: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #8631: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8632: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 331172659 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8633: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8634: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #8635: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172656 (0x13bd4b30) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:17:13 2017 Not After : Thu Mar 31 18:17:13 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:ea:0c:d6:b5:15:ae:b3:82:47:f6:2a:73:99:8c:8a: 34:44:6f:a3:f2:03:5d:f9:8f:50:c3:a7:97:01:c7:cc: ff:3d:0e:e4:34:5f:7b:68:1b:80:a5:43:92:f9:32:e6: 94:fe:06:ba:c5:8b:c1:f8:d4:bb:89:49:61:c4:7e:82: 0e:1b:d5:db:6e:0d:f7:47:1f:0c:ee:02:ed:72:49:3b: b2:62:10:f7:49:1b:d2:e1:5f:75:29:b7:b9:2e:57:4a: 79:0f:6c:b2:ab:d9:db:57:b9:37:4a:70:9b:4f:13:9f: f2:77:84:37:9d:0f:66:2b:70:94:bc:b3:2d:97:8b:be: 62:9b:57:38:98:2e:7b:18:ac:bc:1e:b8:5c:90:9c:07: 04:a3:0e:bb:b7:9a:11:d9:43:54:de:a8:b0:ae:d5:ce: 6d:79:9c:62:81:cc:89:c0:57:95:84:af:50:ad:91:a2: bb:e1:95:8b:45:60:0e:69:74:d3:bd:a1:e6:59:39:23: 06:d9:f2:f8:14:98:a3:43:51:99:3c:af:74:31:79:a4: 16:2d:1d:bf:72:46:45:ba:fa:78:e1:2e:d6:69:33:8f: 47:55:e8:a0:a9:b9:86:a8:22:2a:2e:5e:e1:48:2c:5b: a9:51:06:d6:f8:ea:11:bc:ae:73:d7:04:25:26:22:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:a7:80:62:05:2c:f9:bf:21:59:9a:55:93:74:68:41: d6:91:a3:1e:04:5d:04:f6:40:59:93:eb:93:a5:f4:51: cb:8e:e0:e7:78:fe:fe:ae:66:ee:0e:41:91:5d:3d:da: 91:51:75:14:25:81:73:10:06:6e:83:42:f5:53:c4:97: b4:b8:5e:a4:f7:34:e6:33:0f:c4:a8:d2:93:91:c9:71: 24:d7:1a:0e:ae:84:8f:7e:d7:f6:3e:61:05:a6:c6:49: 55:86:f7:bb:dd:21:13:e3:d1:e5:18:e1:48:3a:fb:32: 27:67:8b:54:82:0c:e8:01:94:73:5b:c1:c2:32:7d:94: 93:89:96:88:d8:ed:52:ff:06:33:91:92:4d:86:c7:b7: 06:ba:7a:5b:71:f5:ed:f4:2e:2b:e7:2e:b2:3b:28:e3: 31:8e:17:9d:97:f1:a1:53:cd:7a:4c:62:73:eb:02:b7: 03:d9:04:77:5f:d8:48:bc:f2:f2:22:f5:98:73:73:17: 9f:47:04:48:64:ac:66:72:44:47:f8:f1:4c:07:a8:52: 24:b9:fd:a6:c1:6f:72:66:53:2e:12:e1:80:b6:03:e8: e3:90:e8:ab:dd:91:c4:14:58:f4:7e:42:39:40:ff:be: c6:e3:b4:71:26:64:4c:e1:9f:52:2e:50:06:9a:29:8e Fingerprint (SHA-256): 9F:5C:DC:ED:A6:EB:98:73:26:FF:32:C2:94:D2:97:B2:3B:FC:41:D1:80:D1:A2:19:11:C7:8B:8F:07:AC:6B:E7 Fingerprint (SHA1): 30:85:DB:07:5B:D3:89:F5:2E:BF:9A:01:84:6C:2F:C0:54:CF:D5:81 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8636: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #8637: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172660 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8638: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #8639: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #8640: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172661 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8641: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #8642: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #8643: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8644: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 331172662 -7 Bridge@Army < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8645: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8646: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 331172663 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8647: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8648: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #8649: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8650: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8651: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 331172664 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-Bridge-331172436.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8652: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8653: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8654: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8655: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331172665 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8656: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8657: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #8658: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #8659: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172661 (0x13bd4b35) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 18:18:20 2017 Not After : Thu Mar 31 18:18:20 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:12:ac:84:f6:06:3e:38:47:f9:c2:f1:a3:4f:b2:4d: b1:11:3c:fb:5f:79:d6:e3:34:62:90:b8:3d:db:64:73: d8:ba:cb:33:29:fa:b1:9a:50:53:54:e0:51:b7:7d:79: e6:62:7b:87:ef:01:e5:e4:e0:a8:36:49:c2:4e:eb:0f: fc:9e:2f:c1:ed:35:c4:2a:93:16:7b:85:38:e3:da:cd: 0c:ee:db:12:29:a4:7b:fc:7d:28:ab:fc:f2:cd:f6:4c: 23:00:93:47:0d:3e:cd:57:e4:07:b9:72:13:b9:65:22: f7:9c:2b:e1:56:d4:17:31:36:ac:44:d5:6d:df:b8:20: b8:ac:ad:49:7d:74:28:07:53:64:3c:c6:88:a0:c3:84: 34:50:d9:85:67:18:3a:a7:cb:0e:49:69:45:88:d2:f0: 0d:47:39:f8:fb:95:c8:59:50:ac:cc:a1:4b:cf:2a:0a: 8a:31:5a:97:8a:c1:a4:f5:62:c8:0f:b7:2a:df:ba:5f: 4a:bd:77:34:26:c8:fa:08:ac:df:e3:fd:8e:79:39:ad: 77:8a:b9:7b:2b:77:4a:3a:c0:f9:64:fc:85:2f:17:fa: 5e:a3:95:e9:e0:fc:19:e0:2f:40:a6:06:58:11:0e:e6: d7:e8:0c:4c:84:25:1a:5e:e7:1d:de:fa:42:a6:ed:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:14:fd:b7:5c:19:ee:27:e0:2d:9e:d1:e9:9e:76:72: f2:f4:af:6f:11:e3:d9:c0:6d:d0:ae:b5:54:4b:48:3c: cb:8c:6e:96:ae:7c:3c:a0:d2:f0:e1:03:01:37:bb:1a: 5d:15:e6:fd:7c:fd:d5:f0:92:92:c6:7d:0d:4a:3d:f1: 8e:f0:79:c5:1a:ca:8d:19:4e:25:06:0f:6b:46:3e:f9: b6:ff:14:0f:a9:96:00:64:95:d3:16:5f:33:3f:6b:a2: 51:14:1c:4b:95:7c:9a:8e:0b:09:b8:3e:d2:6e:83:a1: 02:da:a3:94:88:dd:7f:a9:e4:2c:68:0e:19:e6:42:48: 48:31:6a:7f:85:2d:62:dc:10:a1:5a:c0:d1:73:76:7a: 0f:14:7c:76:cb:a2:3f:3f:04:5e:55:3c:86:cf:8c:89: cd:0b:33:41:8e:76:45:2a:76:74:e0:e6:0c:33:f7:f7: 6f:60:f6:19:87:d6:4b:58:e8:43:23:d4:b7:9a:3c:f8: 7b:b8:c7:13:39:ab:20:7d:35:7a:72:17:ea:3f:95:66: 03:47:84:48:c9:4c:3c:a6:7b:4e:67:4e:47:36:dd:3f: 1b:60:4a:ef:91:f1:7e:0d:f1:dd:2e:52:84:7f:a2:de: 25:e6:99:f8:bc:3d:09:15:1d:43:94:0b:ed:0c:39:fa Fingerprint (SHA-256): C2:11:51:4F:0B:77:EA:66:C4:CB:23:35:66:5D:09:30:23:83:1D:79:D1:A5:5E:C9:7F:A4:D3:BA:EA:0F:02:44 Fingerprint (SHA1): E6:AD:F7:CD:91:AC:2A:AB:1D:11:2E:56:C9:C0:45:68:FF:91:04:20 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8660: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172661 (0x13bd4b35) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 18:18:20 2017 Not After : Thu Mar 31 18:18:20 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:12:ac:84:f6:06:3e:38:47:f9:c2:f1:a3:4f:b2:4d: b1:11:3c:fb:5f:79:d6:e3:34:62:90:b8:3d:db:64:73: d8:ba:cb:33:29:fa:b1:9a:50:53:54:e0:51:b7:7d:79: e6:62:7b:87:ef:01:e5:e4:e0:a8:36:49:c2:4e:eb:0f: fc:9e:2f:c1:ed:35:c4:2a:93:16:7b:85:38:e3:da:cd: 0c:ee:db:12:29:a4:7b:fc:7d:28:ab:fc:f2:cd:f6:4c: 23:00:93:47:0d:3e:cd:57:e4:07:b9:72:13:b9:65:22: f7:9c:2b:e1:56:d4:17:31:36:ac:44:d5:6d:df:b8:20: b8:ac:ad:49:7d:74:28:07:53:64:3c:c6:88:a0:c3:84: 34:50:d9:85:67:18:3a:a7:cb:0e:49:69:45:88:d2:f0: 0d:47:39:f8:fb:95:c8:59:50:ac:cc:a1:4b:cf:2a:0a: 8a:31:5a:97:8a:c1:a4:f5:62:c8:0f:b7:2a:df:ba:5f: 4a:bd:77:34:26:c8:fa:08:ac:df:e3:fd:8e:79:39:ad: 77:8a:b9:7b:2b:77:4a:3a:c0:f9:64:fc:85:2f:17:fa: 5e:a3:95:e9:e0:fc:19:e0:2f:40:a6:06:58:11:0e:e6: d7:e8:0c:4c:84:25:1a:5e:e7:1d:de:fa:42:a6:ed:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:14:fd:b7:5c:19:ee:27:e0:2d:9e:d1:e9:9e:76:72: f2:f4:af:6f:11:e3:d9:c0:6d:d0:ae:b5:54:4b:48:3c: cb:8c:6e:96:ae:7c:3c:a0:d2:f0:e1:03:01:37:bb:1a: 5d:15:e6:fd:7c:fd:d5:f0:92:92:c6:7d:0d:4a:3d:f1: 8e:f0:79:c5:1a:ca:8d:19:4e:25:06:0f:6b:46:3e:f9: b6:ff:14:0f:a9:96:00:64:95:d3:16:5f:33:3f:6b:a2: 51:14:1c:4b:95:7c:9a:8e:0b:09:b8:3e:d2:6e:83:a1: 02:da:a3:94:88:dd:7f:a9:e4:2c:68:0e:19:e6:42:48: 48:31:6a:7f:85:2d:62:dc:10:a1:5a:c0:d1:73:76:7a: 0f:14:7c:76:cb:a2:3f:3f:04:5e:55:3c:86:cf:8c:89: cd:0b:33:41:8e:76:45:2a:76:74:e0:e6:0c:33:f7:f7: 6f:60:f6:19:87:d6:4b:58:e8:43:23:d4:b7:9a:3c:f8: 7b:b8:c7:13:39:ab:20:7d:35:7a:72:17:ea:3f:95:66: 03:47:84:48:c9:4c:3c:a6:7b:4e:67:4e:47:36:dd:3f: 1b:60:4a:ef:91:f1:7e:0d:f1:dd:2e:52:84:7f:a2:de: 25:e6:99:f8:bc:3d:09:15:1d:43:94:0b:ed:0c:39:fa Fingerprint (SHA-256): C2:11:51:4F:0B:77:EA:66:C4:CB:23:35:66:5D:09:30:23:83:1D:79:D1:A5:5E:C9:7F:A4:D3:BA:EA:0F:02:44 Fingerprint (SHA1): E6:AD:F7:CD:91:AC:2A:AB:1D:11:2E:56:C9:C0:45:68:FF:91:04:20 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8661: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #8662: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172666 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8663: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #8664: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #8665: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172667 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8666: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #8667: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #8668: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8669: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 331172668 -7 Bridge@Army < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8670: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8671: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 331172669 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8672: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8673: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #8674: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8675: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8676: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 331172670 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-Bridge-331172437.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8677: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8678: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8679: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8680: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331172671 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8681: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8682: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8683: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8684: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 331172672 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-BridgeNavy-331172438.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8685: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8686: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #8687: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8688: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 331172673 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8689: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8690: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #8691: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #8692: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172667 (0x13bd4b3b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 18:19:18 2017 Not After : Thu Mar 31 18:19:18 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:42:3f:b8:dc:f4:b7:9c:2d:09:b5:85:5c:e7:96:81: d4:27:41:84:2d:ea:c7:a1:1c:f9:72:64:e8:fd:30:0a: d8:c4:fd:1b:0d:16:a2:2a:c4:3c:4d:9c:7a:bd:7f:2a: e7:fe:d9:20:f5:06:43:7d:dc:9b:95:b1:99:52:fb:76: 07:54:43:05:71:2e:79:01:2f:a6:07:a0:ca:72:15:69: 0f:24:c4:c8:25:8b:d0:c3:8e:98:ad:d2:34:bf:50:79: 93:a0:86:1a:d0:54:92:ee:7e:bb:6c:fc:bc:8c:66:c0: 7a:9e:ce:7b:f6:43:af:22:6b:b1:46:34:6c:86:35:99: 3d:cd:4f:e3:f9:13:22:c3:8b:2c:6d:d4:01:fa:e9:ea: 8f:f7:1c:c3:36:64:05:90:00:19:34:1d:c2:3b:99:c2: 65:c6:b0:12:e9:11:31:3a:2c:7a:e3:a6:c0:9b:a2:90: 8c:dc:ee:cd:1a:e8:06:a4:1d:da:73:47:15:b4:52:1a: a7:6a:87:23:57:3d:4c:33:0f:b4:ca:0f:68:8f:55:d3: 34:5b:66:bc:b5:e1:33:80:6d:30:ea:99:37:f6:2d:f9: d2:21:eb:31:9a:cc:00:1c:7a:60:02:3b:30:df:17:b7: 98:2e:17:a3:8d:bc:07:2a:a9:65:c6:e4:70:a4:a5:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:52:a8:08:b8:88:03:14:aa:c9:54:11:13:8b:92:a8: 69:cc:ce:da:ef:03:d6:06:ac:ff:6f:86:15:d0:fe:95: 6f:ca:28:dc:a3:86:c0:e2:e1:69:6a:c1:9a:61:b7:45: 2c:49:75:b2:9c:7d:af:df:98:24:5b:fe:51:0a:8b:0d: 05:ca:9b:de:5d:ef:0f:9e:1b:4c:df:47:55:c1:d0:73: 0f:e5:e7:df:d1:a7:8e:e8:a7:a4:e8:9d:95:59:e0:72: 4c:89:cc:84:b8:f8:e8:10:d4:8c:a5:b4:95:c8:18:f1: 3b:31:53:dd:29:46:53:78:e9:b0:b5:40:8a:cd:23:08: 7a:9d:d5:b4:f9:03:fd:ad:f0:d3:80:4e:8c:f7:c7:c1: a7:fb:e6:ab:58:10:b2:1a:01:31:59:5f:9e:40:ab:37: f9:ed:91:9c:2b:3f:7e:37:de:30:e9:16:f1:d0:9f:da: 0c:c3:ad:3e:73:3b:03:ae:50:2c:04:57:40:e6:98:08: 8e:3e:11:49:e2:93:06:5b:0b:9b:e4:d1:02:52:20:7b: bd:7e:8b:19:a0:a9:2c:55:99:3b:59:6f:9a:d2:2d:f6: 66:14:42:a2:43:a6:bc:59:81:a9:02:d3:05:d3:41:1b: fe:53:90:e2:a7:ae:aa:d4:a1:2c:ba:94:c9:5a:d1:c5 Fingerprint (SHA-256): 6E:E9:68:4C:B0:CE:D4:19:42:AE:96:29:59:6A:E2:EB:17:67:DE:BD:A4:75:C9:53:4B:F9:4E:96:9B:40:8F:92 Fingerprint (SHA1): 41:E5:0D:8F:4B:4F:07:0A:8B:18:C1:63:22:4A:00:ED:05:A7:9F:91 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8693: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172667 (0x13bd4b3b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 18:19:18 2017 Not After : Thu Mar 31 18:19:18 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:42:3f:b8:dc:f4:b7:9c:2d:09:b5:85:5c:e7:96:81: d4:27:41:84:2d:ea:c7:a1:1c:f9:72:64:e8:fd:30:0a: d8:c4:fd:1b:0d:16:a2:2a:c4:3c:4d:9c:7a:bd:7f:2a: e7:fe:d9:20:f5:06:43:7d:dc:9b:95:b1:99:52:fb:76: 07:54:43:05:71:2e:79:01:2f:a6:07:a0:ca:72:15:69: 0f:24:c4:c8:25:8b:d0:c3:8e:98:ad:d2:34:bf:50:79: 93:a0:86:1a:d0:54:92:ee:7e:bb:6c:fc:bc:8c:66:c0: 7a:9e:ce:7b:f6:43:af:22:6b:b1:46:34:6c:86:35:99: 3d:cd:4f:e3:f9:13:22:c3:8b:2c:6d:d4:01:fa:e9:ea: 8f:f7:1c:c3:36:64:05:90:00:19:34:1d:c2:3b:99:c2: 65:c6:b0:12:e9:11:31:3a:2c:7a:e3:a6:c0:9b:a2:90: 8c:dc:ee:cd:1a:e8:06:a4:1d:da:73:47:15:b4:52:1a: a7:6a:87:23:57:3d:4c:33:0f:b4:ca:0f:68:8f:55:d3: 34:5b:66:bc:b5:e1:33:80:6d:30:ea:99:37:f6:2d:f9: d2:21:eb:31:9a:cc:00:1c:7a:60:02:3b:30:df:17:b7: 98:2e:17:a3:8d:bc:07:2a:a9:65:c6:e4:70:a4:a5:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:52:a8:08:b8:88:03:14:aa:c9:54:11:13:8b:92:a8: 69:cc:ce:da:ef:03:d6:06:ac:ff:6f:86:15:d0:fe:95: 6f:ca:28:dc:a3:86:c0:e2:e1:69:6a:c1:9a:61:b7:45: 2c:49:75:b2:9c:7d:af:df:98:24:5b:fe:51:0a:8b:0d: 05:ca:9b:de:5d:ef:0f:9e:1b:4c:df:47:55:c1:d0:73: 0f:e5:e7:df:d1:a7:8e:e8:a7:a4:e8:9d:95:59:e0:72: 4c:89:cc:84:b8:f8:e8:10:d4:8c:a5:b4:95:c8:18:f1: 3b:31:53:dd:29:46:53:78:e9:b0:b5:40:8a:cd:23:08: 7a:9d:d5:b4:f9:03:fd:ad:f0:d3:80:4e:8c:f7:c7:c1: a7:fb:e6:ab:58:10:b2:1a:01:31:59:5f:9e:40:ab:37: f9:ed:91:9c:2b:3f:7e:37:de:30:e9:16:f1:d0:9f:da: 0c:c3:ad:3e:73:3b:03:ae:50:2c:04:57:40:e6:98:08: 8e:3e:11:49:e2:93:06:5b:0b:9b:e4:d1:02:52:20:7b: bd:7e:8b:19:a0:a9:2c:55:99:3b:59:6f:9a:d2:2d:f6: 66:14:42:a2:43:a6:bc:59:81:a9:02:d3:05:d3:41:1b: fe:53:90:e2:a7:ae:aa:d4:a1:2c:ba:94:c9:5a:d1:c5 Fingerprint (SHA-256): 6E:E9:68:4C:B0:CE:D4:19:42:AE:96:29:59:6A:E2:EB:17:67:DE:BD:A4:75:C9:53:4B:F9:4E:96:9B:40:8F:92 Fingerprint (SHA1): 41:E5:0D:8F:4B:4F:07:0A:8B:18:C1:63:22:4A:00:ED:05:A7:9F:91 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8694: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #8695: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172666 (0x13bd4b3a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 18:19:12 2017 Not After : Thu Mar 31 18:19:12 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:1f:47:d7:64:02:c3:c2:fd:7e:30:a7:f3:36:89:8f: 69:c5:02:7b:78:d6:91:af:9b:14:19:83:f3:6c:f5:4c: 30:e1:6d:82:52:87:cc:21:d7:ed:d6:03:2b:32:2f:40: 6e:79:17:e0:85:8c:fc:53:b8:a8:30:bf:82:9f:b6:19: c9:03:ce:36:11:12:8f:52:f8:9b:50:88:ed:29:68:28: 20:11:bd:14:77:3c:00:ff:a1:5b:4b:75:dd:98:05:2e: 2f:7b:39:fe:8d:f5:7f:e9:14:d8:fd:30:d6:c1:51:05: d6:53:8d:13:74:50:cd:a8:e9:0b:b1:d2:0b:b1:24:14: 1b:01:1c:c6:75:4c:3c:23:f5:01:f4:dd:0b:51:f2:6b: 0f:6c:35:5d:3a:dc:78:43:29:14:fd:e9:9b:85:f5:ac: 9a:fd:90:4a:70:3f:c5:50:5c:f2:ac:13:69:db:d6:b5: c9:28:b5:c0:50:64:3e:37:5d:fa:e8:70:a0:4c:69:95: 13:21:e2:39:63:1b:ee:4a:f6:a7:e8:f3:a5:18:e7:55: fa:a7:60:24:f1:79:58:a6:36:7f:b4:03:62:25:06:87: c5:7a:99:c4:cd:6f:a8:c7:10:c0:14:c8:07:b9:8f:fb: 8b:c6:de:65:e8:21:c0:da:20:a2:d6:86:37:8b:66:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:b9:0a:75:52:07:18:b8:8c:f3:c8:15:d6:9a:dd:70: 70:7e:82:bd:ba:5c:35:ad:98:cb:d7:c0:65:e7:00:1d: e6:33:37:ea:1c:ff:b6:be:d1:c5:49:a0:75:a1:70:c4: a3:36:56:92:80:b2:12:18:4e:f4:e1:f6:c7:73:61:f1: 0b:9b:ec:65:da:8a:b5:fd:30:34:a2:a2:46:81:d3:bc: 3f:38:39:d8:fd:97:4c:f2:b4:54:b7:cd:16:9e:06:ff: ba:97:7e:d0:cb:20:39:0e:9b:9c:72:62:7b:26:ec:48: d8:0f:94:0b:a8:b3:99:8d:10:56:2f:ce:d2:1d:14:52: b4:0a:da:b1:d0:bf:78:08:05:7a:f5:0d:d4:1c:4d:6c: 13:17:0f:d6:a7:90:d0:26:ad:63:6d:20:bd:b9:41:e1: 43:82:c1:01:e5:dd:39:e0:14:b8:61:6c:83:9e:e5:29: 3b:9f:e6:8c:e2:23:b0:0a:9c:8e:0e:98:09:b7:07:98: 90:cb:3b:08:59:1b:49:54:a6:48:73:58:28:f0:eb:c9: 17:eb:9d:72:bf:8f:f8:c0:46:f5:40:b9:61:e9:85:af: e4:e1:6b:e8:45:31:44:90:3f:49:33:67:0c:3f:28:c1: 44:fd:1c:14:44:11:6a:ea:d0:9b:ee:bb:4a:37:bd:bc Fingerprint (SHA-256): D3:A5:E7:9E:49:D8:9E:C7:07:61:D9:BF:F2:F9:79:E6:F3:6D:FC:6F:BD:BF:8B:1F:4D:BF:D1:25:2F:D5:46:F9 Fingerprint (SHA1): 3E:F3:6C:2A:72:14:DE:EB:02:9C:1E:ED:9A:76:F0:98:C8:9A:B0:15 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8696: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172667 (0x13bd4b3b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 18:19:18 2017 Not After : Thu Mar 31 18:19:18 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:42:3f:b8:dc:f4:b7:9c:2d:09:b5:85:5c:e7:96:81: d4:27:41:84:2d:ea:c7:a1:1c:f9:72:64:e8:fd:30:0a: d8:c4:fd:1b:0d:16:a2:2a:c4:3c:4d:9c:7a:bd:7f:2a: e7:fe:d9:20:f5:06:43:7d:dc:9b:95:b1:99:52:fb:76: 07:54:43:05:71:2e:79:01:2f:a6:07:a0:ca:72:15:69: 0f:24:c4:c8:25:8b:d0:c3:8e:98:ad:d2:34:bf:50:79: 93:a0:86:1a:d0:54:92:ee:7e:bb:6c:fc:bc:8c:66:c0: 7a:9e:ce:7b:f6:43:af:22:6b:b1:46:34:6c:86:35:99: 3d:cd:4f:e3:f9:13:22:c3:8b:2c:6d:d4:01:fa:e9:ea: 8f:f7:1c:c3:36:64:05:90:00:19:34:1d:c2:3b:99:c2: 65:c6:b0:12:e9:11:31:3a:2c:7a:e3:a6:c0:9b:a2:90: 8c:dc:ee:cd:1a:e8:06:a4:1d:da:73:47:15:b4:52:1a: a7:6a:87:23:57:3d:4c:33:0f:b4:ca:0f:68:8f:55:d3: 34:5b:66:bc:b5:e1:33:80:6d:30:ea:99:37:f6:2d:f9: d2:21:eb:31:9a:cc:00:1c:7a:60:02:3b:30:df:17:b7: 98:2e:17:a3:8d:bc:07:2a:a9:65:c6:e4:70:a4:a5:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:52:a8:08:b8:88:03:14:aa:c9:54:11:13:8b:92:a8: 69:cc:ce:da:ef:03:d6:06:ac:ff:6f:86:15:d0:fe:95: 6f:ca:28:dc:a3:86:c0:e2:e1:69:6a:c1:9a:61:b7:45: 2c:49:75:b2:9c:7d:af:df:98:24:5b:fe:51:0a:8b:0d: 05:ca:9b:de:5d:ef:0f:9e:1b:4c:df:47:55:c1:d0:73: 0f:e5:e7:df:d1:a7:8e:e8:a7:a4:e8:9d:95:59:e0:72: 4c:89:cc:84:b8:f8:e8:10:d4:8c:a5:b4:95:c8:18:f1: 3b:31:53:dd:29:46:53:78:e9:b0:b5:40:8a:cd:23:08: 7a:9d:d5:b4:f9:03:fd:ad:f0:d3:80:4e:8c:f7:c7:c1: a7:fb:e6:ab:58:10:b2:1a:01:31:59:5f:9e:40:ab:37: f9:ed:91:9c:2b:3f:7e:37:de:30:e9:16:f1:d0:9f:da: 0c:c3:ad:3e:73:3b:03:ae:50:2c:04:57:40:e6:98:08: 8e:3e:11:49:e2:93:06:5b:0b:9b:e4:d1:02:52:20:7b: bd:7e:8b:19:a0:a9:2c:55:99:3b:59:6f:9a:d2:2d:f6: 66:14:42:a2:43:a6:bc:59:81:a9:02:d3:05:d3:41:1b: fe:53:90:e2:a7:ae:aa:d4:a1:2c:ba:94:c9:5a:d1:c5 Fingerprint (SHA-256): 6E:E9:68:4C:B0:CE:D4:19:42:AE:96:29:59:6A:E2:EB:17:67:DE:BD:A4:75:C9:53:4B:F9:4E:96:9B:40:8F:92 Fingerprint (SHA1): 41:E5:0D:8F:4B:4F:07:0A:8B:18:C1:63:22:4A:00:ED:05:A7:9F:91 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8697: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172667 (0x13bd4b3b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 18:19:18 2017 Not After : Thu Mar 31 18:19:18 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:42:3f:b8:dc:f4:b7:9c:2d:09:b5:85:5c:e7:96:81: d4:27:41:84:2d:ea:c7:a1:1c:f9:72:64:e8:fd:30:0a: d8:c4:fd:1b:0d:16:a2:2a:c4:3c:4d:9c:7a:bd:7f:2a: e7:fe:d9:20:f5:06:43:7d:dc:9b:95:b1:99:52:fb:76: 07:54:43:05:71:2e:79:01:2f:a6:07:a0:ca:72:15:69: 0f:24:c4:c8:25:8b:d0:c3:8e:98:ad:d2:34:bf:50:79: 93:a0:86:1a:d0:54:92:ee:7e:bb:6c:fc:bc:8c:66:c0: 7a:9e:ce:7b:f6:43:af:22:6b:b1:46:34:6c:86:35:99: 3d:cd:4f:e3:f9:13:22:c3:8b:2c:6d:d4:01:fa:e9:ea: 8f:f7:1c:c3:36:64:05:90:00:19:34:1d:c2:3b:99:c2: 65:c6:b0:12:e9:11:31:3a:2c:7a:e3:a6:c0:9b:a2:90: 8c:dc:ee:cd:1a:e8:06:a4:1d:da:73:47:15:b4:52:1a: a7:6a:87:23:57:3d:4c:33:0f:b4:ca:0f:68:8f:55:d3: 34:5b:66:bc:b5:e1:33:80:6d:30:ea:99:37:f6:2d:f9: d2:21:eb:31:9a:cc:00:1c:7a:60:02:3b:30:df:17:b7: 98:2e:17:a3:8d:bc:07:2a:a9:65:c6:e4:70:a4:a5:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:52:a8:08:b8:88:03:14:aa:c9:54:11:13:8b:92:a8: 69:cc:ce:da:ef:03:d6:06:ac:ff:6f:86:15:d0:fe:95: 6f:ca:28:dc:a3:86:c0:e2:e1:69:6a:c1:9a:61:b7:45: 2c:49:75:b2:9c:7d:af:df:98:24:5b:fe:51:0a:8b:0d: 05:ca:9b:de:5d:ef:0f:9e:1b:4c:df:47:55:c1:d0:73: 0f:e5:e7:df:d1:a7:8e:e8:a7:a4:e8:9d:95:59:e0:72: 4c:89:cc:84:b8:f8:e8:10:d4:8c:a5:b4:95:c8:18:f1: 3b:31:53:dd:29:46:53:78:e9:b0:b5:40:8a:cd:23:08: 7a:9d:d5:b4:f9:03:fd:ad:f0:d3:80:4e:8c:f7:c7:c1: a7:fb:e6:ab:58:10:b2:1a:01:31:59:5f:9e:40:ab:37: f9:ed:91:9c:2b:3f:7e:37:de:30:e9:16:f1:d0:9f:da: 0c:c3:ad:3e:73:3b:03:ae:50:2c:04:57:40:e6:98:08: 8e:3e:11:49:e2:93:06:5b:0b:9b:e4:d1:02:52:20:7b: bd:7e:8b:19:a0:a9:2c:55:99:3b:59:6f:9a:d2:2d:f6: 66:14:42:a2:43:a6:bc:59:81:a9:02:d3:05:d3:41:1b: fe:53:90:e2:a7:ae:aa:d4:a1:2c:ba:94:c9:5a:d1:c5 Fingerprint (SHA-256): 6E:E9:68:4C:B0:CE:D4:19:42:AE:96:29:59:6A:E2:EB:17:67:DE:BD:A4:75:C9:53:4B:F9:4E:96:9B:40:8F:92 Fingerprint (SHA1): 41:E5:0D:8F:4B:4F:07:0A:8B:18:C1:63:22:4A:00:ED:05:A7:9F:91 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8698: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #8699: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172674 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8700: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #8701: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #8702: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172675 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8703: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #8704: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #8705: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8706: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 331172676 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8707: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8708: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #8709: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8710: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 331172677 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8711: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8712: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #8713: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8714: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 331172678 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #8715: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8716: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 331172679 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #8717: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8718: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #8719: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8720: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8721: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 331172680 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8722: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8723: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8724: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8725: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 331172681 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8726: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8727: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8728: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8729: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331172682 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8730: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8731: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #8732: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8733: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 331172683 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8734: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8735: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8736: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172674 (0x13bd4b42) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 18:20:39 2017 Not After : Thu Mar 31 18:20:39 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:eb:36:74:00:8e:d8:53:27:8d:28:54:83:be:08:06: f6:77:5d:8d:64:7a:8e:d2:46:7f:db:af:b1:25:66:0d: 0e:96:98:6c:5f:23:15:f4:d1:d5:03:87:4b:64:b4:f2: 0d:79:37:cc:b6:5b:0c:b9:e0:ce:01:6e:37:f6:99:f1: dd:3d:5c:a1:09:46:c6:34:7c:97:82:25:4f:b4:80:8a: 4c:70:12:53:97:cc:13:c7:d4:ff:45:13:59:fb:a3:d4: e1:b4:71:82:67:80:a7:c2:b1:33:4f:80:82:0c:e1:24: 02:c3:c8:df:7f:8d:f9:cb:5f:61:a0:b6:10:a0:4d:93: a3:9d:cd:5e:3f:5d:72:79:54:ed:f6:52:8c:32:36:84: db:c5:98:3e:ec:d1:52:ff:1c:b9:e6:f1:95:99:3d:d4: 0e:e1:2c:e3:37:86:8e:31:21:47:15:76:8e:fa:59:ca: 3d:25:72:76:58:7c:83:a9:db:98:b4:0c:cf:61:77:ac: 60:cb:14:13:d5:aa:4f:23:f4:11:b7:61:0d:84:f2:cf: d4:0a:73:68:b8:38:7b:ec:34:52:52:f0:4c:a0:ca:6e: ff:4b:38:33:a0:b4:a1:ae:da:61:61:bb:5f:40:c5:1a: 09:d9:d9:52:1d:d8:2c:2f:0a:75:aa:3c:53:1a:40:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:34:8e:e2:4b:8b:40:20:f4:3f:f1:cb:ea:58:39:53: 94:b6:b2:a6:9a:29:73:66:67:43:b0:5a:99:c7:a4:81: 64:b5:a7:3c:47:2a:43:37:11:32:3f:a2:89:e2:68:49: ae:12:06:f6:66:9f:55:7b:c5:7c:f9:03:35:50:70:de: b5:6d:9e:00:ae:1e:92:6e:14:98:8a:9f:73:d1:eb:a0: c3:99:3e:5e:84:c0:62:a7:5f:59:29:5b:8b:3b:49:f6: f5:6c:3c:64:08:14:47:e7:af:be:cd:36:82:c7:24:84: 53:b2:34:e2:0e:57:35:ba:23:ce:2b:2d:df:61:25:f3: 06:fb:90:98:56:f6:08:b3:63:db:86:f2:5a:6f:7f:ba: cb:93:e8:11:df:a4:42:ca:03:ad:b6:27:ae:e2:12:58: ee:01:80:56:17:29:9c:3d:78:c5:fe:40:a7:73:29:7a: 5b:e8:37:5e:c8:e9:e9:01:72:8d:91:17:2b:6f:42:fb: 02:f6:84:2d:ba:d7:96:4a:fa:6b:c2:f1:ab:40:66:11: d2:5a:27:17:be:04:89:d3:00:88:af:e6:bf:ba:b1:32: 81:84:29:c2:23:b6:b6:bf:a6:a8:dd:76:cf:33:3b:59: e7:8a:6f:04:5d:e4:d0:66:d7:2f:7e:91:d2:50:cd:46 Fingerprint (SHA-256): B5:B0:3B:3F:EB:88:F3:A8:AE:C4:F1:FF:80:E5:2E:8F:9D:B4:C1:4E:F9:51:86:C0:3D:C6:8B:2A:C1:42:EC:15 Fingerprint (SHA1): AA:20:60:82:FA:84:A3:6C:67:61:52:BD:F7:0F:E8:1F:96:B3:0A:CC Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #8737: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8738: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8739: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8740: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8741: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8742: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8743: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8744: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8745: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172675 (0x13bd4b43) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 18:20:47 2017 Not After : Thu Mar 31 18:20:47 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:36:24:f0:41:fa:7e:1f:d5:f4:27:e6:0b:cf:0e:e2: 87:c9:77:e9:d1:b5:fb:8c:67:40:08:b0:a5:1c:9a:96: 05:f7:b6:6d:6a:9d:03:42:cf:72:51:05:54:b3:6f:79: e3:7d:30:e7:29:ab:f9:f7:38:d3:9f:4f:cc:82:0a:63: 37:ff:42:42:04:a7:c1:40:89:6f:9b:4b:d6:d5:4b:40: a9:cf:da:59:ca:59:e4:ff:19:c1:14:69:eb:80:82:1c: 50:06:08:ca:2c:35:8f:9d:d7:1a:0b:9b:43:20:41:a7: 73:85:68:b2:bf:28:ac:c2:e3:40:f9:99:3d:e3:d0:29: 37:d0:e8:5f:9b:7d:2d:2f:dc:b1:07:13:20:a4:31:2d: e9:8f:2d:5c:16:87:bb:6b:3d:6c:12:48:a8:d4:2f:fc: 10:68:6f:8b:b9:2e:c6:b4:84:05:b9:f7:65:68:cd:b2: 4a:b0:9c:36:86:49:1c:3d:53:3a:d6:bd:0d:2b:b4:b9: e3:ec:ee:88:4f:9e:ef:7a:2e:d6:77:c1:08:76:29:95: a6:0a:53:4b:a4:34:bd:0b:cc:83:dd:1b:9c:8f:89:9c: f3:f1:32:cc:47:8f:63:1b:c9:65:01:36:49:d4:74:12: 46:0f:b6:55:2d:5e:47:72:8e:60:7d:a3:34:86:c9:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:83:b6:17:92:d4:a2:ef:db:5b:3f:d2:bb:17:3d:54: f5:70:49:bd:2a:35:00:25:79:e9:2d:5a:8a:88:62:2a: fa:82:43:23:4c:c6:14:3b:28:b7:4b:6f:d2:e9:e1:92: 51:09:ce:54:45:a6:c8:97:80:05:db:df:f1:05:cb:37: a8:04:6d:71:cc:7b:7f:6a:d3:86:af:15:fe:1f:33:c4: af:d4:e6:cb:de:c4:3b:a6:c8:50:df:3c:1c:ff:c1:73: 34:5f:d7:5e:7c:5c:9f:65:fc:b1:d5:f7:e0:03:87:2c: 75:c5:52:b8:56:7a:1c:20:be:dc:cd:04:bb:8e:92:59: 73:d5:32:9a:5a:64:dd:92:86:00:97:d7:84:9f:01:83: 23:04:4a:61:6d:be:a2:37:db:5f:53:e2:71:dd:74:6b: ac:87:80:5b:2b:9b:af:97:39:a6:a9:be:97:06:3c:ec: f9:1f:45:20:76:ae:fa:90:20:7f:99:0a:e4:a9:01:81: e8:29:d8:90:a0:78:d1:5f:f9:9f:6d:16:24:29:ca:54: c6:d6:cd:77:50:3a:4f:0e:b1:61:6f:7b:5f:9e:09:ed: a0:25:19:92:de:0c:40:50:95:0b:9d:29:9a:ee:bf:b5: 06:62:97:fb:63:16:78:07:f5:30:b3:4d:64:e6:a0:13 Fingerprint (SHA-256): 5C:A0:36:DE:8F:32:46:E2:03:7F:FD:8E:0B:C9:E2:BD:CA:60:9A:04:A0:D4:5C:E1:45:11:7E:05:95:DE:26:D3 Fingerprint (SHA1): EA:68:F7:3A:D6:3D:06:51:E3:80:C7:72:F3:5E:70:B6:50:0D:32:D5 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #8746: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8747: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8748: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8749: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8750: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8751: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8752: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #8753: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #8754: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #8755: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #8756: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #8757: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #8758: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #8759: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #8760: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #8761: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #8762: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #8763: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8764: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172684 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8765: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8766: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8767: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8768: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331172685 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8769: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8770: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8771: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8772: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331172686 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8773: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8774: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8775: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8776: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 331172687 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8777: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8778: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #8779: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8780: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 331172688 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8781: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8782: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #8783: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8784: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 331172689 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8785: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8786: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #8787: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8788: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 331172690 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8789: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8790: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #8791: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8792: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 331172691 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8793: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8794: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #8795: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8796: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 331172692 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8797: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8798: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8799: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172684 (0x13bd4b4c) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:22:14 2017 Not After : Thu Mar 31 18:22:14 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 55:67:e8:35:cf:a4:7e:1f:f4:3a:24:05:28:7a:94:e6: 50:c5:13:3b:a0:3a:47:de:a9:24:98:bb:8c:16:4d:92: e9:8f:44:3d:80:e3:a4:d2:67:38:44:17:27:9d:49:7f: 93:46:37:1e:48:65:4f:fd:08:8d:4b:13:2b:2f:07:ab: 08:9d:7c:41:af:52:b6:f4:cb:60:44:9a:0a:aa:b5:fe: e3:4d:3e:c5:91:32:05:3f:63:fc:bc:be:62:7f:2a:33: ef:85:fa:fb:fd:ab:83:f4:76:18:cb:e4:a8:fc:43:d0: 31:72:68:16:ed:a3:98:f6:c2:9f:46:f6:e5:f4:47:79: e3:fb:ea:b2:aa:98:22:8a:4e:ee:12:d1:0a:f0:58:58: e8:52:f0:5b:fe:0c:ab:cc:6f:a4:d2:ae:19:9d:dd:b2: d2:d0:eb:57:9d:20:8c:4b:df:58:2b:7b:2a:03:d2:28: a5:69:7d:9e:5c:1c:51:21:54:19:10:64:55:79:0c:4a: 96:b2:f5:ea:e9:03:f0:ee:39:23:cd:5d:01:61:d2:b6: b2:35:a0:6a:07:1e:38:38:e6:34:97:3e:60:a2:67:f9: b4:73:26:77:43:7a:bb:73:aa:bc:f6:01:7e:00:a6:ee: dc:e2:6d:cd:f6:96:1a:97:d1:e4:ca:b6:97:f9:dd:a6 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:d2:ef:51:27:2b:aa:14:27:38:6e:b1: 80:3c:63:bc:7a:ff:b1:87:e5:a8:3e:99:67:20:ec:7c: 46:02:1c:15:4e:e8:ac:67:19:29:7f:78:5f:85:da:fc: 05:bf:63:84:7e:66:a9:42:2d:95:04:b9:3e:44:6a Fingerprint (SHA-256): FE:65:67:03:18:8C:4A:54:01:70:7B:3C:A3:49:7E:F8:36:E9:2B:A5:82:7E:46:94:99:44:14:4D:90:AA:E6:18 Fingerprint (SHA1): 5E:8F:76:EC:AD:9F:72:D0:E5:83:4E:1D:EA:B6:DF:D0:B9:C5:2D:66 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8800: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172684 (0x13bd4b4c) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:22:14 2017 Not After : Thu Mar 31 18:22:14 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 55:67:e8:35:cf:a4:7e:1f:f4:3a:24:05:28:7a:94:e6: 50:c5:13:3b:a0:3a:47:de:a9:24:98:bb:8c:16:4d:92: e9:8f:44:3d:80:e3:a4:d2:67:38:44:17:27:9d:49:7f: 93:46:37:1e:48:65:4f:fd:08:8d:4b:13:2b:2f:07:ab: 08:9d:7c:41:af:52:b6:f4:cb:60:44:9a:0a:aa:b5:fe: e3:4d:3e:c5:91:32:05:3f:63:fc:bc:be:62:7f:2a:33: ef:85:fa:fb:fd:ab:83:f4:76:18:cb:e4:a8:fc:43:d0: 31:72:68:16:ed:a3:98:f6:c2:9f:46:f6:e5:f4:47:79: e3:fb:ea:b2:aa:98:22:8a:4e:ee:12:d1:0a:f0:58:58: e8:52:f0:5b:fe:0c:ab:cc:6f:a4:d2:ae:19:9d:dd:b2: d2:d0:eb:57:9d:20:8c:4b:df:58:2b:7b:2a:03:d2:28: a5:69:7d:9e:5c:1c:51:21:54:19:10:64:55:79:0c:4a: 96:b2:f5:ea:e9:03:f0:ee:39:23:cd:5d:01:61:d2:b6: b2:35:a0:6a:07:1e:38:38:e6:34:97:3e:60:a2:67:f9: b4:73:26:77:43:7a:bb:73:aa:bc:f6:01:7e:00:a6:ee: dc:e2:6d:cd:f6:96:1a:97:d1:e4:ca:b6:97:f9:dd:a6 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:d2:ef:51:27:2b:aa:14:27:38:6e:b1: 80:3c:63:bc:7a:ff:b1:87:e5:a8:3e:99:67:20:ec:7c: 46:02:1c:15:4e:e8:ac:67:19:29:7f:78:5f:85:da:fc: 05:bf:63:84:7e:66:a9:42:2d:95:04:b9:3e:44:6a Fingerprint (SHA-256): FE:65:67:03:18:8C:4A:54:01:70:7B:3C:A3:49:7E:F8:36:E9:2B:A5:82:7E:46:94:99:44:14:4D:90:AA:E6:18 Fingerprint (SHA1): 5E:8F:76:EC:AD:9F:72:D0:E5:83:4E:1D:EA:B6:DF:D0:B9:C5:2D:66 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8801: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172684 (0x13bd4b4c) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:22:14 2017 Not After : Thu Mar 31 18:22:14 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 55:67:e8:35:cf:a4:7e:1f:f4:3a:24:05:28:7a:94:e6: 50:c5:13:3b:a0:3a:47:de:a9:24:98:bb:8c:16:4d:92: e9:8f:44:3d:80:e3:a4:d2:67:38:44:17:27:9d:49:7f: 93:46:37:1e:48:65:4f:fd:08:8d:4b:13:2b:2f:07:ab: 08:9d:7c:41:af:52:b6:f4:cb:60:44:9a:0a:aa:b5:fe: e3:4d:3e:c5:91:32:05:3f:63:fc:bc:be:62:7f:2a:33: ef:85:fa:fb:fd:ab:83:f4:76:18:cb:e4:a8:fc:43:d0: 31:72:68:16:ed:a3:98:f6:c2:9f:46:f6:e5:f4:47:79: e3:fb:ea:b2:aa:98:22:8a:4e:ee:12:d1:0a:f0:58:58: e8:52:f0:5b:fe:0c:ab:cc:6f:a4:d2:ae:19:9d:dd:b2: d2:d0:eb:57:9d:20:8c:4b:df:58:2b:7b:2a:03:d2:28: a5:69:7d:9e:5c:1c:51:21:54:19:10:64:55:79:0c:4a: 96:b2:f5:ea:e9:03:f0:ee:39:23:cd:5d:01:61:d2:b6: b2:35:a0:6a:07:1e:38:38:e6:34:97:3e:60:a2:67:f9: b4:73:26:77:43:7a:bb:73:aa:bc:f6:01:7e:00:a6:ee: dc:e2:6d:cd:f6:96:1a:97:d1:e4:ca:b6:97:f9:dd:a6 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:d2:ef:51:27:2b:aa:14:27:38:6e:b1: 80:3c:63:bc:7a:ff:b1:87:e5:a8:3e:99:67:20:ec:7c: 46:02:1c:15:4e:e8:ac:67:19:29:7f:78:5f:85:da:fc: 05:bf:63:84:7e:66:a9:42:2d:95:04:b9:3e:44:6a Fingerprint (SHA-256): FE:65:67:03:18:8C:4A:54:01:70:7B:3C:A3:49:7E:F8:36:E9:2B:A5:82:7E:46:94:99:44:14:4D:90:AA:E6:18 Fingerprint (SHA1): 5E:8F:76:EC:AD:9F:72:D0:E5:83:4E:1D:EA:B6:DF:D0:B9:C5:2D:66 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #8802: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172684 (0x13bd4b4c) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:22:14 2017 Not After : Thu Mar 31 18:22:14 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 55:67:e8:35:cf:a4:7e:1f:f4:3a:24:05:28:7a:94:e6: 50:c5:13:3b:a0:3a:47:de:a9:24:98:bb:8c:16:4d:92: e9:8f:44:3d:80:e3:a4:d2:67:38:44:17:27:9d:49:7f: 93:46:37:1e:48:65:4f:fd:08:8d:4b:13:2b:2f:07:ab: 08:9d:7c:41:af:52:b6:f4:cb:60:44:9a:0a:aa:b5:fe: e3:4d:3e:c5:91:32:05:3f:63:fc:bc:be:62:7f:2a:33: ef:85:fa:fb:fd:ab:83:f4:76:18:cb:e4:a8:fc:43:d0: 31:72:68:16:ed:a3:98:f6:c2:9f:46:f6:e5:f4:47:79: e3:fb:ea:b2:aa:98:22:8a:4e:ee:12:d1:0a:f0:58:58: e8:52:f0:5b:fe:0c:ab:cc:6f:a4:d2:ae:19:9d:dd:b2: d2:d0:eb:57:9d:20:8c:4b:df:58:2b:7b:2a:03:d2:28: a5:69:7d:9e:5c:1c:51:21:54:19:10:64:55:79:0c:4a: 96:b2:f5:ea:e9:03:f0:ee:39:23:cd:5d:01:61:d2:b6: b2:35:a0:6a:07:1e:38:38:e6:34:97:3e:60:a2:67:f9: b4:73:26:77:43:7a:bb:73:aa:bc:f6:01:7e:00:a6:ee: dc:e2:6d:cd:f6:96:1a:97:d1:e4:ca:b6:97:f9:dd:a6 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:d2:ef:51:27:2b:aa:14:27:38:6e:b1: 80:3c:63:bc:7a:ff:b1:87:e5:a8:3e:99:67:20:ec:7c: 46:02:1c:15:4e:e8:ac:67:19:29:7f:78:5f:85:da:fc: 05:bf:63:84:7e:66:a9:42:2d:95:04:b9:3e:44:6a Fingerprint (SHA-256): FE:65:67:03:18:8C:4A:54:01:70:7B:3C:A3:49:7E:F8:36:E9:2B:A5:82:7E:46:94:99:44:14:4D:90:AA:E6:18 Fingerprint (SHA1): 5E:8F:76:EC:AD:9F:72:D0:E5:83:4E:1D:EA:B6:DF:D0:B9:C5:2D:66 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #8803: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8804: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8805: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8806: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #8807: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8808: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8809: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8810: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8811: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8812: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8813: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8814: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #8815: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8816: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8817: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8818: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #8819: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8820: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8821: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8822: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8823: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8824: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8825: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8826: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #8827: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8828: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8829: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8830: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170331182451Z nextupdate=20180331182451Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Mar 31 18:24:51 2017 Next Update: Sat Mar 31 18:24:51 2018 CRL Extensions: chains.sh: #8831: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331182452Z nextupdate=20180331182452Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 18:24:52 2017 Next Update: Sat Mar 31 18:24:52 2018 CRL Extensions: chains.sh: #8832: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170331182452Z nextupdate=20180331182452Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Mar 31 18:24:52 2017 Next Update: Sat Mar 31 18:24:52 2018 CRL Extensions: chains.sh: #8833: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170331182453Z nextupdate=20180331182453Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Mar 31 18:24:53 2017 Next Update: Sat Mar 31 18:24:53 2018 CRL Extensions: chains.sh: #8834: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170331182454Z addcert 14 20170331182454Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Mar 31 18:24:54 2017 Next Update: Sat Mar 31 18:24:52 2018 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Mar 31 18:24:54 2017 CRL Extensions: chains.sh: #8835: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331182455Z addcert 15 20170331182455Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 18:24:55 2017 Next Update: Sat Mar 31 18:24:52 2018 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Mar 31 18:24:55 2017 CRL Extensions: chains.sh: #8836: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8837: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8838: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #8839: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #8840: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #8841: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #8842: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #8843: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #8844: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #8845: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:23:32 2017 Not After : Thu Mar 31 18:23:32 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:e0:7c:39:f2:e8:66:1a:ca:4c:41:e0:c3:d4:81:51: 3e:d2:b9:c2:59:15:e8:90:d9:9c:6d:33:9f:ba:78:2b: 3b:6c:01:fd:34:62:78:d6:65:94:cb:fb:01:e0:8e:08: 87:d4:bc:a1:e6:81:ff:dd:36:1d:1e:0b:b7:44:bd:fa: a3:8c:e4:f7:4b:3a:70:ad:36:4c:a3:2c:49:9b:02:36: f4:c9:07:86:46:77:e9:9f:27:de:2e:65:27:99:63:69: 43:f1:68:f5:64:44:1e:16:6a:50:7c:a2:48:74:05:de: 02:03:52:f5:56:98:c4:c2:b4:0e:7c:66:91:a4:89:c3: 94:de:60:d8:09:06:a6:d2:1c:97:06:5b:65:9f:b6:d8: 94:85:6d:11:9d:bd:a7:16:10:42:37:96:e3:c6:2f:fa: 99:bc:f3:e3:1e:38:69:f7:92:2c:14:bb:33:b9:b6:34: 8a:b2:09:2c:ae:84:bf:66:c1:ab:a0:0a:b3:2e:d7:aa: 21:57:2c:ab:70:0f:e2:81:38:55:12:24:d4:d7:2c:df: b4:be:99:11:4a:d1:23:84:f9:a9:89:39:d0:dc:94:4e: 9a:91:0b:68:5e:8d:32:f8:13:52:20:04:42:4b:c7:55: e0:73:19:e8:84:77:b0:23:da:ff:d9:f7:12:0a:a8:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:4f:19:45:35:67:0a:a9:32:93:70:55:28:57:25:be: b5:98:cb:63:c3:e9:76:76:b6:e1:58:ed:d0:84:b0:a1: 2f:02:8e:5b:2d:89:17:28:e3:fb:70:53:84:00:b1:31: 57:15:f5:45:5e:ac:34:41:71:76:47:1c:d5:9e:6f:3a: 10:74:6b:95:e9:7f:0d:1b:53:a2:ce:80:be:9c:74:df: e7:33:ed:43:61:68:0a:47:98:c4:59:b2:40:d5:bf:ca: 85:f6:56:b6:d9:bd:4a:c0:e8:27:bb:d6:6d:36:09:f7: ff:61:bf:95:fc:f6:29:88:9a:f3:42:df:af:cf:86:f1: ad:94:ef:69:ba:37:9e:06:33:24:3d:7b:9a:c9:5e:2d: 97:af:48:50:64:63:fe:bd:da:d2:02:56:69:37:3b:f9: b5:d9:9a:d2:f7:c4:ea:fd:eb:91:c9:c3:79:69:06:d2: 97:32:6c:6f:82:08:04:2f:99:17:33:2a:b4:15:23:d1: 14:0b:92:eb:cb:88:20:79:67:53:2e:5e:ec:24:04:89: 9d:00:81:9c:4a:e3:55:04:83:79:bf:4c:3c:0a:e8:fa: 01:ee:bd:46:9b:1b:82:e6:a1:2d:01:0b:cf:ba:44:e8: 1b:55:5c:b9:72:22:f4:fa:a1:35:47:80:bc:54:51:48 Fingerprint (SHA-256): 7E:51:F4:01:0F:D9:35:6C:E0:1F:5A:6B:06:D0:01:A4:AF:2A:13:E9:E6:C6:A5:6D:7B:C9:29:FC:65:99:BF:8A Fingerprint (SHA1): 6A:C6:13:88:F5:29:06:F4:A3:EE:4A:FC:67:29:7A:9D:E9:BC:BE:D1 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #8846: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #8847: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:23:32 2017 Not After : Thu Mar 31 18:23:32 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:e0:7c:39:f2:e8:66:1a:ca:4c:41:e0:c3:d4:81:51: 3e:d2:b9:c2:59:15:e8:90:d9:9c:6d:33:9f:ba:78:2b: 3b:6c:01:fd:34:62:78:d6:65:94:cb:fb:01:e0:8e:08: 87:d4:bc:a1:e6:81:ff:dd:36:1d:1e:0b:b7:44:bd:fa: a3:8c:e4:f7:4b:3a:70:ad:36:4c:a3:2c:49:9b:02:36: f4:c9:07:86:46:77:e9:9f:27:de:2e:65:27:99:63:69: 43:f1:68:f5:64:44:1e:16:6a:50:7c:a2:48:74:05:de: 02:03:52:f5:56:98:c4:c2:b4:0e:7c:66:91:a4:89:c3: 94:de:60:d8:09:06:a6:d2:1c:97:06:5b:65:9f:b6:d8: 94:85:6d:11:9d:bd:a7:16:10:42:37:96:e3:c6:2f:fa: 99:bc:f3:e3:1e:38:69:f7:92:2c:14:bb:33:b9:b6:34: 8a:b2:09:2c:ae:84:bf:66:c1:ab:a0:0a:b3:2e:d7:aa: 21:57:2c:ab:70:0f:e2:81:38:55:12:24:d4:d7:2c:df: b4:be:99:11:4a:d1:23:84:f9:a9:89:39:d0:dc:94:4e: 9a:91:0b:68:5e:8d:32:f8:13:52:20:04:42:4b:c7:55: e0:73:19:e8:84:77:b0:23:da:ff:d9:f7:12:0a:a8:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:4f:19:45:35:67:0a:a9:32:93:70:55:28:57:25:be: b5:98:cb:63:c3:e9:76:76:b6:e1:58:ed:d0:84:b0:a1: 2f:02:8e:5b:2d:89:17:28:e3:fb:70:53:84:00:b1:31: 57:15:f5:45:5e:ac:34:41:71:76:47:1c:d5:9e:6f:3a: 10:74:6b:95:e9:7f:0d:1b:53:a2:ce:80:be:9c:74:df: e7:33:ed:43:61:68:0a:47:98:c4:59:b2:40:d5:bf:ca: 85:f6:56:b6:d9:bd:4a:c0:e8:27:bb:d6:6d:36:09:f7: ff:61:bf:95:fc:f6:29:88:9a:f3:42:df:af:cf:86:f1: ad:94:ef:69:ba:37:9e:06:33:24:3d:7b:9a:c9:5e:2d: 97:af:48:50:64:63:fe:bd:da:d2:02:56:69:37:3b:f9: b5:d9:9a:d2:f7:c4:ea:fd:eb:91:c9:c3:79:69:06:d2: 97:32:6c:6f:82:08:04:2f:99:17:33:2a:b4:15:23:d1: 14:0b:92:eb:cb:88:20:79:67:53:2e:5e:ec:24:04:89: 9d:00:81:9c:4a:e3:55:04:83:79:bf:4c:3c:0a:e8:fa: 01:ee:bd:46:9b:1b:82:e6:a1:2d:01:0b:cf:ba:44:e8: 1b:55:5c:b9:72:22:f4:fa:a1:35:47:80:bc:54:51:48 Fingerprint (SHA-256): 7E:51:F4:01:0F:D9:35:6C:E0:1F:5A:6B:06:D0:01:A4:AF:2A:13:E9:E6:C6:A5:6D:7B:C9:29:FC:65:99:BF:8A Fingerprint (SHA1): 6A:C6:13:88:F5:29:06:F4:A3:EE:4A:FC:67:29:7A:9D:E9:BC:BE:D1 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #8848: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #8849: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8850: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172693 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8851: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8852: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #8853: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8854: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 331172694 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8855: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8856: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8857: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331172465.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #8858: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331172439.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8859: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8860: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #8861: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331172465.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #8862: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 331172695 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8863: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8864: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8865: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331172465.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #8866: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331172440.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8867: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8868: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #8869: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8870: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 331172696 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8871: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8872: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8873: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331172465.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #8874: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331172441.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8875: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8876: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #8877: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331172465.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #8878: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331172442.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8879: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8880: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170331182618Z nextupdate=20180331182618Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Mar 31 18:26:18 2017 Next Update: Sat Mar 31 18:26:18 2018 CRL Extensions: chains.sh: #8881: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331182618Z nextupdate=20180331182619Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 18:26:18 2017 Next Update: Sat Mar 31 18:26:19 2018 CRL Extensions: chains.sh: #8882: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170331182619Z nextupdate=20180331182619Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Mar 31 18:26:19 2017 Next Update: Sat Mar 31 18:26:19 2018 CRL Extensions: chains.sh: #8883: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170331182620Z nextupdate=20180331182620Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Mar 31 18:26:20 2017 Next Update: Sat Mar 31 18:26:20 2018 CRL Extensions: chains.sh: #8884: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331182621Z addcert 20 20170331182621Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 18:26:21 2017 Next Update: Sat Mar 31 18:26:19 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Mar 31 18:26:21 2017 CRL Extensions: chains.sh: #8885: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331182622Z addcert 40 20170331182622Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 18:26:22 2017 Next Update: Sat Mar 31 18:26:19 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Mar 31 18:26:21 2017 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Mar 31 18:26:22 2017 CRL Extensions: chains.sh: #8886: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8887: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8888: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #8889: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172693 (0x13bd4b55) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:25:11 2017 Not After : Thu Mar 31 18:25:11 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:8e:d6:09:07:0b:14:6d:53:e5:ee:e3:89:6a:b7:b9: b9:30:c3:3f:14:5c:c9:b0:ba:90:70:7d:d6:b6:ce:25: e5:66:db:e6:83:ec:da:9c:58:df:c1:61:10:fa:af:dc: 26:a8:c1:8d:64:36:c4:e2:8b:8e:d2:06:63:fb:bf:bf: 8a:f9:91:90:8f:20:53:4c:df:69:6e:b2:1c:be:b4:22: 46:9c:5e:56:ec:9d:82:17:6d:03:19:1d:1a:ab:f0:d9: 93:25:40:0c:54:6a:f5:3b:61:ec:c1:25:c6:f0:27:dc: 65:9b:00:e2:6c:79:9e:27:79:4f:9f:cb:66:1a:2d:4b: 2e:b5:c4:90:e2:48:23:6b:57:c6:5b:d9:3d:a0:55:fa: fa:9e:35:12:c1:a5:bb:a0:31:ce:9a:54:6f:e1:76:36: d3:ea:91:d6:1e:de:fb:6c:3e:a0:07:f9:5b:c4:c6:00: f4:ce:1f:3c:25:c8:98:b4:ba:e9:2a:16:89:c5:da:08: 02:58:f5:40:58:38:5b:89:1f:9e:e9:f8:e2:68:a5:c4: 7a:c9:54:02:1b:39:c7:7b:6e:7e:1c:c5:20:cb:74:a9: ae:ed:56:1e:0d:86:39:b9:dd:3d:9c:22:78:92:83:de: dd:41:e0:ba:c9:39:75:40:72:e6:19:25:21:7d:ee:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 12:da:c3:64:41:13:ce:ba:d6:44:bf:68:a3:c9:67:4b: 25:4f:d7:d6:18:9b:40:62:13:73:7d:9e:60:6b:ee:8a: 92:80:42:9f:8d:e6:4b:b1:47:d6:da:29:19:8b:6b:34: eb:dc:39:3e:01:a5:a1:37:8a:96:42:48:d9:d2:b7:e2: cf:21:7f:4e:fd:a2:37:2f:8a:21:ab:07:e9:82:e4:ef: 9e:65:58:a7:d7:9b:10:55:69:95:de:93:fd:64:1e:a4: 71:2d:6c:60:59:1c:2e:48:05:c3:53:6b:93:a2:47:37: 0c:c7:92:37:89:82:35:da:a0:ea:45:5d:6c:06:47:b5: 07:c2:79:76:3d:eb:9a:76:2a:9d:fd:3b:19:53:b2:b8: 91:8b:86:6a:fa:30:bf:7f:9e:98:3c:48:2f:dd:5d:6f: d3:ea:27:88:22:a5:20:76:a0:64:02:15:4d:71:d2:c9: d3:5c:75:8b:9e:32:0a:4c:46:85:de:1b:67:ec:2a:89: 98:23:81:8c:b2:77:70:10:69:70:2b:ac:db:a1:e8:55: 20:78:ee:a1:af:f3:48:0a:8c:9e:b7:ae:dd:66:87:5a: dd:88:20:25:fa:e2:ce:25:02:10:9a:a4:e4:f5:da:18: c2:16:ff:55:c2:52:08:f5:c6:6a:ad:4d:bf:68:06:b6 Fingerprint (SHA-256): D7:B2:1D:A5:4B:EC:1F:13:31:EF:0F:06:AA:F2:D9:3F:D8:3C:3C:41:76:49:EE:10:1C:68:36:8F:25:A8:77:55 Fingerprint (SHA1): E2:21:C3:7E:EC:51:39:89:B9:02:5D:F6:FE:8E:AD:F5:6A:3F:22:FC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #8890: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #8891: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172693 (0x13bd4b55) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 18:25:11 2017 Not After : Thu Mar 31 18:25:11 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:8e:d6:09:07:0b:14:6d:53:e5:ee:e3:89:6a:b7:b9: b9:30:c3:3f:14:5c:c9:b0:ba:90:70:7d:d6:b6:ce:25: e5:66:db:e6:83:ec:da:9c:58:df:c1:61:10:fa:af:dc: 26:a8:c1:8d:64:36:c4:e2:8b:8e:d2:06:63:fb:bf:bf: 8a:f9:91:90:8f:20:53:4c:df:69:6e:b2:1c:be:b4:22: 46:9c:5e:56:ec:9d:82:17:6d:03:19:1d:1a:ab:f0:d9: 93:25:40:0c:54:6a:f5:3b:61:ec:c1:25:c6:f0:27:dc: 65:9b:00:e2:6c:79:9e:27:79:4f:9f:cb:66:1a:2d:4b: 2e:b5:c4:90:e2:48:23:6b:57:c6:5b:d9:3d:a0:55:fa: fa:9e:35:12:c1:a5:bb:a0:31:ce:9a:54:6f:e1:76:36: d3:ea:91:d6:1e:de:fb:6c:3e:a0:07:f9:5b:c4:c6:00: f4:ce:1f:3c:25:c8:98:b4:ba:e9:2a:16:89:c5:da:08: 02:58:f5:40:58:38:5b:89:1f:9e:e9:f8:e2:68:a5:c4: 7a:c9:54:02:1b:39:c7:7b:6e:7e:1c:c5:20:cb:74:a9: ae:ed:56:1e:0d:86:39:b9:dd:3d:9c:22:78:92:83:de: dd:41:e0:ba:c9:39:75:40:72:e6:19:25:21:7d:ee:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 12:da:c3:64:41:13:ce:ba:d6:44:bf:68:a3:c9:67:4b: 25:4f:d7:d6:18:9b:40:62:13:73:7d:9e:60:6b:ee:8a: 92:80:42:9f:8d:e6:4b:b1:47:d6:da:29:19:8b:6b:34: eb:dc:39:3e:01:a5:a1:37:8a:96:42:48:d9:d2:b7:e2: cf:21:7f:4e:fd:a2:37:2f:8a:21:ab:07:e9:82:e4:ef: 9e:65:58:a7:d7:9b:10:55:69:95:de:93:fd:64:1e:a4: 71:2d:6c:60:59:1c:2e:48:05:c3:53:6b:93:a2:47:37: 0c:c7:92:37:89:82:35:da:a0:ea:45:5d:6c:06:47:b5: 07:c2:79:76:3d:eb:9a:76:2a:9d:fd:3b:19:53:b2:b8: 91:8b:86:6a:fa:30:bf:7f:9e:98:3c:48:2f:dd:5d:6f: d3:ea:27:88:22:a5:20:76:a0:64:02:15:4d:71:d2:c9: d3:5c:75:8b:9e:32:0a:4c:46:85:de:1b:67:ec:2a:89: 98:23:81:8c:b2:77:70:10:69:70:2b:ac:db:a1:e8:55: 20:78:ee:a1:af:f3:48:0a:8c:9e:b7:ae:dd:66:87:5a: dd:88:20:25:fa:e2:ce:25:02:10:9a:a4:e4:f5:da:18: c2:16:ff:55:c2:52:08:f5:c6:6a:ad:4d:bf:68:06:b6 Fingerprint (SHA-256): D7:B2:1D:A5:4B:EC:1F:13:31:EF:0F:06:AA:F2:D9:3F:D8:3C:3C:41:76:49:EE:10:1C:68:36:8F:25:A8:77:55 Fingerprint (SHA1): E2:21:C3:7E:EC:51:39:89:B9:02:5D:F6:FE:8E:AD:F5:6A:3F:22:FC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #8892: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #8893: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #8894: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172697 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8895: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #8896: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8897: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8898: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 331172698 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8899: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8900: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8901: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8902: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331172699 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8903: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8904: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8905: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8906: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 331172700 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8907: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8908: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #8909: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -m 331172701 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8910: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #8911: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #8912: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8913: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 331172702 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8914: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8915: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #8916: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8917: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 331172703 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8918: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8919: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #8920: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #8921: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #8922: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172697 (0x13bd4b59) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 18:26:33 2017 Not After : Thu Mar 31 18:26:33 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:62:7b:ad:06:ac:20:67:cd:c0:75:55:76:90:0a:13: 61:81:ce:b0:2e:88:00:3b:49:f6:1d:4c:c4:76:b5:86: 90:60:3d:00:f5:52:b2:9b:f4:d5:c6:9a:16:56:90:0b: 44:a4:72:35:1e:31:a4:6d:2e:96:40:d0:1a:62:b0:62: cb:1f:ae:ed:2c:d3:cf:c5:5d:06:9b:30:37:c7:10:69: b8:48:ce:32:70:1a:44:9a:f6:8a:14:67:c5:ad:d6:d6: f3:6f:3a:11:a0:42:f1:e3:99:d2:8c:42:2c:03:da:0c: 00:53:5f:99:1f:04:21:db:3a:66:89:fe:48:85:76:fd: 58:15:30:01:b6:6d:39:0a:54:6a:ed:2a:56:6e:65:bf: 57:38:ad:85:ad:28:33:c8:f8:25:75:b8:89:19:33:bf: f6:a8:18:50:b1:e2:35:48:d2:71:56:30:d6:d8:fe:25: df:88:c3:f0:01:66:a7:19:f7:fe:9a:6a:94:b7:9f:45: d3:4d:a7:10:c5:7c:0f:c2:97:e9:a8:5f:21:1b:28:84: 4b:df:0d:35:37:8a:40:1d:d1:93:83:e5:a6:28:89:bd: e1:79:61:3b:87:55:99:ef:f5:15:8c:bb:b4:7f:50:ce: a3:04:4b:69:b0:a2:df:ca:78:8f:31:d4:69:78:18:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:cc:0e:42:fb:f9:a1:8a:11:61:fc:fe:b9:e6:e6:3a: 7d:62:fc:09:f8:cf:3c:18:9d:8e:ba:05:00:6a:b9:3e: 6d:54:66:5f:73:6c:77:d1:ff:01:8d:01:75:65:f0:c8: df:2d:ce:f4:82:9d:62:aa:1c:ca:f4:ac:30:7a:21:4f: c7:13:ec:8d:86:45:e8:57:bb:d8:e3:48:c0:4b:bb:ee: 97:40:23:b6:c8:23:02:51:8a:27:3c:12:46:d1:0a:67: 43:bc:fe:a8:fc:f9:e2:a8:44:f9:ec:d9:c5:41:e2:c6: 61:b3:1d:0c:ff:9e:23:9c:d3:b0:5d:cf:52:bc:3f:b1: cb:b3:c3:99:85:d9:e3:26:c5:e1:1d:ed:71:cb:1b:d9: 16:ca:05:51:d2:7c:25:65:6f:e1:8d:43:25:dd:ec:70: 8c:88:ee:29:41:eb:97:72:7a:24:b8:d2:74:41:79:fe: 13:e9:ee:ab:89:22:06:ec:1c:5c:75:22:1d:27:2a:82: 20:58:3e:6e:49:a7:b6:6b:13:2b:9f:39:ab:92:f8:8c: ed:83:35:6a:d0:a4:24:39:cb:52:09:54:a9:fb:ff:80: db:ca:91:2a:5d:b0:16:3d:0a:a3:77:b2:5f:bd:0d:6a: f1:95:78:ea:46:c0:cc:7a:ae:fb:2d:a7:94:5c:df:2f Fingerprint (SHA-256): 30:AB:14:93:D4:E5:7B:C3:EE:9E:73:B7:75:F1:FB:B6:7D:2D:BC:67:21:58:34:E4:36:21:4E:C5:6A:80:F5:75 Fingerprint (SHA1): F3:6A:B3:0B:44:26:BE:78:B7:0C:49:01:5E:6F:68:27:D5:61:1A:F6 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8923: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172699 (0x13bd4b5b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 18:27:04 2017 Not After : Thu Mar 31 18:27:04 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:04:ed:e0:ef:3f:ec:18:97:79:e1:65:34:e7:cd:79: fc:8a:c4:4b:7e:44:7b:b5:01:79:a5:5b:47:f6:b5:38: 9a:c9:40:fd:31:1f:b0:dc:66:7f:d3:c9:78:c7:47:b0: c0:fd:0c:da:ae:89:e8:04:27:69:c1:8c:13:61:22:54: 65:05:69:2b:e7:26:e4:5f:30:8f:d2:10:03:c3:6a:a3: a4:bc:1f:38:7b:ac:89:bd:06:04:b5:ff:d1:08:fb:35: 48:b2:96:51:8b:a0:d5:f2:fd:00:06:c8:d5:bd:1c:58: ae:d2:83:90:1a:44:9f:bd:cb:8f:2a:05:91:7b:31:ef: a0:52:ff:2d:39:ff:d3:eb:5b:46:05:ac:88:ee:85:3a: 82:75:5f:0a:43:e7:41:fd:5f:6d:7f:c0:ba:a5:89:6e: ee:cf:8d:98:f8:ca:d9:db:b3:ed:cb:92:7e:37:95:7f: 48:d8:5b:6a:50:77:dd:70:b7:92:9c:fa:cf:3b:cc:75: 94:4d:b4:34:b2:ce:4f:f2:d3:26:78:34:32:d2:ef:10: 2a:ce:57:3d:0c:c7:e0:e7:85:ee:d9:88:78:bf:01:c8: 43:67:fa:c8:10:32:e3:b5:5e:39:2c:45:39:8a:74:6c: ab:81:e3:c6:53:4a:0d:ce:2d:4e:ec:3d:8f:91:04:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:2d:29:46:79:6d:7c:3a:86:df:60:90:20:92:24:f7: bf:56:fa:a9:a1:35:01:dd:32:0a:13:e5:64:d6:ab:60: 6e:b1:6b:a6:21:1a:7d:57:b1:89:53:f3:1d:33:22:dd: eb:25:7f:1c:78:ff:07:bf:d6:a9:87:96:24:00:8a:da: 7d:d9:2f:66:39:ad:0e:98:6b:32:f0:3e:7d:f1:63:2b: dc:81:62:1b:c4:ed:16:c7:6d:4d:79:08:e6:0e:5d:fb: 03:0b:f1:51:59:1b:c5:1e:3c:a2:a8:82:ee:89:6a:73: 4a:4c:fe:d4:63:c1:d4:c0:3f:88:a7:fa:a6:cc:ab:28: ed:d0:73:50:14:a4:d5:29:f6:ff:e2:12:10:87:fd:c8: 19:63:36:70:3b:67:4c:93:c6:f6:b8:dd:a4:aa:0c:af: 83:0c:af:5d:db:9f:4f:76:85:6b:30:ab:08:57:24:c6: 9b:3b:69:5c:fc:15:74:68:ac:20:e0:ff:2c:b2:9d:fd: cf:84:4a:c2:2a:91:f2:ba:ed:9e:9d:88:af:e5:9c:52: 7a:6a:f1:23:c4:60:90:9e:d4:b1:e4:2c:31:dd:46:02: f5:b3:29:66:2a:f2:6b:e9:06:9c:b3:9f:12:a7:9f:58: 11:d9:41:ec:5e:c2:1a:ca:b3:92:b4:e0:bd:d9:99:ad Fingerprint (SHA-256): 2F:7D:76:A7:F2:96:35:1F:8C:41:E8:1C:01:C3:8E:ED:C9:AE:3A:52:58:AC:A6:5B:97:67:A5:F6:3F:59:B4:25 Fingerprint (SHA1): BA:4D:37:ED:0B:B1:66:4B:BC:18:1F:23:8C:F8:AB:3D:30:18:B0:1D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #8924: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172697 (0x13bd4b59) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 18:26:33 2017 Not After : Thu Mar 31 18:26:33 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:62:7b:ad:06:ac:20:67:cd:c0:75:55:76:90:0a:13: 61:81:ce:b0:2e:88:00:3b:49:f6:1d:4c:c4:76:b5:86: 90:60:3d:00:f5:52:b2:9b:f4:d5:c6:9a:16:56:90:0b: 44:a4:72:35:1e:31:a4:6d:2e:96:40:d0:1a:62:b0:62: cb:1f:ae:ed:2c:d3:cf:c5:5d:06:9b:30:37:c7:10:69: b8:48:ce:32:70:1a:44:9a:f6:8a:14:67:c5:ad:d6:d6: f3:6f:3a:11:a0:42:f1:e3:99:d2:8c:42:2c:03:da:0c: 00:53:5f:99:1f:04:21:db:3a:66:89:fe:48:85:76:fd: 58:15:30:01:b6:6d:39:0a:54:6a:ed:2a:56:6e:65:bf: 57:38:ad:85:ad:28:33:c8:f8:25:75:b8:89:19:33:bf: f6:a8:18:50:b1:e2:35:48:d2:71:56:30:d6:d8:fe:25: df:88:c3:f0:01:66:a7:19:f7:fe:9a:6a:94:b7:9f:45: d3:4d:a7:10:c5:7c:0f:c2:97:e9:a8:5f:21:1b:28:84: 4b:df:0d:35:37:8a:40:1d:d1:93:83:e5:a6:28:89:bd: e1:79:61:3b:87:55:99:ef:f5:15:8c:bb:b4:7f:50:ce: a3:04:4b:69:b0:a2:df:ca:78:8f:31:d4:69:78:18:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:cc:0e:42:fb:f9:a1:8a:11:61:fc:fe:b9:e6:e6:3a: 7d:62:fc:09:f8:cf:3c:18:9d:8e:ba:05:00:6a:b9:3e: 6d:54:66:5f:73:6c:77:d1:ff:01:8d:01:75:65:f0:c8: df:2d:ce:f4:82:9d:62:aa:1c:ca:f4:ac:30:7a:21:4f: c7:13:ec:8d:86:45:e8:57:bb:d8:e3:48:c0:4b:bb:ee: 97:40:23:b6:c8:23:02:51:8a:27:3c:12:46:d1:0a:67: 43:bc:fe:a8:fc:f9:e2:a8:44:f9:ec:d9:c5:41:e2:c6: 61:b3:1d:0c:ff:9e:23:9c:d3:b0:5d:cf:52:bc:3f:b1: cb:b3:c3:99:85:d9:e3:26:c5:e1:1d:ed:71:cb:1b:d9: 16:ca:05:51:d2:7c:25:65:6f:e1:8d:43:25:dd:ec:70: 8c:88:ee:29:41:eb:97:72:7a:24:b8:d2:74:41:79:fe: 13:e9:ee:ab:89:22:06:ec:1c:5c:75:22:1d:27:2a:82: 20:58:3e:6e:49:a7:b6:6b:13:2b:9f:39:ab:92:f8:8c: ed:83:35:6a:d0:a4:24:39:cb:52:09:54:a9:fb:ff:80: db:ca:91:2a:5d:b0:16:3d:0a:a3:77:b2:5f:bd:0d:6a: f1:95:78:ea:46:c0:cc:7a:ae:fb:2d:a7:94:5c:df:2f Fingerprint (SHA-256): 30:AB:14:93:D4:E5:7B:C3:EE:9E:73:B7:75:F1:FB:B6:7D:2D:BC:67:21:58:34:E4:36:21:4E:C5:6A:80:F5:75 Fingerprint (SHA1): F3:6A:B3:0B:44:26:BE:78:B7:0C:49:01:5E:6F:68:27:D5:61:1A:F6 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8925: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #8926: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172697 (0x13bd4b59) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 18:26:33 2017 Not After : Thu Mar 31 18:26:33 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:62:7b:ad:06:ac:20:67:cd:c0:75:55:76:90:0a:13: 61:81:ce:b0:2e:88:00:3b:49:f6:1d:4c:c4:76:b5:86: 90:60:3d:00:f5:52:b2:9b:f4:d5:c6:9a:16:56:90:0b: 44:a4:72:35:1e:31:a4:6d:2e:96:40:d0:1a:62:b0:62: cb:1f:ae:ed:2c:d3:cf:c5:5d:06:9b:30:37:c7:10:69: b8:48:ce:32:70:1a:44:9a:f6:8a:14:67:c5:ad:d6:d6: f3:6f:3a:11:a0:42:f1:e3:99:d2:8c:42:2c:03:da:0c: 00:53:5f:99:1f:04:21:db:3a:66:89:fe:48:85:76:fd: 58:15:30:01:b6:6d:39:0a:54:6a:ed:2a:56:6e:65:bf: 57:38:ad:85:ad:28:33:c8:f8:25:75:b8:89:19:33:bf: f6:a8:18:50:b1:e2:35:48:d2:71:56:30:d6:d8:fe:25: df:88:c3:f0:01:66:a7:19:f7:fe:9a:6a:94:b7:9f:45: d3:4d:a7:10:c5:7c:0f:c2:97:e9:a8:5f:21:1b:28:84: 4b:df:0d:35:37:8a:40:1d:d1:93:83:e5:a6:28:89:bd: e1:79:61:3b:87:55:99:ef:f5:15:8c:bb:b4:7f:50:ce: a3:04:4b:69:b0:a2:df:ca:78:8f:31:d4:69:78:18:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:cc:0e:42:fb:f9:a1:8a:11:61:fc:fe:b9:e6:e6:3a: 7d:62:fc:09:f8:cf:3c:18:9d:8e:ba:05:00:6a:b9:3e: 6d:54:66:5f:73:6c:77:d1:ff:01:8d:01:75:65:f0:c8: df:2d:ce:f4:82:9d:62:aa:1c:ca:f4:ac:30:7a:21:4f: c7:13:ec:8d:86:45:e8:57:bb:d8:e3:48:c0:4b:bb:ee: 97:40:23:b6:c8:23:02:51:8a:27:3c:12:46:d1:0a:67: 43:bc:fe:a8:fc:f9:e2:a8:44:f9:ec:d9:c5:41:e2:c6: 61:b3:1d:0c:ff:9e:23:9c:d3:b0:5d:cf:52:bc:3f:b1: cb:b3:c3:99:85:d9:e3:26:c5:e1:1d:ed:71:cb:1b:d9: 16:ca:05:51:d2:7c:25:65:6f:e1:8d:43:25:dd:ec:70: 8c:88:ee:29:41:eb:97:72:7a:24:b8:d2:74:41:79:fe: 13:e9:ee:ab:89:22:06:ec:1c:5c:75:22:1d:27:2a:82: 20:58:3e:6e:49:a7:b6:6b:13:2b:9f:39:ab:92:f8:8c: ed:83:35:6a:d0:a4:24:39:cb:52:09:54:a9:fb:ff:80: db:ca:91:2a:5d:b0:16:3d:0a:a3:77:b2:5f:bd:0d:6a: f1:95:78:ea:46:c0:cc:7a:ae:fb:2d:a7:94:5c:df:2f Fingerprint (SHA-256): 30:AB:14:93:D4:E5:7B:C3:EE:9E:73:B7:75:F1:FB:B6:7D:2D:BC:67:21:58:34:E4:36:21:4E:C5:6A:80:F5:75 Fingerprint (SHA1): F3:6A:B3:0B:44:26:BE:78:B7:0C:49:01:5E:6F:68:27:D5:61:1A:F6 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8927: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172699 (0x13bd4b5b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 18:27:04 2017 Not After : Thu Mar 31 18:27:04 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:04:ed:e0:ef:3f:ec:18:97:79:e1:65:34:e7:cd:79: fc:8a:c4:4b:7e:44:7b:b5:01:79:a5:5b:47:f6:b5:38: 9a:c9:40:fd:31:1f:b0:dc:66:7f:d3:c9:78:c7:47:b0: c0:fd:0c:da:ae:89:e8:04:27:69:c1:8c:13:61:22:54: 65:05:69:2b:e7:26:e4:5f:30:8f:d2:10:03:c3:6a:a3: a4:bc:1f:38:7b:ac:89:bd:06:04:b5:ff:d1:08:fb:35: 48:b2:96:51:8b:a0:d5:f2:fd:00:06:c8:d5:bd:1c:58: ae:d2:83:90:1a:44:9f:bd:cb:8f:2a:05:91:7b:31:ef: a0:52:ff:2d:39:ff:d3:eb:5b:46:05:ac:88:ee:85:3a: 82:75:5f:0a:43:e7:41:fd:5f:6d:7f:c0:ba:a5:89:6e: ee:cf:8d:98:f8:ca:d9:db:b3:ed:cb:92:7e:37:95:7f: 48:d8:5b:6a:50:77:dd:70:b7:92:9c:fa:cf:3b:cc:75: 94:4d:b4:34:b2:ce:4f:f2:d3:26:78:34:32:d2:ef:10: 2a:ce:57:3d:0c:c7:e0:e7:85:ee:d9:88:78:bf:01:c8: 43:67:fa:c8:10:32:e3:b5:5e:39:2c:45:39:8a:74:6c: ab:81:e3:c6:53:4a:0d:ce:2d:4e:ec:3d:8f:91:04:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:2d:29:46:79:6d:7c:3a:86:df:60:90:20:92:24:f7: bf:56:fa:a9:a1:35:01:dd:32:0a:13:e5:64:d6:ab:60: 6e:b1:6b:a6:21:1a:7d:57:b1:89:53:f3:1d:33:22:dd: eb:25:7f:1c:78:ff:07:bf:d6:a9:87:96:24:00:8a:da: 7d:d9:2f:66:39:ad:0e:98:6b:32:f0:3e:7d:f1:63:2b: dc:81:62:1b:c4:ed:16:c7:6d:4d:79:08:e6:0e:5d:fb: 03:0b:f1:51:59:1b:c5:1e:3c:a2:a8:82:ee:89:6a:73: 4a:4c:fe:d4:63:c1:d4:c0:3f:88:a7:fa:a6:cc:ab:28: ed:d0:73:50:14:a4:d5:29:f6:ff:e2:12:10:87:fd:c8: 19:63:36:70:3b:67:4c:93:c6:f6:b8:dd:a4:aa:0c:af: 83:0c:af:5d:db:9f:4f:76:85:6b:30:ab:08:57:24:c6: 9b:3b:69:5c:fc:15:74:68:ac:20:e0:ff:2c:b2:9d:fd: cf:84:4a:c2:2a:91:f2:ba:ed:9e:9d:88:af:e5:9c:52: 7a:6a:f1:23:c4:60:90:9e:d4:b1:e4:2c:31:dd:46:02: f5:b3:29:66:2a:f2:6b:e9:06:9c:b3:9f:12:a7:9f:58: 11:d9:41:ec:5e:c2:1a:ca:b3:92:b4:e0:bd:d9:99:ad Fingerprint (SHA-256): 2F:7D:76:A7:F2:96:35:1F:8C:41:E8:1C:01:C3:8E:ED:C9:AE:3A:52:58:AC:A6:5B:97:67:A5:F6:3F:59:B4:25 Fingerprint (SHA1): BA:4D:37:ED:0B:B1:66:4B:BC:18:1F:23:8C:F8:AB:3D:30:18:B0:1D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #8928: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #8929: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #8930: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #8931: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172697 (0x13bd4b59) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 18:26:33 2017 Not After : Thu Mar 31 18:26:33 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:62:7b:ad:06:ac:20:67:cd:c0:75:55:76:90:0a:13: 61:81:ce:b0:2e:88:00:3b:49:f6:1d:4c:c4:76:b5:86: 90:60:3d:00:f5:52:b2:9b:f4:d5:c6:9a:16:56:90:0b: 44:a4:72:35:1e:31:a4:6d:2e:96:40:d0:1a:62:b0:62: cb:1f:ae:ed:2c:d3:cf:c5:5d:06:9b:30:37:c7:10:69: b8:48:ce:32:70:1a:44:9a:f6:8a:14:67:c5:ad:d6:d6: f3:6f:3a:11:a0:42:f1:e3:99:d2:8c:42:2c:03:da:0c: 00:53:5f:99:1f:04:21:db:3a:66:89:fe:48:85:76:fd: 58:15:30:01:b6:6d:39:0a:54:6a:ed:2a:56:6e:65:bf: 57:38:ad:85:ad:28:33:c8:f8:25:75:b8:89:19:33:bf: f6:a8:18:50:b1:e2:35:48:d2:71:56:30:d6:d8:fe:25: df:88:c3:f0:01:66:a7:19:f7:fe:9a:6a:94:b7:9f:45: d3:4d:a7:10:c5:7c:0f:c2:97:e9:a8:5f:21:1b:28:84: 4b:df:0d:35:37:8a:40:1d:d1:93:83:e5:a6:28:89:bd: e1:79:61:3b:87:55:99:ef:f5:15:8c:bb:b4:7f:50:ce: a3:04:4b:69:b0:a2:df:ca:78:8f:31:d4:69:78:18:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:cc:0e:42:fb:f9:a1:8a:11:61:fc:fe:b9:e6:e6:3a: 7d:62:fc:09:f8:cf:3c:18:9d:8e:ba:05:00:6a:b9:3e: 6d:54:66:5f:73:6c:77:d1:ff:01:8d:01:75:65:f0:c8: df:2d:ce:f4:82:9d:62:aa:1c:ca:f4:ac:30:7a:21:4f: c7:13:ec:8d:86:45:e8:57:bb:d8:e3:48:c0:4b:bb:ee: 97:40:23:b6:c8:23:02:51:8a:27:3c:12:46:d1:0a:67: 43:bc:fe:a8:fc:f9:e2:a8:44:f9:ec:d9:c5:41:e2:c6: 61:b3:1d:0c:ff:9e:23:9c:d3:b0:5d:cf:52:bc:3f:b1: cb:b3:c3:99:85:d9:e3:26:c5:e1:1d:ed:71:cb:1b:d9: 16:ca:05:51:d2:7c:25:65:6f:e1:8d:43:25:dd:ec:70: 8c:88:ee:29:41:eb:97:72:7a:24:b8:d2:74:41:79:fe: 13:e9:ee:ab:89:22:06:ec:1c:5c:75:22:1d:27:2a:82: 20:58:3e:6e:49:a7:b6:6b:13:2b:9f:39:ab:92:f8:8c: ed:83:35:6a:d0:a4:24:39:cb:52:09:54:a9:fb:ff:80: db:ca:91:2a:5d:b0:16:3d:0a:a3:77:b2:5f:bd:0d:6a: f1:95:78:ea:46:c0:cc:7a:ae:fb:2d:a7:94:5c:df:2f Fingerprint (SHA-256): 30:AB:14:93:D4:E5:7B:C3:EE:9E:73:B7:75:F1:FB:B6:7D:2D:BC:67:21:58:34:E4:36:21:4E:C5:6A:80:F5:75 Fingerprint (SHA1): F3:6A:B3:0B:44:26:BE:78:B7:0C:49:01:5E:6F:68:27:D5:61:1A:F6 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8932: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172701 (0x13bd4b5d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Mar 31 18:27:28 2017 Not After : Thu Mar 31 18:27:28 2067 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:79:0c:1b:96:c0:ac:6c:28:02:11:5f:ff:aa:b3:df: 9d:fd:d2:aa:6c:cf:19:08:0a:7c:db:c2:88:8c:7d:78: 9b:83:e5:7c:dc:50:e4:e2:ab:6b:2f:9b:4e:d1:a6:24: 5f:f4:c2:a5:1c:42:ac:99:bd:83:77:01:83:a9:d6:bf: 74:8f:69:fe:97:85:19:84:dd:34:c7:cd:17:b3:ef:81: fb:1e:48:c8:e6:a7:62:d8:2d:69:6c:bc:0c:01:5e:c1: ef:f8:51:33:9e:92:e3:9e:47:ad:d4:aa:d1:fa:8e:f1: 27:32:48:73:15:6d:bc:87:13:2e:16:d1:ce:86:e9:ef: f1:7b:77:5a:a9:e5:83:41:6d:64:5e:b8:40:f7:32:3c: 74:73:8e:47:44:1a:fd:b5:b7:83:4c:a3:63:12:01:c3: de:d5:21:7b:e1:e2:51:ac:59:20:cc:ea:5b:84:bb:06: cf:b0:11:50:77:03:7f:46:d7:ca:1e:30:81:f5:50:24: e5:93:7a:6c:11:57:eb:8e:96:03:af:9a:52:34:00:3f: 74:b9:2b:d0:71:5a:34:0a:60:5c:ff:f7:28:e1:21:af: 35:4b:34:69:02:48:e7:91:01:4f:97:4c:50:f5:4b:5e: 61:98:4c:66:e3:75:d2:82:ef:96:7f:1c:5d:a6:1a:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 64:d8:f2:96:52:72:de:be:ff:e4:5b:3e:11:fa:01:4b: a7:47:81:92:96:d0:0d:61:95:6a:30:ed:5a:bc:99:b1: f2:ee:0c:bd:ef:9c:a7:55:24:8d:37:2a:58:a0:85:3f: 36:b2:f1:8f:85:e3:6e:56:aa:16:cc:73:6a:85:34:ff: a8:77:12:36:db:47:2a:af:a4:72:53:af:3e:22:bc:ac: b4:40:5d:74:52:88:ca:0e:2d:29:22:cb:f3:97:f4:b1: 04:54:8f:51:ee:12:79:67:72:56:86:d4:6f:c1:aa:02: 9c:13:1c:81:26:15:b1:7a:73:62:0b:7e:40:30:4c:47: 95:1d:67:4b:2f:b8:00:26:14:65:9c:3b:b4:66:d7:67: fb:f2:42:97:84:01:1d:18:36:6b:f3:93:b0:67:74:27: c6:a7:61:ac:63:aa:bb:5b:d0:78:e8:22:2a:3c:06:01: 1f:5c:ac:fd:72:0b:49:ff:f3:bf:a6:86:15:15:38:62: be:88:df:1c:84:52:59:c3:cf:5a:4d:37:b8:9e:de:ec: 68:e2:9b:57:de:66:b3:18:b9:63:25:bc:de:bc:10:07: 5c:30:50:00:13:42:b1:aa:35:91:43:37:03:6c:8a:77: 64:2e:52:e4:84:91:a5:c7:f1:30:cc:45:f6:34:72:31 Fingerprint (SHA-256): C4:6D:DE:68:7E:9B:E0:47:96:A1:17:3F:1A:B2:B7:16:A1:0F:72:43:6F:07:F1:FB:6E:83:72:D9:C0:4D:B5:3E Fingerprint (SHA1): 6E:48:FA:28:DE:3F:C4:18:38:1E:D9:07:6B:2D:EF:FD:39:29:AF:53 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #8933: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172697 (0x13bd4b59) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 18:26:33 2017 Not After : Thu Mar 31 18:26:33 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:62:7b:ad:06:ac:20:67:cd:c0:75:55:76:90:0a:13: 61:81:ce:b0:2e:88:00:3b:49:f6:1d:4c:c4:76:b5:86: 90:60:3d:00:f5:52:b2:9b:f4:d5:c6:9a:16:56:90:0b: 44:a4:72:35:1e:31:a4:6d:2e:96:40:d0:1a:62:b0:62: cb:1f:ae:ed:2c:d3:cf:c5:5d:06:9b:30:37:c7:10:69: b8:48:ce:32:70:1a:44:9a:f6:8a:14:67:c5:ad:d6:d6: f3:6f:3a:11:a0:42:f1:e3:99:d2:8c:42:2c:03:da:0c: 00:53:5f:99:1f:04:21:db:3a:66:89:fe:48:85:76:fd: 58:15:30:01:b6:6d:39:0a:54:6a:ed:2a:56:6e:65:bf: 57:38:ad:85:ad:28:33:c8:f8:25:75:b8:89:19:33:bf: f6:a8:18:50:b1:e2:35:48:d2:71:56:30:d6:d8:fe:25: df:88:c3:f0:01:66:a7:19:f7:fe:9a:6a:94:b7:9f:45: d3:4d:a7:10:c5:7c:0f:c2:97:e9:a8:5f:21:1b:28:84: 4b:df:0d:35:37:8a:40:1d:d1:93:83:e5:a6:28:89:bd: e1:79:61:3b:87:55:99:ef:f5:15:8c:bb:b4:7f:50:ce: a3:04:4b:69:b0:a2:df:ca:78:8f:31:d4:69:78:18:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:cc:0e:42:fb:f9:a1:8a:11:61:fc:fe:b9:e6:e6:3a: 7d:62:fc:09:f8:cf:3c:18:9d:8e:ba:05:00:6a:b9:3e: 6d:54:66:5f:73:6c:77:d1:ff:01:8d:01:75:65:f0:c8: df:2d:ce:f4:82:9d:62:aa:1c:ca:f4:ac:30:7a:21:4f: c7:13:ec:8d:86:45:e8:57:bb:d8:e3:48:c0:4b:bb:ee: 97:40:23:b6:c8:23:02:51:8a:27:3c:12:46:d1:0a:67: 43:bc:fe:a8:fc:f9:e2:a8:44:f9:ec:d9:c5:41:e2:c6: 61:b3:1d:0c:ff:9e:23:9c:d3:b0:5d:cf:52:bc:3f:b1: cb:b3:c3:99:85:d9:e3:26:c5:e1:1d:ed:71:cb:1b:d9: 16:ca:05:51:d2:7c:25:65:6f:e1:8d:43:25:dd:ec:70: 8c:88:ee:29:41:eb:97:72:7a:24:b8:d2:74:41:79:fe: 13:e9:ee:ab:89:22:06:ec:1c:5c:75:22:1d:27:2a:82: 20:58:3e:6e:49:a7:b6:6b:13:2b:9f:39:ab:92:f8:8c: ed:83:35:6a:d0:a4:24:39:cb:52:09:54:a9:fb:ff:80: db:ca:91:2a:5d:b0:16:3d:0a:a3:77:b2:5f:bd:0d:6a: f1:95:78:ea:46:c0:cc:7a:ae:fb:2d:a7:94:5c:df:2f Fingerprint (SHA-256): 30:AB:14:93:D4:E5:7B:C3:EE:9E:73:B7:75:F1:FB:B6:7D:2D:BC:67:21:58:34:E4:36:21:4E:C5:6A:80:F5:75 Fingerprint (SHA1): F3:6A:B3:0B:44:26:BE:78:B7:0C:49:01:5E:6F:68:27:D5:61:1A:F6 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8934: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #8935: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #8936: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #8937: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #8938: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #8939: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331172702 (0x13bd4b5e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Mar 31 18:28:00 2017 Not After : Thu Mar 31 18:28:00 2022 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:25:bc:69:6e:4a:e8:ac:bc:87:83:37:03:3a:db:de: 07:7f:f0:92:27:0b:1f:fa:e3:7f:cc:45:03:11:4c:24: cd:05:8c:2b:83:78:de:26:60:00:07:26:6a:70:33:49: 40:9f:a9:03:49:4d:ff:66:05:4e:78:02:83:f9:44:e3: 4d:a2:9f:3d:00:fc:af:81:73:bc:f3:d7:7c:70:2a:ea: da:03:15:da:a9:d1:7a:33:06:53:fa:0f:1f:2e:d2:d9: 2e:b8:7d:4a:30:f8:d0:e1:41:4e:ee:bf:23:df:5b:24: cb:d6:a6:fb:44:d0:53:2f:63:93:37:e9:fd:1e:fa:23: 50:ed:d7:24:50:24:50:85:60:a6:90:6b:33:aa:44:65: e6:ba:7e:d9:b5:f0:da:a8:5a:cd:75:6e:d1:d5:0c:e2: b2:93:65:b0:b4:15:d6:ec:90:85:9c:56:31:dc:9b:fe: 43:42:4c:33:58:7e:27:ea:d9:3e:ff:a8:5f:35:52:e3: 70:ed:20:48:ec:b8:5b:45:46:31:b5:a3:db:c5:35:8c: 42:25:3b:d0:17:c6:4f:58:36:28:fb:1b:4e:99:ea:ec: 94:4c:b4:31:80:e8:d1:05:fe:d7:a8:b7:4a:fd:9a:74: b1:a2:2e:f1:c5:70:50:53:6e:5c:3d:9c:37:94:29:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:79:4c:28:d4:3b:66:b4:46:29:9f:9b:90:5b:c2:b9: 67:6a:c9:3b:44:1d:98:93:c3:73:73:4a:ee:b0:94:09: f3:8b:d2:98:62:ca:fd:de:3b:b3:c8:60:f6:72:a3:18: 82:46:50:36:52:91:46:41:c6:eb:4b:65:b2:d3:5b:ac: e3:23:65:e2:92:cf:29:0d:53:a5:00:86:63:de:c4:f3: 7b:0f:8c:1e:3e:b8:50:44:d6:2e:7b:e4:57:47:61:41: be:07:73:d2:47:13:b8:35:35:9b:ff:d7:6c:8f:1f:8b: 4f:2b:7a:ec:65:42:f1:7f:16:31:2e:36:59:d9:55:fc: cb:fa:08:65:14:09:ed:0b:48:30:64:25:a7:39:1b:99: ba:79:de:fe:11:a7:d8:68:f3:65:5a:98:c7:ec:c3:bb: a8:eb:4a:db:0d:5b:77:1a:b8:a1:6d:86:cd:f2:03:7e: 46:e6:99:10:b9:0a:2e:a8:2c:9d:6f:d1:b5:c2:30:d5: 7f:11:a1:98:3d:08:ef:de:2c:91:c5:f5:3d:5f:d5:e1: 7f:91:7a:25:fd:b9:4e:16:cf:46:e0:ca:83:48:31:dd: 0d:45:58:6f:d7:f6:60:42:1c:24:ec:46:ab:de:a7:0a: 6d:00:d6:8e:0f:37:d8:c4:e4:9d:01:ea:b7:08:c8:2c Fingerprint (SHA-256): A0:20:46:8B:1E:44:C5:D3:09:F8:35:65:E8:51:66:A4:A9:A9:C6:41:C1:E6:A7:CE:41:7C:F1:8F:F7:47:FF:2E Fingerprint (SHA1): B6:93:6C:43:70:99:95:9A:66:0D:E8:0A:D9:E5:B5:A8:DF:DF:AD:C9 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #8940: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #8941: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #8942: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #8943: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #8944: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #8945: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8946: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #8947: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #8948: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8949: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #8950: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #8951: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #8952: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #8953: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8954: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #8955: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8956: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #8957: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8958: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #8959: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8960: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #8961: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8962: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #8963: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 16882 at Fri Mar 31 18:28:38 UTC 2017 kill -USR1 16882 httpserv: normal termination httpserv -b -p 9636 2>/dev/null; httpserv with PID 16882 killed at Fri Mar 31 18:28:39 UTC 2017 TIMESTAMP chains END: Fri Mar 31 18:28:39 UTC 2017 Running tests for ec TIMESTAMP ec BEGIN: Fri Mar 31 18:28:39 UTC 2017 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Fri Mar 31 18:28:39 UTC 2017 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #8964: ec(perf) test - PASSED TIMESTAMP ecperf END: Fri Mar 31 18:28:39 UTC 2017 Running ec tests for ectest TIMESTAMP ectest BEGIN: Fri Mar 31 18:28:39 UTC 2017 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #8965: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #8966: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #8967: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #8968: ec test certutil keygen - secp521r1 - PASSED 32 256 generic 25ada8e45085f52e174a88b49347b0eb9a00e95d13abad834c9ad0407da77073 okay (OID 208) - PK11 test 48 384 generic f8da64a46e9ddc42c0b708396182747f33008ff949f76cf28ddd2ed0020ac2c8a041ac8cf93acc99b988e259ca0436e7 okay (OID 220) - PK11 test 66 528 generic 0067be68f709cd7134271d1e85d9ed9f2aaa0b4b3d080c43caa0b45aba4dc4d2a5f2c8a16c87f76b9d41c9e865101b25547bf3d1717c2634d55815452078f951b39c okay (OID 221) - PK11 test ectest.sh: #8969: pk11 ec tests - PASSED TIMESTAMP ectest END: Fri Mar 31 18:28:43 UTC 2017 TIMESTAMP ec END: Fri Mar 31 18:28:43 UTC 2017 Running tests for gtests TIMESTAMP gtests BEGIN: Fri Mar 31 18:28:43 UTC 2017 gtests: der_gtest pk11_gtest gtests.sh: der_gtest =============================== executing der_gtest [==========] Running 16 tests from 2 test cases. [----------] Global test environment set-up. [----------] 13 tests from DERIntegerDecodingTest [ RUN ] DERIntegerDecodingTest.DecodeLongMinus126 [ OK ] DERIntegerDecodingTest.DecodeLongMinus126 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130 [ OK ] DERIntegerDecodingTest.DecodeLong130 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130Padded [ OK ] DERIntegerDecodingTest.DecodeLong130Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong0 [ OK ] DERIntegerDecodingTest.DecodeLong0 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong1 [ OK ] DERIntegerDecodingTest.DecodeLong1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1Padded [ OK ] DERIntegerDecodingTest.DecodeLongMinus1Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMax [ OK ] DERIntegerDecodingTest.DecodeLongMax (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMin [ OK ] DERIntegerDecodingTest.DecodeLongMin (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinPlus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxPlus1 (0 ms) [----------] 13 tests from DERIntegerDecodingTest (1 ms total) [----------] 3 tests from DERPrivateKeyImportTest [ RUN ] DERPrivateKeyImportTest.ImportPrivateRSAKey [ OK ] DERPrivateKeyImportTest.ImportPrivateRSAKey (1 ms) [ RUN ] DERPrivateKeyImportTest.ImportInvalidPrivateKey [ OK ] DERPrivateKeyImportTest.ImportInvalidPrivateKey (0 ms) [ RUN ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey [ OK ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey (0 ms) [----------] 3 tests from DERPrivateKeyImportTest (2 ms total) [----------] Global test environment tear-down [==========] 16 tests from 2 test cases ran. (5 ms total) [ PASSED ] 16 tests. gtests.sh: #8970: der_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/der_gtest/report.xml executing sed to parse the xml report processing the parsed report gtests.sh: #8971: 'DERIntegerDecodingTest: DecodeLongMinus126' - PASSED gtests.sh: #8972: 'DERIntegerDecodingTest: DecodeLong130' - PASSED gtests.sh: #8973: 'DERIntegerDecodingTest: DecodeLong130Padded' - PASSED gtests.sh: #8974: 'DERIntegerDecodingTest: DecodeLong0' - PASSED gtests.sh: #8975: 'DERIntegerDecodingTest: DecodeLong1' - PASSED gtests.sh: #8976: 'DERIntegerDecodingTest: DecodeLongMinus1' - PASSED gtests.sh: #8977: 'DERIntegerDecodingTest: DecodeLongMinus1Padded' - PASSED gtests.sh: #8978: 'DERIntegerDecodingTest: DecodeLongMax' - PASSED gtests.sh: #8979: 'DERIntegerDecodingTest: DecodeLongMin' - PASSED gtests.sh: #8980: 'DERIntegerDecodingTest: DecodeLongMaxMinus1' - PASSED gtests.sh: #8981: 'DERIntegerDecodingTest: DecodeLongMinPlus1' - PASSED gtests.sh: #8982: 'DERIntegerDecodingTest: DecodeLongMinMinus1' - PASSED gtests.sh: #8983: 'DERIntegerDecodingTest: DecodeLongMaxPlus1' - PASSED gtests.sh: #8984: 'DERPrivateKeyImportTest: ImportPrivateRSAKey' - PASSED gtests.sh: #8985: 'DERPrivateKeyImportTest: ImportInvalidPrivateKey' - PASSED gtests.sh: #8986: 'DERPrivateKeyImportTest: ImportZeroLengthPrivateKey' - PASSED gtests.sh: pk11_gtest =============================== executing pk11_gtest [==========] Running 11 tests from 5 test cases. [----------] Global test environment set-up. [----------] 6 tests from Pkcs11AESKeyWrapTest [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest1 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest1 (0 ms) [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest2 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest2 (0 ms) [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest3 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest3 (1 ms) [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest4 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest4 (0 ms) [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest5 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest5 (1 ms) [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest6 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest6 (0 ms) [----------] 6 tests from Pkcs11AESKeyWrapTest (4 ms total) [----------] 1 test from Pkcs11ExportTest [ RUN ] Pkcs11ExportTest.DeriveNonExport [ OK ] Pkcs11ExportTest.DeriveNonExport (1 ms) [----------] 1 test from Pkcs11ExportTest (1 ms total) [----------] 1 test from TlsPrfTest [ RUN ] TlsPrfTest.ExtendedMsParamErr [ OK ] TlsPrfTest.ExtendedMsParamErr (1 ms) [----------] 1 test from TlsPrfTest (1 ms total) [----------] 1 test from Pkcs11RsaPssTest [ RUN ] Pkcs11RsaPssTest.GenerateAndSignAndVerify [ OK ] Pkcs11RsaPssTest.GenerateAndSignAndVerify (555 ms) [----------] 1 test from Pkcs11RsaPssTest (555 ms total) [----------] 2 tests from Pkcs11RsaPssVectorTest [ RUN ] Pkcs11RsaPssVectorTest.VerifyKnownSignature1 [ OK ] Pkcs11RsaPssVectorTest.VerifyKnownSignature1 (1 ms) [ RUN ] Pkcs11RsaPssVectorTest.VerifyKnownSignature2 [ OK ] Pkcs11RsaPssVectorTest.VerifyKnownSignature2 (2 ms) [----------] 2 tests from Pkcs11RsaPssVectorTest (3 ms total) [----------] Global test environment tear-down [==========] 11 tests from 5 test cases ran. (567 ms total) [ PASSED ] 11 tests. gtests.sh: #8987: pk11_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/pkix/pk11_gtest/report.xml executing sed to parse the xml report processing the parsed report gtests.sh: #8988: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest1' - PASSED gtests.sh: #8989: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest2' - PASSED gtests.sh: #8990: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest3' - PASSED gtests.sh: #8991: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest4' - PASSED gtests.sh: #8992: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest5' - PASSED gtests.sh: #8993: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest6' - PASSED gtests.sh: #8994: 'Pkcs11ExportTest: DeriveNonExport' - PASSED gtests.sh: #8995: 'TlsPrfTest: ExtendedMsParamErr' - PASSED gtests.sh: #8996: 'Pkcs11RsaPssTest: GenerateAndSignAndVerify' - PASSED gtests.sh: #8997: 'Pkcs11RsaPssVectorTest: VerifyKnownSignature1' - PASSED gtests.sh: #8998: 'Pkcs11RsaPssVectorTest: VerifyKnownSignature2' - PASSED TIMESTAMP gtests END: Fri Mar 31 18:28:45 UTC 2017 Running tests for ssl_gtests TIMESTAMP ssl_gtests BEGIN: Fri Mar 31 18:28:45 UTC 2017 ssl_gtest.sh: SSL Gtests =============================== ssl_gtest.sh: #8999: create ssl_gtest database - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #9000: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #9001: create certificate: sign kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #9002: create certificate: sign kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #9003: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #9004: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #9005: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #9006: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #9007: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #9008: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #9009: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #9010: create certificate: ca - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #9011: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #9012: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #9013: create certificate: sign - PASSED executing ssl_gtest [==========] Running 785 tests from 14 test cases. [----------] Global test environment set-up. [----------] 60 tests from CipherSuiteRC4/TlsCipherSuiteTest [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/0 (65 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/1 (54 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/2 (70 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/3 (59 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/4 (62 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/5 (41 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/6 (53 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/7 (64 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/8 (59 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/9 (61 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/10 (41 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/11 (54 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/12 (64 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/13 (58 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/14 (60 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/0 (94 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/1 (102 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/2 (113 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/3 (109 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/4 (119 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/5 (95 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/6 (103 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/7 (110 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/8 (109 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/9 (119 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/10 (94 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/11 (101 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/12 (112 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/13 (109 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/14 (119 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/0 (43 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/1 (56 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/2 (66 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/3 (60 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/4 (62 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/5 (43 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/6 (56 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/7 (66 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/8 (61 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/9 (62 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/10 (42 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/11 (55 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/12 (65 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/13 (60 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/14 (62 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/0 (41 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/1 (54 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/2 (64 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/3 (59 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/4 (61 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/5 (41 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/6 (54 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/7 (64 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/8 (59 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/9 (61 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/10 (41 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/11 (53 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/12 (63 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/13 (58 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/14 (60 ms) [----------] 60 tests from CipherSuiteRC4/TlsCipherSuiteTest (4181 ms total) [----------] 48 tests from CipherSuiteAEAD12/TlsCipherSuiteTest [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/0 (41 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/1 (42 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/2 (202 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/3 (206 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/4 (66 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/5 (62 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/6 (40 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/7 (41 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/8 (205 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/9 (206 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/10 (66 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/11 (63 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/0 (94 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/1 (95 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/2 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/3 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/4 (115 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/5 (121 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/6 (94 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/7 (95 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/8 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/9 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/10 (115 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/11 (122 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/0 (43 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/1 (44 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/2 (207 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/3 (210 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/4 (67 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/5 (64 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/6 (43 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/7 (43 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/8 (201 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/9 (199 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/10 (62 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/11 (58 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/0 (36 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/1 (37 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/2 (199 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/3 (203 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/4 (61 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/5 (58 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/6 (36 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/7 (36 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/8 (200 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/9 (203 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/10 (61 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/11 (58 ms) [----------] 48 tests from CipherSuiteAEAD12/TlsCipherSuiteTest (4556 ms total) [----------] 48 tests from CipherSuiteAEAD/TlsCipherSuiteTest [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/0 (59 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/1 (59 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/2 (55 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/3 (57 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/4 (135 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/5 (137 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/6 (59 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/7 (60 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/8 (56 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/9 (57 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/10 (136 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/11 (137 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/0 (103 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/1 (106 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/2 (108 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/3 (111 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/4 (187 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/5 (190 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/6 (103 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/7 (112 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/8 (119 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/9 (120 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/10 (200 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/11 (200 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/0 (65 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/1 (68 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/2 (62 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/3 (63 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/4 (142 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/5 (142 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/6 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/6 (66 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/7 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/7 (67 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/8 (62 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/9 (63 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/10 (141 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/11 (143 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/0 (64 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/1 (65 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/2 (61 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/3 (62 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/4 (141 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/5 (140 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/6 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/6 (64 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/7 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/7 (64 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/8 (61 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/9 (62 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/10 (140 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/11 (141 ms) [----------] 48 tests from CipherSuiteAEAD/TlsCipherSuiteTest (4831 ms total) [----------] 64 tests from CipherSuiteCBC12/TlsCipherSuiteTest [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/0 (140 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/1 (41 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/2 (65 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/3 (61 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/4 (141 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/5 (41 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/6 (205 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/7 (205 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/8 (140 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/9 (41 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/10 (65 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/11 (62 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/12 (142 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/13 (42 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/14 (204 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/15 (205 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/0 (199 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/1 (95 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/2 (115 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/3 (119 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/4 (199 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/5 (96 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/6 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/7 (5 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/8 (200 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/9 (96 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/10 (114 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/11 (119 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/12 (199 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/13 (96 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/14 (5 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/15 (5 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/0 (142 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/1 (42 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/2 (66 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/3 (63 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/4 (142 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/5 (43 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/6 (207 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/7 (206 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/8 (144 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/9 (43 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/10 (66 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/11 (63 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/12 (143 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/13 (43 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/14 (207 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/15 (207 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/0 (140 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/1 (41 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/2 (64 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/3 (61 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/4 (141 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/5 (42 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/6 (204 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/7 (204 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/8 (142 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/9 (41 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/10 (65 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/11 (61 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/12 (142 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/13 (42 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/14 (205 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/15 (205 ms) [----------] 64 tests from CipherSuiteCBC12/TlsCipherSuiteTest (7124 ms total) [----------] 192 tests from CipherSuiteCBCStream/TlsCipherSuiteTest [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/0 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/1 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/2 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/3 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/4 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/5 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/6 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/7 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/8 (58 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/9 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/10 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/11 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/12 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/13 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/14 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/15 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/16 (53 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/17 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/18 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/19 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/20 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/21 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/22 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/23 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/24 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/25 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/26 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/27 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/28 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/29 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/30 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/31 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/32 (53 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/33 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/34 (53 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/35 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/36 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/37 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/38 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/39 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/40 (58 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/41 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/42 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/43 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/44 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/45 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/46 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/47 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/0 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/1 (104 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/2 (104 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/3 (104 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/4 (112 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/5 (114 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/6 (113 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/7 (114 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/8 (108 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/9 (110 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/10 (110 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/11 (111 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/12 (118 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/13 (120 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/14 (120 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/15 (120 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/16 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/17 (103 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/18 (103 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/19 (104 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/20 (112 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/21 (114 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/22 (113 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/23 (113 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/24 (108 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/25 (111 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/26 (111 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/27 (111 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/28 (117 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/29 (119 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/30 (120 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/31 (120 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/32 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/33 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/34 (103 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/35 (103 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/36 (111 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/37 (113 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/38 (113 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/39 (113 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/40 (109 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/41 (110 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/42 (110 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/43 (110 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/44 (117 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/45 (119 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/46 (119 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/47 (119 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/0 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/1 (56 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/2 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/3 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/4 (68 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/5 (66 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/6 (66 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/7 (66 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/8 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/9 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/10 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/11 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/12 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/13 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/14 (63 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/15 (63 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/16 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/17 (56 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/18 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/19 (56 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/20 (66 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/21 (66 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/22 (66 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/23 (66 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/24 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/25 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/26 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/27 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/28 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/29 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/30 (63 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/31 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/32 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/33 (56 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/34 (56 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/35 (58 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/36 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/37 (67 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/38 (66 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/39 (66 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/40 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/41 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/42 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/43 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/44 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/45 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/46 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/47 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/0 (53 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/1 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/2 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/3 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/4 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/5 (67 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/6 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/7 (66 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/8 (58 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/9 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/10 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/11 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/12 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/13 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/14 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/15 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/16 (53 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/17 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/18 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/19 (55 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/20 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/21 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/22 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/23 (65 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/24 (58 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/25 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/26 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/27 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/28 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/29 (62 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/30 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/31 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/32 (53 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/33 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/34 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/35 (54 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/36 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/37 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/38 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/39 (64 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/40 (58 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/41 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/42 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/43 (59 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/44 (60 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/45 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/46 (61 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/47 (61 ms) [----------] 192 tests from CipherSuiteCBCStream/TlsCipherSuiteTest (14074 ms total) [----------] 96 tests from CipherSuiteCBCDatagram/TlsCipherSuiteTest [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/0 (55 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/1 (55 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/2 (57 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/3 (65 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/4 (61 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/5 (60 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/6 (54 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/7 (55 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/8 (54 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/9 (56 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/10 (56 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/11 (57 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/12 (49 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/13 (49 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/14 (49 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/15 (60 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/16 (59 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/17 (60 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/18 (54 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/19 (54 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/20 (54 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/21 (56 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/22 (56 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/23 (56 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/0 (95 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/1 (97 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/2 (95 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/3 (105 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/4 (105 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/5 (106 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/6 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/7 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/8 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/9 (110 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/10 (111 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/11 (111 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/12 (93 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/13 (103 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/14 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/15 (113 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/16 (114 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/17 (113 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/18 (110 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/19 (111 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/20 (110 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/21 (120 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/22 (120 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/23 (120 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/0 (56 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/1 (56 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/2 (57 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/3 (67 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/4 (67 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/5 (66 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/6 (61 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/7 (61 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/8 (62 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/9 (64 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/10 (63 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/11 (63 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/12 (55 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/13 (55 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/14 (56 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/15 (66 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/16 (66 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/17 (66 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/18 (61 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/19 (54 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/20 (54 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/21 (57 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/22 (57 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/23 (57 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/0 (49 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/1 (50 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/2 (50 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/3 (60 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/4 (61 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/5 (60 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/6 (57 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/7 (60 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/8 (60 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/9 (62 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/10 (62 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/11 (62 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/12 (55 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/13 (54 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/14 (55 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/15 (65 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/16 (64 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/17 (64 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/18 (59 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/19 (59 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/20 (59 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/21 (63 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/22 (62 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/23 (62 ms) [----------] 96 tests from CipherSuiteCBCDatagram/TlsCipherSuiteTest (6798 ms total) [----------] 7 tests from TestSecurityStatus/SecurityStatusTest [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/0 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/0 (61 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/1 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/1 (41 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/2 (61 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/3 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/3 (41 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/4 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/4 (41 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/5 (40 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/6 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/6 (41 ms) [----------] 7 tests from TestSecurityStatus/SecurityStatusTest (331 ms total) [----------] 72 tests from DamageYStream/TlsDamageDHYTest [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 02000051030168da3975a4e35b8aa35025c961b680b00ab11e810bcdf465d922... record new: [1184] 02000051030168da3975a4e35b8aa35025c961b680b00ab11e810bcdf465d922... server: Original packet: [1189] 16030104a002000051030168da3975a4e35b8aa35025c961b680b00ab11e810b... server: Filtered packet: [1189] 16030104a002000051030168da3975a4e35b8aa35025c961b680b00ab11e810b... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/0 (74 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/1 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301ff8c26e5b0a9add6db30adc2a1592210134bacad63ee9221f08a... record new: [1184] 020000510301ff8c26e5b0a9add6db30adc2a1592210134bacad63ee9221f08a... server: Original packet: [1189] 16030104a0020000510301ff8c26e5b0a9add6db30adc2a1592210134bacad63... server: Filtered packet: [1189] 16030104a0020000510301ff8c26e5b0a9add6db30adc2a1592210134bacad63... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/1 (71 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/2 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103012c2688ea2030d6abf6e099143850528d929ff32eed5915c0a8ba... record new: [1184] 0200005103012c2688ea2030d6abf6e099143850528d929ff32eed5915c0a8ba... server: Original packet: [1189] 16030104a00200005103012c2688ea2030d6abf6e099143850528d929ff32eed... server: Filtered packet: [1189] 16030104a00200005103012c2688ea2030d6abf6e099143850528d929ff32eed... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/2 (72 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103013456f75d453ea283902f2b000a568554529bc4bad3d4b857eab6... record new: [1184] 0200005103013456f75d453ea283902f2b000a568554529bc4bad3d4b857eab6... server: Original packet: [1189] 16030104a00200005103013456f75d453ea283902f2b000a568554529bc4bad3... server: Filtered packet: [1189] 16030104a00200005103013456f75d453ea283902f2b000a568554529bc4bad3... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/3 (72 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/4 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 02000051030175ebd6e96cb87180eb39c64feeb8b5c2be697f8909e40442b936... record new: [1184] 02000051030175ebd6e96cb87180eb39c64feeb8b5c2be697f8909e40442b936... server: Original packet: [1189] 16030104a002000051030175ebd6e96cb87180eb39c64feeb8b5c2be697f8909... server: Filtered packet: [1189] 16030104a002000051030175ebd6e96cb87180eb39c64feeb8b5c2be697f8909... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/4 (71 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/5 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301b93137cf29c9dc3529c81da11433442eef1ddbd11adb4ec3ba67... record new: [1184] 020000510301b93137cf29c9dc3529c81da11433442eef1ddbd11adb4ec3ba67... server: Original packet: [1189] 16030104a0020000510301b93137cf29c9dc3529c81da11433442eef1ddbd11a... server: Filtered packet: [1189] 16030104a0020000510301b93137cf29c9dc3529c81da11433442eef1ddbd11a... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/5 (72 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301c54a6c3dd378ff5c50964ad555fb9bd0785e43a793012795b55c... record new: [1184] 020000510301c54a6c3dd378ff5c50964ad555fb9bd0785e43a793012795b55c... server: Original packet: [1189] 16030104a0020000510301c54a6c3dd378ff5c50964ad555fb9bd0785e43a793... server: Filtered packet: [1189] 16030104a0020000510301c54a6c3dd378ff5c50964ad555fb9bd0785e43a793... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/6 (72 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103017c843e03da01f7b1f4da85d984b6ab88c4e3b665964cd359d14f... record new: [1184] 0200005103017c843e03da01f7b1f4da85d984b6ab88c4e3b665964cd359d14f... server: Original packet: [1189] 16030104a00200005103017c843e03da01f7b1f4da85d984b6ab88c4e3b66596... server: Filtered packet: [1189] 16030104a00200005103017c843e03da01f7b1f4da85d984b6ab88c4e3b66596... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/7 (72 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/8 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301afa2b08a253975b0d25838fd97073ba86ce129708a9c30cae9e6... record new: [1185] 020000510301afa2b08a253975b0d25838fd97073ba86ce129708a9c30cae9e6... server: Original packet: [1189] 16030104a0020000510301afa2b08a253975b0d25838fd97073ba86ce129708a... server: Filtered packet: [1190] 16030104a1020000510301afa2b08a253975b0d25838fd97073ba86ce129708a... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/8 (72 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/9 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301e9ff8349310fbad0674da72f9b189d52acd83f839bcda77f71b8... record new: [1185] 020000510301e9ff8349310fbad0674da72f9b189d52acd83f839bcda77f71b8... server: Original packet: [1189] 16030104a0020000510301e9ff8349310fbad0674da72f9b189d52acd83f839b... server: Filtered packet: [1190] 16030104a1020000510301e9ff8349310fbad0674da72f9b189d52acd83f839b... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/9 (72 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/10 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 02000051030199a5728c5d696773c84814eadbe014c3390de38862dc11209c73... record new: [1185] 02000051030199a5728c5d696773c84814eadbe014c3390de38862dc11209c73... server: Original packet: [1189] 16030104a002000051030199a5728c5d696773c84814eadbe014c3390de38862... server: Filtered packet: [1190] 16030104a102000051030199a5728c5d696773c84814eadbe014c3390de38862... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/10 (73 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/11 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103013e69857626500e0ad042d15447e93faf10257f652ee96cf8ab16... record new: [1185] 0200005103013e69857626500e0ad042d15447e93faf10257f652ee96cf8ab16... server: Original packet: [1189] 16030104a00200005103013e69857626500e0ad042d15447e93faf10257f652e... server: Filtered packet: [1190] 16030104a10200005103013e69857626500e0ad042d15447e93faf10257f652e... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/11 (73 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/12 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302f4788410ae6211f6296679956de68766ae9ebe20efa7b6c609bb... record new: [1184] 020000510302f4788410ae6211f6296679956de68766ae9ebe20efa7b6c609bb... server: Original packet: [1189] 16030204a0020000510302f4788410ae6211f6296679956de68766ae9ebe20ef... server: Filtered packet: [1189] 16030204a0020000510302f4788410ae6211f6296679956de68766ae9ebe20ef... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/12 (72 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/13 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302e5150a5d6c94ae15714ec693ec48ce5f78427e52edfc6ebaa951... record new: [1184] 020000510302e5150a5d6c94ae15714ec693ec48ce5f78427e52edfc6ebaa951... server: Original packet: [1189] 16030204a0020000510302e5150a5d6c94ae15714ec693ec48ce5f78427e52ed... server: Filtered packet: [1189] 16030204a0020000510302e5150a5d6c94ae15714ec693ec48ce5f78427e52ed... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/13 (71 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/14 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302640def4505591762df4d6231f4940bb5da94cbb19a6e8f8b8897... record new: [1184] 020000510302640def4505591762df4d6231f4940bb5da94cbb19a6e8f8b8897... server: Original packet: [1189] 16030204a0020000510302640def4505591762df4d6231f4940bb5da94cbb19a... server: Filtered packet: [1189] 16030204a0020000510302640def4505591762df4d6231f4940bb5da94cbb19a... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/14 (72 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/15 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302d6454e71dd70a965f33689d6170b4efac0b030291b66d1b91e75... record new: [1184] 020000510302d6454e71dd70a965f33689d6170b4efac0b030291b66d1b91e75... server: Original packet: [1189] 16030204a0020000510302d6454e71dd70a965f33689d6170b4efac0b030291b... server: Filtered packet: [1189] 16030204a0020000510302d6454e71dd70a965f33689d6170b4efac0b030291b... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/15 (61 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/16 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302c6dc1671ee813486a216a9cc82ec233f8971d33cdb36845b1751... record new: [1184] 020000510302c6dc1671ee813486a216a9cc82ec233f8971d33cdb36845b1751... server: Original packet: [1189] 16030204a0020000510302c6dc1671ee813486a216a9cc82ec233f8971d33cdb... server: Filtered packet: [1189] 16030204a0020000510302c6dc1671ee813486a216a9cc82ec233f8971d33cdb... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/16 (72 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/17 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302997dcf16f99943ee48abfc9a5bfee9ea821986b088847e7e3bfb... record new: [1184] 020000510302997dcf16f99943ee48abfc9a5bfee9ea821986b088847e7e3bfb... server: Original packet: [1189] 16030204a0020000510302997dcf16f99943ee48abfc9a5bfee9ea821986b088... server: Filtered packet: [1189] 16030204a0020000510302997dcf16f99943ee48abfc9a5bfee9ea821986b088... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/17 (74 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/18 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302702ef2b3f9d18495cfc9b947195da87226016cca3bbd0a363832... record new: [1184] 020000510302702ef2b3f9d18495cfc9b947195da87226016cca3bbd0a363832... server: Original packet: [1189] 16030204a0020000510302702ef2b3f9d18495cfc9b947195da87226016cca3b... server: Filtered packet: [1189] 16030204a0020000510302702ef2b3f9d18495cfc9b947195da87226016cca3b... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/18 (73 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/19 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 02000051030224980206df867fc83a7e373cad24c2c677c8958a57e815011250... record new: [1184] 02000051030224980206df867fc83a7e373cad24c2c677c8958a57e815011250... server: Original packet: [1189] 16030204a002000051030224980206df867fc83a7e373cad24c2c677c8958a57... server: Filtered packet: [1189] 16030204a002000051030224980206df867fc83a7e373cad24c2c677c8958a57... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/19 (71 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/20 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302e370303d796f1342868d457bb73c93172156855d41d020396093... record new: [1185] 020000510302e370303d796f1342868d457bb73c93172156855d41d020396093... server: Original packet: [1189] 16030204a0020000510302e370303d796f1342868d457bb73c93172156855d41... server: Filtered packet: [1190] 16030204a1020000510302e370303d796f1342868d457bb73c93172156855d41... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/20 (72 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/21 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302036e2b9b5293fc90794b268987fce334dde2ab425c156614aab3... record new: [1185] 020000510302036e2b9b5293fc90794b268987fce334dde2ab425c156614aab3... server: Original packet: [1189] 16030204a0020000510302036e2b9b5293fc90794b268987fce334dde2ab425c... server: Filtered packet: [1190] 16030204a1020000510302036e2b9b5293fc90794b268987fce334dde2ab425c... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/21 (75 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/22 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302191dd5f10dde519e2d37686d497116ae8d99bbd8eb2f1af62d8e... record new: [1185] 020000510302191dd5f10dde519e2d37686d497116ae8d99bbd8eb2f1af62d8e... server: Original packet: [1189] 16030204a0020000510302191dd5f10dde519e2d37686d497116ae8d99bbd8eb... server: Filtered packet: [1190] 16030204a1020000510302191dd5f10dde519e2d37686d497116ae8d99bbd8eb... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/22 (59 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/23 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 02000051030278bdce9fd111058f2c31198165cbf32744cca8d0f7688f06843e... record new: [1185] 02000051030278bdce9fd111058f2c31198165cbf32744cca8d0f7688f06843e... server: Original packet: [1189] 16030204a002000051030278bdce9fd111058f2c31198165cbf32744cca8d0f7... server: Filtered packet: [1190] 16030204a102000051030278bdce9fd111058f2c31198165cbf32744cca8d0f7... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/23 (59 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/24 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 0200005103030dc027fc21e904842f7cc7d59e41a1f5b6209d0f2d3600826cad... record new: [1186] 0200005103030dc027fc21e904842f7cc7d59e41a1f5b6209d0f2d3600826cad... server: Original packet: [1191] 16030304a20200005103030dc027fc21e904842f7cc7d59e41a1f5b6209d0f2d... server: Filtered packet: [1191] 16030304a20200005103030dc027fc21e904842f7cc7d59e41a1f5b6209d0f2d... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/24 (58 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/25 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303f5c925ed9a75e741a8d14c97c058aebff48a2b296e4e3f54ed61... record new: [1186] 020000510303f5c925ed9a75e741a8d14c97c058aebff48a2b296e4e3f54ed61... server: Original packet: [1191] 16030304a2020000510303f5c925ed9a75e741a8d14c97c058aebff48a2b296e... server: Filtered packet: [1191] 16030304a2020000510303f5c925ed9a75e741a8d14c97c058aebff48a2b296e... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/25 (57 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/26 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303de7379a5d1ca36edb3c0b03742bee2a2a765e2abb3b1b5b1eba5... record new: [1186] 020000510303de7379a5d1ca36edb3c0b03742bee2a2a765e2abb3b1b5b1eba5... server: Original packet: [1191] 16030304a2020000510303de7379a5d1ca36edb3c0b03742bee2a2a765e2abb3... server: Filtered packet: [1191] 16030304a2020000510303de7379a5d1ca36edb3c0b03742bee2a2a765e2abb3... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/26 (58 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/27 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303714d2df4d1d9c87f868989f0ef010208f5e7abec0f2932e841a5... record new: [1186] 020000510303714d2df4d1d9c87f868989f0ef010208f5e7abec0f2932e841a5... server: Original packet: [1191] 16030304a2020000510303714d2df4d1d9c87f868989f0ef010208f5e7abec0f... server: Filtered packet: [1191] 16030304a2020000510303714d2df4d1d9c87f868989f0ef010208f5e7abec0f... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/27 (58 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/28 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303f05a0574bc2b5d7b4fd22f0ebd42965cfa9a0cabed60a9c0ebd9... record new: [1186] 020000510303f05a0574bc2b5d7b4fd22f0ebd42965cfa9a0cabed60a9c0ebd9... server: Original packet: [1191] 16030304a2020000510303f05a0574bc2b5d7b4fd22f0ebd42965cfa9a0cabed... server: Filtered packet: [1191] 16030304a2020000510303f05a0574bc2b5d7b4fd22f0ebd42965cfa9a0cabed... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/28 (58 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/29 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 0200005103037c13bd62580bd1249081939d99d210e20eb47ff85b2872d31a15... record new: [1186] 0200005103037c13bd62580bd1249081939d99d210e20eb47ff85b2872d31a15... server: Original packet: [1191] 16030304a20200005103037c13bd62580bd1249081939d99d210e20eb47ff85b... server: Filtered packet: [1191] 16030304a20200005103037c13bd62580bd1249081939d99d210e20eb47ff85b... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/29 (58 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/30 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 0200005103037bd7e25533edb43ae8cb04b9d2a6772110f5c3e68c02813d5193... record new: [1186] 0200005103037bd7e25533edb43ae8cb04b9d2a6772110f5c3e68c02813d5193... server: Original packet: [1191] 16030304a20200005103037bd7e25533edb43ae8cb04b9d2a6772110f5c3e68c... server: Filtered packet: [1191] 16030304a20200005103037bd7e25533edb43ae8cb04b9d2a6772110f5c3e68c... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/30 (58 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/31 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 02000051030310a6ac70d853768c95f7f88e6d7e1191f9f1c8e0960da6bc3a0f... record new: [1186] 02000051030310a6ac70d853768c95f7f88e6d7e1191f9f1c8e0960da6bc3a0f... server: Original packet: [1191] 16030304a202000051030310a6ac70d853768c95f7f88e6d7e1191f9f1c8e096... server: Filtered packet: [1191] 16030304a202000051030310a6ac70d853768c95f7f88e6d7e1191f9f1c8e096... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/31 (58 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/32 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 0200005103031b4d0cf0a25b92450a5836bf26ee836b23da571c74ef3df5a78e... record new: [1187] 0200005103031b4d0cf0a25b92450a5836bf26ee836b23da571c74ef3df5a78e... server: Original packet: [1191] 16030304a20200005103031b4d0cf0a25b92450a5836bf26ee836b23da571c74... server: Filtered packet: [1192] 16030304a30200005103031b4d0cf0a25b92450a5836bf26ee836b23da571c74... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/32 (58 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/33 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303367bb9e3ad36140507a5a5ba078af8db7d6d1c95baa2cf82103b... record new: [1187] 020000510303367bb9e3ad36140507a5a5ba078af8db7d6d1c95baa2cf82103b... server: Original packet: [1191] 16030304a2020000510303367bb9e3ad36140507a5a5ba078af8db7d6d1c95ba... server: Filtered packet: [1192] 16030304a3020000510303367bb9e3ad36140507a5a5ba078af8db7d6d1c95ba... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/33 (58 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/34 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303bf9ea5a546392bc451db1504ecdfb8074d397eb0bda0398e5934... record new: [1187] 020000510303bf9ea5a546392bc451db1504ecdfb8074d397eb0bda0398e5934... server: Original packet: [1191] 16030304a2020000510303bf9ea5a546392bc451db1504ecdfb8074d397eb0bd... server: Filtered packet: [1192] 16030304a3020000510303bf9ea5a546392bc451db1504ecdfb8074d397eb0bd... client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/34 (59 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/35 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 0200005103036d61a72d83791ce48cddaf98d7ba89034576808be9128b34b345... record new: [1187] 0200005103036d61a72d83791ce48cddaf98d7ba89034576808be9128b34b345... server: Original packet: [1191] 16030304a20200005103036d61a72d83791ce48cddaf98d7ba89034576808be9... server: Filtered packet: [1192] 16030304a30200005103036d61a72d83791ce48cddaf98d7ba89034576808be9... client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/35 (58 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100185a5794ef5f31e3e7bb99078ad98b8ecd6f5e9752055c53c18b12ce6cc5... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100185a5794ef5f31e3e7bb99078ad98b8ecd6f5e9752055c53c18b... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [326] 1603010106100001020100185a5794ef5f31e3e7bb99078ad98b8ecd6f5e9752... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/0 (109 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/1 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01003302cb8bb487c71e7d089f77f970d5b2fe63a0bc9d7174061b164a6264ab... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201003302cb8bb487c71e7d089f77f970d5b2fe63a0bc9d7174061b16... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [326] 16030101061000010201003302cb8bb487c71e7d089f77f970d5b2fe63a0bc9d... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/1 (109 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/2 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004d84bdae0ba06d63c4c279dbc84005fde77e70c39775044eb0bfc99da4d7... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201004d84bdae0ba06d63c4c279dbc84005fde77e70c39775044eb0bf... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [326] 16030101061000010201004d84bdae0ba06d63c4c279dbc84005fde77e70c397... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/2 (109 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010080fe80a329b89e8f78a4c16abfaf972f990a6e0ca1a7b93ea74296e9ed3d... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 10000102010080fe80a329b89e8f78a4c16abfaf972f990a6e0ca1a7b93ea742... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [326] 160301010610000102010080fe80a329b89e8f78a4c16abfaf972f990a6e0ca1... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/3 (110 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/4 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b7b9e98bfb06ea08dcbf1307f50681bc5d92d5bba5ab85c905a28520760b... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100b7b9e98bfb06ea08dcbf1307f50681bc5d92d5bba5ab85c905a2... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [326] 1603010106100001020100b7b9e98bfb06ea08dcbf1307f50681bc5d92d5bba5... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/4 (110 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/5 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100a18594f22817fdf0858b8876a2e443bb8b2663af06a43ac331d57fc7cfcf... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100a18594f22817fdf0858b8876a2e443bb8b2663af06a43ac331d5... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [326] 1603010106100001020100a18594f22817fdf0858b8876a2e443bb8b2663af06... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/5 (110 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01005de196463c834c39cf0f65301bcdc8b96997a8d4e16ac6b995118384fdbf... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 1000010201005de196463c834c39cf0f65301bcdc8b96997a8d4e16ac6b99511... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [326] 16030101061000010201005de196463c834c39cf0f65301bcdc8b96997a8d4e1... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/6 (108 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01007e04115d10e1467694ac15e0b670c19b4f95bc15e02381bdb49cac76b732... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 1000010201007e04115d10e1467694ac15e0b670c19b4f95bc15e02381bdb49c... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [326] 16030101061000010201007e04115d10e1467694ac15e0b670c19b4f95bc15e0... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/7 (109 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/8 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100be4d2b64863ef3f6d998aff3e1f7a18c9fda4a86378d8581962f6bfd3bfd... handshake new: [259] 010101be4d2b64863ef3f6d998aff3e1f7a18c9fda4a86378d8581962f6bfd3b... record old: [262] 100001020100be4d2b64863ef3f6d998aff3e1f7a18c9fda4a86378d8581962f... record new: [263] 10000103010101be4d2b64863ef3f6d998aff3e1f7a18c9fda4a86378d858196... client: Original packet: [326] 1603010106100001020100be4d2b64863ef3f6d998aff3e1f7a18c9fda4a8637... client: Filtered packet: [327] 160301010710000103010101be4d2b64863ef3f6d998aff3e1f7a18c9fda4a86... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/8 (110 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/9 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100273f2fa9eff4e59d1820b5476ed31d1c76976839d05946b51d8961b3e6c9... handshake new: [259] 010101273f2fa9eff4e59d1820b5476ed31d1c76976839d05946b51d8961b3e6... record old: [262] 100001020100273f2fa9eff4e59d1820b5476ed31d1c76976839d05946b51d89... record new: [263] 10000103010101273f2fa9eff4e59d1820b5476ed31d1c76976839d05946b51d... client: Original packet: [326] 1603010106100001020100273f2fa9eff4e59d1820b5476ed31d1c76976839d0... client: Filtered packet: [327] 160301010710000103010101273f2fa9eff4e59d1820b5476ed31d1c76976839... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/9 (109 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/10 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004a211833732b8196b41f6f0571e0a9a44ba7c8f1df45a7562d609a00aba4... handshake new: [259] 0101004a211833732b8196b41f6f0571e0a9a44ba7c8f1df45a7562d609a00ab... record old: [262] 1000010201004a211833732b8196b41f6f0571e0a9a44ba7c8f1df45a7562d60... record new: [263] 100001030101004a211833732b8196b41f6f0571e0a9a44ba7c8f1df45a7562d... client: Original packet: [326] 16030101061000010201004a211833732b8196b41f6f0571e0a9a44ba7c8f1df... client: Filtered packet: [327] 1603010107100001030101004a211833732b8196b41f6f0571e0a9a44ba7c8f1... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/10 (135 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/11 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010098ee0d077b58b49c2dfd2c546b7e05169e5461fa0500acafa271de5336ef... handshake new: [259] 01010098ee0d077b58b49c2dfd2c546b7e05169e5461fa0500acafa271de5336... record old: [262] 10000102010098ee0d077b58b49c2dfd2c546b7e05169e5461fa0500acafa271... record new: [263] 1000010301010098ee0d077b58b49c2dfd2c546b7e05169e5461fa0500acafa2... client: Original packet: [326] 160301010610000102010098ee0d077b58b49c2dfd2c546b7e05169e5461fa05... client: Filtered packet: [327] 16030101071000010301010098ee0d077b58b49c2dfd2c546b7e05169e5461fa... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/11 (134 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/12 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01002bae3e6cd85f075616f829053a172fd671557b0ed752d33521537acfad1c... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201002bae3e6cd85f075616f829053a172fd671557b0ed752d3352153... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [342] 16030201061000010201002bae3e6cd85f075616f829053a172fd671557b0ed7... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/12 (124 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/13 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004c8319c800c5871da45b0343e0c701201790bbae6f76ed5a98f9ae286ce5... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201004c8319c800c5871da45b0343e0c701201790bbae6f76ed5a98f9... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [342] 16030201061000010201004c8319c800c5871da45b0343e0c701201790bbae6f... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/13 (122 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/14 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010001e78d8fc5a4c7bf23781dc344169777f89a0cc3975de9ce3e3ae5d59846... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 10000102010001e78d8fc5a4c7bf23781dc344169777f89a0cc3975de9ce3e3a... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [342] 160302010610000102010001e78d8fc5a4c7bf23781dc344169777f89a0cc397... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/14 (124 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/15 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004e57f37b62530ed77e30133da5883552ec858307541b23339bb1b4bbebf5... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201004e57f37b62530ed77e30133da5883552ec858307541b23339bb1... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [342] 16030201061000010201004e57f37b62530ed77e30133da5883552ec85830754... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/15 (126 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/16 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100c0c3a42ef202ec1ef57be12564f79b5bfaf10c33ef49b4d03e78f2b7a67f... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100c0c3a42ef202ec1ef57be12564f79b5bfaf10c33ef49b4d03e78... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [342] 1603020106100001020100c0c3a42ef202ec1ef57be12564f79b5bfaf10c33ef... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/16 (123 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/17 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100eaaa7e960eb9b23fc8c2b6d373793c578bbd5005cd59361ecb2dfffaa839... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100eaaa7e960eb9b23fc8c2b6d373793c578bbd5005cd59361ecb2d... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [342] 1603020106100001020100eaaa7e960eb9b23fc8c2b6d373793c578bbd5005cd... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/17 (125 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/18 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010022621baebf73850e6f3e37f8a6504dc3fe0e0329faa57739aba47408ae69... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 10000102010022621baebf73850e6f3e37f8a6504dc3fe0e0329faa57739aba4... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [342] 160302010610000102010022621baebf73850e6f3e37f8a6504dc3fe0e0329fa... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/18 (130 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/19 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01001f3e597f4d0f5852c471c04423af2ea0ad3e44f42f2ba3743e2f043a11f3... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 1000010201001f3e597f4d0f5852c471c04423af2ea0ad3e44f42f2ba3743e2f... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [342] 16030201061000010201001f3e597f4d0f5852c471c04423af2ea0ad3e44f42f... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/19 (131 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/20 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100474ae8f49f50be79d505b59d471606615c6899873e38d634bef1e72e38ed... handshake new: [259] 010101474ae8f49f50be79d505b59d471606615c6899873e38d634bef1e72e38... record old: [262] 100001020100474ae8f49f50be79d505b59d471606615c6899873e38d634bef1... record new: [263] 10000103010101474ae8f49f50be79d505b59d471606615c6899873e38d634be... client: Original packet: [342] 1603020106100001020100474ae8f49f50be79d505b59d471606615c6899873e... client: Filtered packet: [343] 160302010710000103010101474ae8f49f50be79d505b59d471606615c689987... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/20 (158 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/21 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010036e5087b3556f1c08e293c943493eb3777a2f9b70014af1c4b74ff5fae34... handshake new: [259] 01010136e5087b3556f1c08e293c943493eb3777a2f9b70014af1c4b74ff5fae... record old: [262] 10000102010036e5087b3556f1c08e293c943493eb3777a2f9b70014af1c4b74... record new: [263] 1000010301010136e5087b3556f1c08e293c943493eb3777a2f9b70014af1c4b... client: Original packet: [342] 160302010610000102010036e5087b3556f1c08e293c943493eb3777a2f9b700... client: Filtered packet: [343] 16030201071000010301010136e5087b3556f1c08e293c943493eb3777a2f9b7... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/21 (127 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/22 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01006dc8d68a64e924900b72a1c129692937cf56f0e334c3896694da1b73e30f... handshake new: [259] 0101006dc8d68a64e924900b72a1c129692937cf56f0e334c3896694da1b73e3... record old: [262] 1000010201006dc8d68a64e924900b72a1c129692937cf56f0e334c3896694da... record new: [263] 100001030101006dc8d68a64e924900b72a1c129692937cf56f0e334c3896694... client: Original packet: [342] 16030201061000010201006dc8d68a64e924900b72a1c129692937cf56f0e334... client: Filtered packet: [343] 1603020107100001030101006dc8d68a64e924900b72a1c129692937cf56f0e3... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/22 (151 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/23 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01007aeeb530e83b8bfb404a91cedc1bd4dc356a9c3386572c36de532bd385c7... handshake new: [259] 0101007aeeb530e83b8bfb404a91cedc1bd4dc356a9c3386572c36de532bd385... record old: [262] 1000010201007aeeb530e83b8bfb404a91cedc1bd4dc356a9c3386572c36de53... record new: [263] 100001030101007aeeb530e83b8bfb404a91cedc1bd4dc356a9c3386572c36de... client: Original packet: [342] 16030201061000010201007aeeb530e83b8bfb404a91cedc1bd4dc356a9c3386... client: Filtered packet: [343] 1603020107100001030101007aeeb530e83b8bfb404a91cedc1bd4dc356a9c33... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/23 (150 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/24 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004ff0c414ec6983082653067900f79e771e71da06f727d67087be0f8fbe1b... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201004ff0c414ec6983082653067900f79e771e71da06f727d67087be... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [318] 16030301061000010201004ff0c414ec6983082653067900f79e771e71da06f7... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/24 (124 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/25 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010064e1a07d6ea118f330cbc407a5fb04bbb5207884960806ef341bc949af67... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 10000102010064e1a07d6ea118f330cbc407a5fb04bbb5207884960806ef341b... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [318] 160303010610000102010064e1a07d6ea118f330cbc407a5fb04bbb520788496... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/25 (124 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/26 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010045e0c71619c699f6dd12fe46210bd10c865063a10a65293bb8e8f8b1f998... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 10000102010045e0c71619c699f6dd12fe46210bd10c865063a10a65293bb8e8... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [318] 160303010610000102010045e0c71619c699f6dd12fe46210bd10c865063a10a... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/26 (127 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/27 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d6d8e25a014bffbe58986c8f59fff11a037143a620abede1f4973f3b1d3b... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100d6d8e25a014bffbe58986c8f59fff11a037143a620abede1f497... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [318] 1603030106100001020100d6d8e25a014bffbe58986c8f59fff11a037143a620... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/27 (123 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/28 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01008105ce432cfcdf4001a563a582f54637d07015616c7e2d7462f97f1d035a... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 1000010201008105ce432cfcdf4001a563a582f54637d07015616c7e2d7462f9... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [318] 16030301061000010201008105ce432cfcdf4001a563a582f54637d07015616c... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/28 (121 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/29 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01006fe65573ea885065780352321f1d8d47fbd4daee97930f59eb01258e16e6... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 1000010201006fe65573ea885065780352321f1d8d47fbd4daee97930f59eb01... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [318] 16030301061000010201006fe65573ea885065780352321f1d8d47fbd4daee97... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/29 (123 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/30 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100df35a15d2ca04c38cfa836cb71773c2484deb73521963e1004105b067dcd... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100df35a15d2ca04c38cfa836cb71773c2484deb73521963e100410... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [318] 1603030106100001020100df35a15d2ca04c38cfa836cb71773c2484deb73521... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/30 (123 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/31 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01009ae159ceea518c25e55eb2c8a167b225c96b33dd650a13083a8beb302163... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 1000010201009ae159ceea518c25e55eb2c8a167b225c96b33dd650a13083a8b... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [318] 16030301061000010201009ae159ceea518c25e55eb2c8a167b225c96b33dd65... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/31 (111 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/32 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100944f7e757839f4c5c656f84258035b364910110a1e022e79fd231075ef04... handshake new: [259] 010101944f7e757839f4c5c656f84258035b364910110a1e022e79fd231075ef... record old: [262] 100001020100944f7e757839f4c5c656f84258035b364910110a1e022e79fd23... record new: [263] 10000103010101944f7e757839f4c5c656f84258035b364910110a1e022e79fd... client: Original packet: [318] 1603030106100001020100944f7e757839f4c5c656f84258035b364910110a1e... client: Filtered packet: [319] 160303010710000103010101944f7e757839f4c5c656f84258035b364910110a... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/32 (123 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/33 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004f070dbc3072e2f8e7530eb582d02e2150bca627ab28eb8bcdd8648e3703... handshake new: [259] 0101014f070dbc3072e2f8e7530eb582d02e2150bca627ab28eb8bcdd8648e37... record old: [262] 1000010201004f070dbc3072e2f8e7530eb582d02e2150bca627ab28eb8bcdd8... record new: [263] 100001030101014f070dbc3072e2f8e7530eb582d02e2150bca627ab28eb8bcd... client: Original packet: [318] 16030301061000010201004f070dbc3072e2f8e7530eb582d02e2150bca627ab... client: Filtered packet: [319] 1603030107100001030101014f070dbc3072e2f8e7530eb582d02e2150bca627... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/33 (123 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/34 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01001ea0a463100d0fd7430209b9289d99fb8cd207d9abc5a409058e8cfa665b... handshake new: [259] 0101001ea0a463100d0fd7430209b9289d99fb8cd207d9abc5a409058e8cfa66... record old: [262] 1000010201001ea0a463100d0fd7430209b9289d99fb8cd207d9abc5a409058e... record new: [263] 100001030101001ea0a463100d0fd7430209b9289d99fb8cd207d9abc5a40905... client: Original packet: [318] 16030301061000010201001ea0a463100d0fd7430209b9289d99fb8cd207d9ab... client: Filtered packet: [319] 1603030107100001030101001ea0a463100d0fd7430209b9289d99fb8cd207d9... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/34 (138 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/35 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100a164bd5d4624c5dea946fc6630a6dd9e8d51e940a91b6f7fb7bfc70f9c5c... handshake new: [259] 010100a164bd5d4624c5dea946fc6630a6dd9e8d51e940a91b6f7fb7bfc70f9c... record old: [262] 100001020100a164bd5d4624c5dea946fc6630a6dd9e8d51e940a91b6f7fb7bf... record new: [263] 10000103010100a164bd5d4624c5dea946fc6630a6dd9e8d51e940a91b6f7fb7... client: Original packet: [318] 1603030106100001020100a164bd5d4624c5dea946fc6630a6dd9e8d51e940a9... client: Filtered packet: [319] 160303010710000103010100a164bd5d4624c5dea946fc6630a6dd9e8d51e940... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/35 (149 ms) [----------] 72 tests from DamageYStream/TlsDamageDHYTest (6867 ms total) [----------] 48 tests from DamageYDatagram/TlsDamageDHYTest [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffef49d63dc4... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feffef49d63dc4... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/0 (73 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/1 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffb2cf947036... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feffb2cf947036... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/1 (73 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff876a57a3ad... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff876a57a3ad... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/2 (73 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffafa247f4cd... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feffafa247f4cd... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/3 (72 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffde23e71834... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feffde23e71834... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/4 (71 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffdc6a826340... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feffdc6a826340... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/5 (61 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/6 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff308a3bac03... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff308a3bac03... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/6 (75 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/7 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff562818e61d... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff562818e61d... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/7 (73 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/8 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff220426446c... server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feff220426446c... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/8 (58 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/9 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff250e7dfde4... server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feff250e7dfde4... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/9 (59 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/10 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff52227e3e91... server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feff52227e3e91... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/10 (60 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/11 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffca0a9b284a... server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feffca0a9b284a... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/11 (59 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/12 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd45cf68db11... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd45cf68db11... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/12 (59 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/13 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdf2b1820c0f... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdf2b1820c0f... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/13 (57 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/14 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd3f7e55537d... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd3f7e55537d... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/14 (59 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/15 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdcb0b0cf503... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdcb0b0cf503... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/15 (58 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/16 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdca042ddc8c... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdca042ddc8c... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/16 (58 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/17 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdb078f89f87... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdb078f89f87... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/17 (58 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/18 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdd9888b9f8b... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdd9888b9f8b... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/18 (59 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/19 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd34c6635cc3... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd34c6635cc3... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/19 (58 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/20 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd9bd6afde53... server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefd9bd6afde53... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/20 (58 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/21 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdb9ae616e6b... server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefdb9ae616e6b... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/21 (58 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/22 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd3f77b85e27... server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefd3f77b85e27... client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/22 (59 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/23 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd4d8839b47a... server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefd4d8839b47a... client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/23 (59 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d659c3a7e4aad044d6dfabad2bbbaf2e45db0bbdce041545ce3902898c23... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100d659c3a7e4aad044d6dfabad2bbbaf2e45db... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100d659c3a7e4... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/0 (110 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/1 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01009268292fce526eaae50a4a21d9f481562369ae2dac17808b8333547607d9... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 10000102000100000000010201009268292fce526eaae50a4a21d9f481562369... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201009268292fce... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/1 (111 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01006d7512647be2b74809c748b9786efa108d5d10d4ee69149a4e0f9f3465f6... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 10000102000100000000010201006d7512647be2b74809c748b9786efa108d5d... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201006d7512647b... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/2 (110 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010008d07d6e213c2755bc60d1928542e20420f3c4bbe0208b9eaabd8205b45b... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 100001020001000000000102010008d07d6e213c2755bc60d1928542e20420f3... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [374] 16feff0000000000000001010e100001020001000000000102010008d07d6e21... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/3 (110 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01009a893dc30272ec0a2cb98d53d9fcb2913b5c56c57d4a7447a6add17874a4... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 10000102000100000000010201009a893dc30272ec0a2cb98d53d9fcb2913b5c... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201009a893dc302... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/4 (112 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01006ed017e7d45215314fe392bf3c96195101d79ef422591c1d25b1217d8773... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 10000102000100000000010201006ed017e7d45215314fe392bf3c96195101d7... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201006ed017e7d4... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/5 (124 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/6 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01007e91516dc7d34ee49c820e2d7d87ead74b69a94cd166f0c377d415f04ad0... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 10000102000100000000010201007e91516dc7d34ee49c820e2d7d87ead74b69... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201007e91516dc7... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/6 (124 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/7 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01001854ce90d915bfa73867ab32dbdb0886a41b785d5c604fd26d490f78f2dd... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 10000102000100000000010201001854ce90d915bfa73867ab32dbdb0886a41b... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201001854ce90d9... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/7 (122 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100eef025fe7c544daca498f130fd0a2896a9f43470454111a22771338ebc22... handshake new: [259] 010101eef025fe7c544daca498f130fd0a2896a9f43470454111a22771338ebc... record old: [270] 1000010200010000000001020100eef025fe7c544daca498f130fd0a2896a9f4... record new: [271] 100001030001000000000103010101eef025fe7c544daca498f130fd0a2896a9... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100eef025fe7c... client: Filtered packet: [375] 16feff0000000000000001010f100001030001000000000103010101eef025fe... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8 (112 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/9 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100fdf5b2f95ea707ed67d4a3e21f28cca6df1df838e8146e714727566d0a66... handshake new: [259] 010101fdf5b2f95ea707ed67d4a3e21f28cca6df1df838e8146e714727566d0a... record old: [270] 1000010200010000000001020100fdf5b2f95ea707ed67d4a3e21f28cca6df1d... record new: [271] 100001030001000000000103010101fdf5b2f95ea707ed67d4a3e21f28cca6df... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100fdf5b2f95e... client: Filtered packet: [375] 16feff0000000000000001010f100001030001000000000103010101fdf5b2f9... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/9 (123 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/10 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01003a75bafe92098c2fcd92abcf34c82cb37e441c96a94dd310c6938ff6bfc9... handshake new: [259] 0101003a75bafe92098c2fcd92abcf34c82cb37e441c96a94dd310c6938ff6bf... record old: [270] 10000102000100000000010201003a75bafe92098c2fcd92abcf34c82cb37e44... record new: [271] 1000010300010000000001030101003a75bafe92098c2fcd92abcf34c82cb37e... client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201003a75bafe92... client: Filtered packet: [375] 16feff0000000000000001010f1000010300010000000001030101003a75bafe... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/10 (155 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/11 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100fa432d2bfbed480c5119eba9691417fb2a1a3b7123fdb84e2803a8e48a9e... handshake new: [259] 010100fa432d2bfbed480c5119eba9691417fb2a1a3b7123fdb84e2803a8e48a... record old: [270] 1000010200010000000001020100fa432d2bfbed480c5119eba9691417fb2a1a... record new: [271] 100001030001000000000103010100fa432d2bfbed480c5119eba9691417fb2a... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100fa432d2bfb... client: Filtered packet: [375] 16feff0000000000000001010f100001030001000000000103010100fa432d2b... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/11 (152 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/12 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010028dfb6a52c4207cb85b2b3c32ab9c8ced6b8afa03999fb48bc34bcddf9fc... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 100001020001000000000102010028dfb6a52c4207cb85b2b3c32ab9c8ced6b8... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [358] 16fefd0000000000000001010e100001020001000000000102010028dfb6a52c... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/12 (124 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/13 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b25a061761819a94860a129282af3cc9ab7eacdb9935b82cca1372b8c940... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100b25a061761819a94860a129282af3cc9ab7e... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100b25a061761... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/13 (109 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/14 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010093fc90126ac4f2c759a9c7c0fdb1f54359fc79cfedec57a8692b70834cf7... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 100001020001000000000102010093fc90126ac4f2c759a9c7c0fdb1f54359fc... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [358] 16fefd0000000000000001010e100001020001000000000102010093fc90126a... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/14 (110 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/15 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01003a0b9f9a2a0b2124c9da2b1cf34d00c1493a7c2c3eed24f6b41d77f8bb57... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 10000102000100000000010201003a0b9f9a2a0b2124c9da2b1cf34d00c1493a... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201003a0b9f9a2a... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/15 (110 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/16 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01007836b35e12ad6c5b592f440d6860c8f58d4f703fd58c49441b621ab6cf58... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 10000102000100000000010201007836b35e12ad6c5b592f440d6860c8f58d4f... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201007836b35e12... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/16 (109 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/17 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01005ac5114c8b64a75309ae972a641b067a028f2ff6949f7452a3c64db62473... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 10000102000100000000010201005ac5114c8b64a75309ae972a641b067a028f... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201005ac5114c8b... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/17 (110 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/18 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01008216749d73e68dfb0e5fc61f237078ee0269d7e4dbac015345c501b8f8d6... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 10000102000100000000010201008216749d73e68dfb0e5fc61f237078ee0269... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201008216749d73... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/18 (110 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/19 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100ec81635586f7a860395bc07d33cd705c4b7de5db69e442322189b062899b... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 1000010200010000000001020100ec81635586f7a860395bc07d33cd705c4b7d... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ec81635586... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/19 (110 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/20 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01006dbdc99e538055c39eaa2768d09b5c6632bf7dd53b27890f5c2c6841a3fd... handshake new: [259] 0101016dbdc99e538055c39eaa2768d09b5c6632bf7dd53b27890f5c2c6841a3... record old: [270] 10000102000100000000010201006dbdc99e538055c39eaa2768d09b5c6632bf... record new: [271] 1000010300010000000001030101016dbdc99e538055c39eaa2768d09b5c6632... client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201006dbdc99e53... client: Filtered packet: [359] 16fefd0000000000000001010f1000010300010000000001030101016dbdc99e... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/20 (110 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/21 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d60e535aee880dde0cff93118f790124b669d1d786bcb9e474d481841494... handshake new: [259] 010101d60e535aee880dde0cff93118f790124b669d1d786bcb9e474d4818414... record old: [270] 1000010200010000000001020100d60e535aee880dde0cff93118f790124b669... record new: [271] 100001030001000000000103010101d60e535aee880dde0cff93118f790124b6... client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100d60e535aee... client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010101d60e535a... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/21 (110 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/22 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010085d952b6b8ccfaaecd0d8e5aa8ce51b513211e3e43924b09c539f05fcc52... handshake new: [259] 01010085d952b6b8ccfaaecd0d8e5aa8ce51b513211e3e43924b09c539f05fcc... record old: [270] 100001020001000000000102010085d952b6b8ccfaaecd0d8e5aa8ce51b51321... record new: [271] 10000103000100000000010301010085d952b6b8ccfaaecd0d8e5aa8ce51b513... client: Original packet: [358] 16fefd0000000000000001010e100001020001000000000102010085d952b6b8... client: Filtered packet: [359] 16fefd0000000000000001010f10000103000100000000010301010085d952b6... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/22 (135 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/23 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b9b210e3e5e17188bef3bb4279b4077899493e665927d7548754f1bca8d9... handshake new: [259] 010100b9b210e3e5e17188bef3bb4279b4077899493e665927d7548754f1bca8... record old: [270] 1000010200010000000001020100b9b210e3e5e17188bef3bb4279b407789949... record new: [271] 100001030001000000000103010100b9b210e3e5e17188bef3bb4279b4077899... client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100b9b210e3e5... client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010100b9b210e3... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/23 (135 ms) [----------] 48 tests from DamageYDatagram/TlsDamageDHYTest (4361 ms total) [----------] 12 tests from KeyExchangeTest/TlsKeyExchangeTest [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/0 (218 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/1 (173 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/2 (174 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/3 (174 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/0 (177 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/1 (178 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/2 (180 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/3 (179 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/0 (178 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/1 (178 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/2 (178 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/3 (180 ms) [----------] 12 tests from KeyExchangeTest/TlsKeyExchangeTest (2169 ms total) [----------] 88 tests from TlsPadding/TlsPaddingTest [ RUN ] TlsPadding/TlsPaddingTest.Correct/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fefefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.Correct/0 (5 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0e0e [ OK ] TlsPadding/TlsPaddingTest.Correct/1 (3 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fcfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.Correct/2 (4 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0c0c [ OK ] TlsPadding/TlsPaddingTest.Correct/3 (3 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fbfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.Correct/4 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0b0b [ OK ] TlsPadding/TlsPaddingTest.Correct/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f1f1... [ OK ] TlsPadding/TlsPaddingTest.Correct/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410101 [ OK ] TlsPadding/TlsPaddingTest.Correct/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f0... [ OK ] TlsPadding/TlsPaddingTest.Correct/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/9 Content length=31 padding length=0 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141414100 [ OK ] TlsPadding/TlsPaddingTest.Correct/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/12 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/15 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/18 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/19 Content length=287 padding length=0 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/21 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/0 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0e10 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/2 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0c20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/4 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0b20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/5 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/6 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410120 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/8 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/9 Content length=31 padding length=0 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141414120 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/10 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/12 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/14 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/15 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/16 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/16 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/17 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/18 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/19 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/21 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/21 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fffefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/0 (5 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410f0e0e0e0e0e0e0e0e0e0e0e0e0e0e [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/1 (3 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fdfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/2 (3 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410d0c0c0c0c0c0c0c0c0c0c0c0c [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fcfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410c0b0b0b0b0b0b0b0b0b0b0b [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f2f1... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410201 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/7 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f1... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/9 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/10 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/13 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/15 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/18 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/19 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/21 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fefefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0f0e [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fcfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/2 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0d0c [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fbfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/4 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0c0b [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f1f1... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410201 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f0... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/9 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/10 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/12 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/15 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/17 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/19 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/21 (0 ms) [----------] 88 tests from TlsPadding/TlsPaddingTest (51 ms total) [----------] 8 tests from SkipTls10/TlsSkipTest [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateRsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [531] 02000051030175219b1f1bea7471c99bc360bd49ad4d81f2115202c3bf6542f0... record new: [89] 02000051030175219b1f1bea7471c99bc360bd49ad4d81f2115202c3bf6542f0... server: Original packet: [536] 160301021302000051030175219b1f1bea7471c99bc360bd49ad4d81f2115202... server: Filtered packet: [94] 160301005902000051030175219b1f1bea7471c99bc360bd49ad4d81f2115202... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateRsa/0 (24 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateDhe/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 020000570301edbad0a3cc1ab58b30476b9aacd535d781e02990ce5121eb9b68... record new: [298] 020000570301edbad0a3cc1ab58b30476b9aacd535d781e02990ce5121eb9b68... server: Original packet: [745] 16030102e4020000570301edbad0a3cc1ab58b30476b9aacd535d781e02990ce... server: Filtered packet: [303] 160301012a020000570301edbad0a3cc1ab58b30476b9aacd535d781e02990ce... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateDhe/0 (34 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateEcdhe/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 0200005703017d0ff803b24818b5ab469f71ce22a96393c6c40d2f96c12eb3c0... record new: [298] 0200005703017d0ff803b24818b5ab469f71ce22a96393c6c40d2f96c12eb3c0... server: Original packet: [745] 16030102e40200005703017d0ff803b24818b5ab469f71ce22a96393c6c40d2f... server: Filtered packet: [303] 160301012a0200005703017d0ff803b24818b5ab469f71ce22a96393c6c40d2f... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateEcdhe/0 (44 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateEcdsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [557] 020000570301b9cc841e291cdc7673391bcb4af35fec8b0ac5736db67df6a42c... record new: [241] 020000570301b9cc841e291cdc7673391bcb4af35fec8b0ac5736db67df6a42c... server: Original packet: [562] 160301022d020000570301b9cc841e291cdc7673391bcb4af35fec8b0ac5736d... server: Filtered packet: [246] 16030100f1020000570301b9cc841e291cdc7673391bcb4af35fec8b0ac5736d... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateEcdsa/0 (17 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipServerKeyExchange/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [740] 0200005703014217d5990f1cb80f42aa949d1b6db74a9d5906947ddbc152ba06... record new: [537] 0200005703014217d5990f1cb80f42aa949d1b6db74a9d5906947ddbc152ba06... server: Original packet: [745] 16030102e40200005703014217d5990f1cb80f42aa949d1b6db74a9d5906947d... server: Filtered packet: [542] 16030102190200005703014217d5990f1cb80f42aa949d1b6db74a9d5906947d... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipServerKeyExchange/0 (34 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [558] 020000570301064ac8255af94226be2aa2538e72f158c2d5c1a3ccf07cae2bea... record new: [411] 020000570301064ac8255af94226be2aa2538e72f158c2d5c1a3ccf07cae2bea... server: Original packet: [563] 160301022e020000570301064ac8255af94226be2aa2538e72f158c2d5c1a3cc... server: Filtered packet: [416] 160301019b020000570301064ac8255af94226be2aa2538e72f158c2d5c1a3cc... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 (17 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertAndKeyExch/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 02000057030149560113ddf8a59829b85c41967a9bd974592ea1ec96b18fd7fd... record new: [298] 02000057030149560113ddf8a59829b85c41967a9bd974592ea1ec96b18fd7fd... Dropping handshake: 12 record old: [298] 02000057030149560113ddf8a59829b85c41967a9bd974592ea1ec96b18fd7fd... record new: [95] 02000057030149560113ddf8a59829b85c41967a9bd974592ea1ec96b18fd7fd... server: Original packet: [745] 16030102e402000057030149560113ddf8a59829b85c41967a9bd974592ea1ec... server: Filtered packet: [100] 160301005f02000057030149560113ddf8a59829b85c41967a9bd974592ea1ec... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertAndKeyExch/0 (34 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [557] 02000057030171d9a03cc18ef88f6e9e7585fe9c664bc2149b8341eda6c5b613... record new: [241] 02000057030171d9a03cc18ef88f6e9e7585fe9c664bc2149b8341eda6c5b613... Dropping handshake: 12 record old: [241] 02000057030171d9a03cc18ef88f6e9e7585fe9c664bc2149b8341eda6c5b613... record new: [95] 02000057030171d9a03cc18ef88f6e9e7585fe9c664bc2149b8341eda6c5b613... server: Original packet: [562] 160301022d02000057030171d9a03cc18ef88f6e9e7585fe9c664bc2149b8341... server: Filtered packet: [100] 160301005f02000057030171d9a03cc18ef88f6e9e7585fe9c664bc2149b8341... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 (17 ms) [----------] 8 tests from SkipTls10/TlsSkipTest (222 ms total) [----------] 32 tests from SkipVariants/TlsSkipTest [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [531] 02000051030216031fc7bffd2cb677cfa03625b48aa73b225b5cf6393f92e3c1... record new: [89] 02000051030216031fc7bffd2cb677cfa03625b48aa73b225b5cf6393f92e3c1... server: Original packet: [536] 160302021302000051030216031fc7bffd2cb677cfa03625b48aa73b225b5cf6... server: Filtered packet: [94] 160302005902000051030216031fc7bffd2cb677cfa03625b48aa73b225b5cf6... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/0 (25 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [531] 020000510303e08595330fcdeb59ff2200fc6c5adaa2ddb45b2ca52d5b01df2c... record new: [89] 020000510303e08595330fcdeb59ff2200fc6c5adaa2ddb45b2ca52d5b01df2c... server: Original packet: [536] 1603030213020000510303e08595330fcdeb59ff2200fc6c5adaa2ddb45b2ca5... server: Filtered packet: [94] 1603030059020000510303e08595330fcdeb59ff2200fc6c5adaa2ddb45b2ca5... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/1 (24 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [594] 16feff0000000000000000005d020000510000000000000051feff465ae9df16... server: Filtered packet: [144] 16feff0000000000000000005d020000510000000000000051feff465ae9df16... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/2 (25 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [594] 16fefd0000000000000000005d020000510000000000000051fefd6b2a7ada55... server: Filtered packet: [144] 16fefd0000000000000000005d020000510000000000000051fefd6b2a7ada55... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/3 (24 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 02000057030295fc9553f67faf8d051c98f7fa9cc3bd62e0d8f6044ef0c084d3... record new: [298] 02000057030295fc9553f67faf8d051c98f7fa9cc3bd62e0d8f6044ef0c084d3... server: Original packet: [745] 16030202e402000057030295fc9553f67faf8d051c98f7fa9cc3bd62e0d8f604... server: Filtered packet: [303] 160302012a02000057030295fc9553f67faf8d051c98f7fa9cc3bd62e0d8f604... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/0 (33 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [742] 02000057030344396f91877430e8193efcd5f2448bcc04810c7be7d9f610ac7e... record new: [300] 02000057030344396f91877430e8193efcd5f2448bcc04810c7be7d9f610ac7e... server: Original packet: [747] 16030302e602000057030344396f91877430e8193efcd5f2448bcc04810c7be7... server: Filtered packet: [305] 160303012c02000057030344396f91877430e8193efcd5f2448bcc04810c7be7... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/1 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [211] 0c0000c700020000000000c703001741047f7e2b6c012760db0b52b4b54d9325... record new: [211] 0c0000c700010000000000c703001741047f7e2b6c012760db0b52b4b54d9325... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feff7192e98413... server: Filtered packet: [374] 16feff00000000000000000063020000570000000000000057feff7192e98413... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/2 (35 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [213] 0c0000c900020000000000c903001741047f7e2b6c012760db0b52b4b54d9325... record new: [213] 0c0000c900010000000000c903001741047f7e2b6c012760db0b52b4b54d9325... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefd79a9cd21e0... server: Filtered packet: [376] 16fefd00000000000000000063020000570000000000000057fefd79a9cd21e0... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/3 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 0200005703026ebce8491f629c3543766c263bbfd2d9a19e5909f14df07ec880... record new: [298] 0200005703026ebce8491f629c3543766c263bbfd2d9a19e5909f14df07ec880... server: Original packet: [745] 16030202e40200005703026ebce8491f629c3543766c263bbfd2d9a19e5909f1... server: Filtered packet: [303] 160302012a0200005703026ebce8491f629c3543766c263bbfd2d9a19e5909f1... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/0 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [742] 020000570303c8fb4ae6ab4a8aeb3b66cf04532dd963ec5476e2a822559b3ab3... record new: [300] 020000570303c8fb4ae6ab4a8aeb3b66cf04532dd963ec5476e2a822559b3ab3... server: Original packet: [747] 16030302e6020000570303c8fb4ae6ab4a8aeb3b66cf04532dd963ec5476e2a8... server: Filtered packet: [305] 160303012c020000570303c8fb4ae6ab4a8aeb3b66cf04532dd963ec5476e2a8... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/1 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [211] 0c0000c700020000000000c703001741047f7e2b6c012760db0b52b4b54d9325... record new: [211] 0c0000c700010000000000c703001741047f7e2b6c012760db0b52b4b54d9325... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feff5c446fa448... server: Filtered packet: [374] 16feff00000000000000000063020000570000000000000057feff5c446fa448... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/2 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [213] 0c0000c900020000000000c903001741047f7e2b6c012760db0b52b4b54d9325... record new: [213] 0c0000c900010000000000c903001741047f7e2b6c012760db0b52b4b54d9325... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefdfc64e99a15... server: Filtered packet: [376] 16fefd00000000000000000063020000570000000000000057fefdfc64e99a15... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/3 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [557] 0200005703029239bbad3f1ccfd0a5b27936f648edb007c1d6fb4577567daf9c... record new: [241] 0200005703029239bbad3f1ccfd0a5b27936f648edb007c1d6fb4577567daf9c... server: Original packet: [562] 160302022d0200005703029239bbad3f1ccfd0a5b27936f648edb007c1d6fb45... server: Filtered packet: [246] 16030200f10200005703029239bbad3f1ccfd0a5b27936f648edb007c1d6fb45... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/0 (16 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [559] 02000057030361b9d5975b124a38771f615a5717d19de1f479fe0c65370dd300... record new: [243] 02000057030361b9d5975b124a38771f615a5717d19de1f479fe0c65370dd300... server: Original packet: [564] 160303022f02000057030361b9d5975b124a38771f615a5717d19de1f479fe0c... server: Filtered packet: [248] 16030300f302000057030361b9d5975b124a38771f615a5717d19de1f479fe0c... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/1 (16 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [324] 0b00013800010000000001380001350001323082012e3081d5a0030201020201... record new: [0] record old: [154] 0c00008e000200000000008e03001741047f7e2b6c012760db0b52b4b54d9325... record new: [154] 0c00008e000100000000008e03001741047f7e2b6c012760db0b52b4b54d9325... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [641] 16feff00000000000000000063020000570000000000000057feff0e8acf9c74... server: Filtered packet: [317] 16feff00000000000000000063020000570000000000000057feff0e8acf9c74... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/2 (17 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [324] 0b00013800010000000001380001350001323082012e3081d5a0030201020201... record new: [0] record old: [156] 0c000090000200000000009003001741047f7e2b6c012760db0b52b4b54d9325... record new: [156] 0c000090000100000000009003001741047f7e2b6c012760db0b52b4b54d9325... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [643] 16fefd00000000000000000063020000570000000000000057fefdf0f61f9107... server: Filtered packet: [319] 16fefd00000000000000000063020000570000000000000057fefdf0f61f9107... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/3 (17 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [740] 0200005703026b1b17192b4625a69a3cad24da7c51b206dec25fb6adacf760eb... record new: [537] 0200005703026b1b17192b4625a69a3cad24da7c51b206dec25fb6adacf760eb... server: Original packet: [745] 16030202e40200005703026b1b17192b4625a69a3cad24da7c51b206dec25fb6... server: Filtered packet: [542] 16030202190200005703026b1b17192b4625a69a3cad24da7c51b206dec25fb6... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/0 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [742] 020000570303af57abcd800ad5e5c31521221386837efe1aab973253116a4f4f... record new: [537] 020000570303af57abcd800ad5e5c31521221386837efe1aab973253116a4f4f... server: Original packet: [747] 16030302e6020000570303af57abcd800ad5e5c31521221386837efe1aab9732... server: Filtered packet: [542] 1603030219020000570303af57abcd800ad5e5c31521221386837efe1aab9732... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/1 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [211] 0c0000c700020000000000c703001741047f7e2b6c012760db0b52b4b54d9325... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feffe145a6aa49... server: Filtered packet: [613] 16feff00000000000000000063020000570000000000000057feffe145a6aa49... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/2 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [213] 0c0000c900020000000000c903001741047f7e2b6c012760db0b52b4b54d9325... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefd8fb8c4efaf... server: Filtered packet: [613] 16fefd00000000000000000063020000570000000000000057fefd8fb8c4efaf... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/3 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [556] 020000570302d08f76c125daf6e6ebe63438ed5414dfa15246f9b1c8f7126bdf... record new: [411] 020000570302d08f76c125daf6e6ebe63438ed5414dfa15246f9b1c8f7126bdf... server: Original packet: [561] 160302022c020000570302d08f76c125daf6e6ebe63438ed5414dfa15246f9b1... server: Filtered packet: [416] 160302019b020000570302d08f76c125daf6e6ebe63438ed5414dfa15246f9b1... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 (17 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [559] 0200005703037088c91082e0416ba344ad8116f532f552b54e7b7190d68cbdc4... record new: [411] 0200005703037088c91082e0416ba344ad8116f532f552b54e7b7190d68cbdc4... server: Original packet: [564] 160303022f0200005703037088c91082e0416ba344ad8116f532f552b54e7b71... server: Filtered packet: [416] 160303019b0200005703037088c91082e0416ba344ad8116f532f552b54e7b71... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/1 (16 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [155] 0c00008f000200000000008f03001741047f7e2b6c012760db0b52b4b54d9325... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [642] 16feff00000000000000000063020000570000000000000057feff68c40756b9... server: Filtered packet: [487] 16feff00000000000000000063020000570000000000000057feff68c40756b9... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/2 (17 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [157] 0c000091000200000000009103001741047f7e2b6c012760db0b52b4b54d9325... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [644] 16fefd00000000000000000063020000570000000000000057fefd614c9a41c2... server: Filtered packet: [487] 16fefd00000000000000000063020000570000000000000057fefd614c9a41c2... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/3 (16 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 020000570302da48047b2bc06fa07a2887a0867a0c04e688ddc3a5eee49967e7... record new: [298] 020000570302da48047b2bc06fa07a2887a0867a0c04e688ddc3a5eee49967e7... Dropping handshake: 12 record old: [298] 020000570302da48047b2bc06fa07a2887a0867a0c04e688ddc3a5eee49967e7... record new: [95] 020000570302da48047b2bc06fa07a2887a0867a0c04e688ddc3a5eee49967e7... server: Original packet: [745] 16030202e4020000570302da48047b2bc06fa07a2887a0867a0c04e688ddc3a5... server: Filtered packet: [100] 160302005f020000570302da48047b2bc06fa07a2887a0867a0c04e688ddc3a5... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/0 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [742] 020000570303dd34ed63cded854bdc308bba13c26af6a5a2f6b817cc76ec7410... record new: [300] 020000570303dd34ed63cded854bdc308bba13c26af6a5a2f6b817cc76ec7410... Dropping handshake: 12 record old: [300] 020000570303dd34ed63cded854bdc308bba13c26af6a5a2f6b817cc76ec7410... record new: [95] 020000570303dd34ed63cded854bdc308bba13c26af6a5a2f6b817cc76ec7410... server: Original packet: [747] 16030302e6020000570303dd34ed63cded854bdc308bba13c26af6a5a2f6b817... server: Filtered packet: [100] 160303005f020000570303dd34ed63cded854bdc308bba13c26af6a5a2f6b817... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/1 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [211] 0c0000c700020000000000c703001741047f7e2b6c012760db0b52b4b54d9325... record new: [211] 0c0000c700010000000000c703001741047f7e2b6c012760db0b52b4b54d9325... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [211] 0c0000c700010000000000c703001741047f7e2b6c012760db0b52b4b54d9325... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feff4f76545f52... server: Filtered packet: [163] 16feff00000000000000000063020000570000000000000057feff4f76545f52... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/2 (35 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [213] 0c0000c900020000000000c903001741047f7e2b6c012760db0b52b4b54d9325... record new: [213] 0c0000c900010000000000c903001741047f7e2b6c012760db0b52b4b54d9325... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [213] 0c0000c900010000000000c903001741047f7e2b6c012760db0b52b4b54d9325... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefd3dfefc3e6d... server: Filtered packet: [163] 16fefd00000000000000000063020000570000000000000057fefd3dfefc3e6d... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/3 (34 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [556] 020000570302132ef1c97f7c1ed9d1b04d031f2443f4c537b68ea67231bd3d26... record new: [240] 020000570302132ef1c97f7c1ed9d1b04d031f2443f4c537b68ea67231bd3d26... Dropping handshake: 12 record old: [240] 020000570302132ef1c97f7c1ed9d1b04d031f2443f4c537b68ea67231bd3d26... record new: [95] 020000570302132ef1c97f7c1ed9d1b04d031f2443f4c537b68ea67231bd3d26... server: Original packet: [561] 160302022c020000570302132ef1c97f7c1ed9d1b04d031f2443f4c537b68ea6... server: Filtered packet: [100] 160302005f020000570302132ef1c97f7c1ed9d1b04d031f2443f4c537b68ea6... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 (17 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [558] 0200005703035f1932074b17dfaafa886a0b8f243bc74ad6c6f6e86a64e5f380... record new: [242] 0200005703035f1932074b17dfaafa886a0b8f243bc74ad6c6f6e86a64e5f380... Dropping handshake: 12 record old: [242] 0200005703035f1932074b17dfaafa886a0b8f243bc74ad6c6f6e86a64e5f380... record new: [95] 0200005703035f1932074b17dfaafa886a0b8f243bc74ad6c6f6e86a64e5f380... server: Original packet: [563] 160303022e0200005703035f1932074b17dfaafa886a0b8f243bc74ad6c6f6e8... server: Filtered packet: [100] 160303005f0200005703035f1932074b17dfaafa886a0b8f243bc74ad6c6f6e8... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/1 (16 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [324] 0b00013800010000000001380001350001323082012e3081d5a0030201020201... record new: [0] record old: [153] 0c00008d000200000000008d03001741047f7e2b6c012760db0b52b4b54d9325... record new: [153] 0c00008d000100000000008d03001741047f7e2b6c012760db0b52b4b54d9325... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [153] 0c00008d000100000000008d03001741047f7e2b6c012760db0b52b4b54d9325... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [640] 16feff00000000000000000063020000570000000000000057feff7f9941f5eb... server: Filtered packet: [163] 16feff00000000000000000063020000570000000000000057feff7f9941f5eb... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/2 (18 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [324] 0b00013800010000000001380001350001323082012e3081d5a0030201020201... record new: [0] record old: [156] 0c000090000200000000009003001741047f7e2b6c012760db0b52b4b54d9325... record new: [156] 0c000090000100000000009003001741047f7e2b6c012760db0b52b4b54d9325... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [156] 0c000090000100000000009003001741047f7e2b6c012760db0b52b4b54d9325... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [643] 16fefd00000000000000000063020000570000000000000057fefdfdb8f9bc71... server: Filtered packet: [163] 16fefd00000000000000000063020000570000000000000057fefdfdb8f9bc71... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/3 (18 ms) [----------] 32 tests from SkipVariants/TlsSkipTest (850 ms total) [----------] 10 tests from AllHashFuncs/TlsHkdfTest [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/0 Hash = SHA-256 Output: [32] 33ad0a1c607ec03b09e6cd9893680ce210adf300aa1f2660e1b22e10f170f92a [ OK ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/0 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/1 Hash = SHA-384 Output: [48] 7ee8206f5570023e6dc7519eb1073bc4e791ad37b5c382aa10ba18e2357e7169... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/0 Hash = SHA-256 Output: [32] 11873828a9197811339124b58a1bb09f7f0d8dbb10f49c54bd1fd885cd153033 [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/1 Hash = SHA-384 Output: [48] 51b1d5b4597979084a15b2db84d3d6bcfc9345d9dc74da1a57c2769f3f83452f... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/1 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/0 Hash = SHA-256 Output: [32] 2f5f78d0a4c436ee6c8a4ef9d043810213fd4783633ad2e1406d2d9800fdc187 [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/0 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/1 Hash = SHA-384 Output: [48] 7b40f9ef91ffc9d129245cbff8827668ae4b63e803dd39a8d46af6e5eceaf87d... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/1 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/0 Hash = SHA-256 Output: [32] 7953b8dd6b98ce00b7dce803708ce3ac068b22fd0e3448e6e5e08ad61618e548 [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/1 Hash = SHA-384 Output: [48] 0193c0073f6a830e2e4fb258e400085c689c37320037ffc31c5b980b02923ffd... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/1 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/0 Hash = SHA-256 Output: [32] 347c6780ff0bbad71c283b16eb2f9cf62d24e6cdb613d51776548cb07dcde74c [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/0 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/1 Hash = SHA-384 Output: [48] 4b1e5ec1493078ea35bd3f0104e61aea14cc182ad1c47621c464c04e4b361605... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/1 (0 ms) [----------] 10 tests from AllHashFuncs/TlsHkdfTest (8 ms total) [----------] Global test environment tear-down [==========] 785 tests from 14 test cases ran. (56430 ms total) [ PASSED ] 785 tests. ssl_gtest.sh: #9014: ssl_gtest run successfully - PASSED executing sed to parse the xml report processing the parsed report ssl_gtest.sh: #9015: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/0 ("TLS", 769, 5, 65537, 0)' - PASSED ssl_gtest.sh: #9016: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/1 ("TLS", 769, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #9017: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/2 ("TLS", 769, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #9018: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/3 ("TLS", 769, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #9019: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/4 ("TLS", 769, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #9020: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/5 ("TLS", 770, 5, 65537, 0)' - PASSED ssl_gtest.sh: #9021: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/6 ("TLS", 770, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #9022: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/7 ("TLS", 770, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #9023: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/8 ("TLS", 770, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #9024: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/9 ("TLS", 770, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #9025: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/10 ("TLS", 771, 5, 65537, 0)' - PASSED ssl_gtest.sh: #9026: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/11 ("TLS", 771, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #9027: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/12 ("TLS", 771, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #9028: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/13 ("TLS", 771, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #9029: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/14 ("TLS", 771, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #9030: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/0 ("TLS", 769, 5, 65537, 0)' - PASSED ssl_gtest.sh: #9031: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/1 ("TLS", 769, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #9032: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/2 ("TLS", 769, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #9033: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/3 ("TLS", 769, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #9034: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/4 ("TLS", 769, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #9035: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/5 ("TLS", 770, 5, 65537, 0)' - PASSED ssl_gtest.sh: #9036: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/6 ("TLS", 770, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #9037: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/7 ("TLS", 770, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #9038: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/8 ("TLS", 770, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #9039: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/9 ("TLS", 770, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #9040: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/10 ("TLS", 771, 5, 65537, 0)' - PASSED ssl_gtest.sh: #9041: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/11 ("TLS", 771, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #9042: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/12 ("TLS", 771, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #9043: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/13 ("TLS", 771, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #9044: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/14 ("TLS", 771, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #9045: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/0 ("TLS", 769, 5, 65537, 0)' - PASSED ssl_gtest.sh: #9046: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/1 ("TLS", 769, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #9047: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/2 ("TLS", 769, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #9048: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/3 ("TLS", 769, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #9049: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/4 ("TLS", 769, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #9050: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/5 ("TLS", 770, 5, 65537, 0)' - PASSED ssl_gtest.sh: #9051: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/6 ("TLS", 770, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #9052: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/7 ("TLS", 770, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #9053: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/8 ("TLS", 770, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #9054: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/9 ("TLS", 770, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #9055: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/10 ("TLS", 771, 5, 65537, 0)' - PASSED ssl_gtest.sh: #9056: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/11 ("TLS", 771, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #9057: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/12 ("TLS", 771, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #9058: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/13 ("TLS", 771, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #9059: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/14 ("TLS", 771, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #9060: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/0 ("TLS", 769, 5, 65537, 0)' - PASSED ssl_gtest.sh: #9061: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/1 ("TLS", 769, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #9062: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/2 ("TLS", 769, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #9063: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/3 ("TLS", 769, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #9064: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/4 ("TLS", 769, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #9065: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/5 ("TLS", 770, 5, 65537, 0)' - PASSED ssl_gtest.sh: #9066: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/6 ("TLS", 770, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #9067: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/7 ("TLS", 770, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #9068: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/8 ("TLS", 770, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #9069: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/9 ("TLS", 770, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #9070: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/10 ("TLS", 771, 5, 65537, 0)' - PASSED ssl_gtest.sh: #9071: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/11 ("TLS", 771, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #9072: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/12 ("TLS", 771, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #9073: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/13 ("TLS", 771, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #9074: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/14 ("TLS", 771, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #9075: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/0 ("TLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #9076: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/1 ("TLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #9077: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/2 ("TLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #9078: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/3 ("TLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #9079: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/4 ("TLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #9080: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/5 ("TLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #9081: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/6 ("DTLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #9082: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/7 ("DTLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #9083: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/8 ("DTLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #9084: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/9 ("DTLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #9085: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/10 ("DTLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #9086: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/11 ("DTLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #9087: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/0 ("TLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #9088: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/1 ("TLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #9089: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/2 ("TLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #9090: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/3 ("TLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #9091: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/4 ("TLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #9092: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/5 ("TLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #9093: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/6 ("DTLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #9094: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/7 ("DTLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #9095: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/8 ("DTLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #9096: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/9 ("DTLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #9097: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/10 ("DTLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #9098: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/11 ("DTLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #9099: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/0 ("TLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #9100: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/1 ("TLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #9101: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/2 ("TLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #9102: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/3 ("TLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #9103: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/4 ("TLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #9104: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/5 ("TLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #9105: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/6 ("DTLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #9106: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/7 ("DTLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #9107: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/8 ("DTLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #9108: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/9 ("DTLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #9109: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/10 ("DTLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #9110: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/11 ("DTLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #9111: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/0 ("TLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #9112: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/1 ("TLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #9113: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/2 ("TLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #9114: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/3 ("TLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #9115: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/4 ("TLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #9116: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/5 ("TLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #9117: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/6 ("DTLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #9118: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/7 ("DTLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #9119: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/8 ("DTLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #9120: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/9 ("DTLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #9121: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/10 ("DTLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #9122: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/11 ("DTLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #9123: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/0 ("TLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #9124: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/1 ("TLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #9125: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/2 ("TLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #9126: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/3 ("TLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #9127: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/4 ("TLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #9128: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/5 ("TLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #9129: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/6 ("DTLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #9130: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/7 ("DTLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #9131: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/8 ("DTLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #9132: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/9 ("DTLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #9133: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/10 ("DTLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #9134: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/11 ("DTLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #9135: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/0 ("TLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #9136: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/1 ("TLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #9137: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/2 ("TLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #9138: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/3 ("TLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #9139: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/4 ("TLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #9140: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/5 ("TLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #9141: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/6 ("DTLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #9142: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/7 ("DTLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #9143: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/8 ("DTLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #9144: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/9 ("DTLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #9145: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/10 ("DTLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #9146: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/11 ("DTLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #9147: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/0 ("TLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #9148: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/1 ("TLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #9149: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/2 ("TLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #9150: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/3 ("TLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #9151: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/4 ("TLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #9152: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/5 ("TLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #9153: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/6 ("DTLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #9154: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/7 ("DTLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #9155: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/8 ("DTLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #9156: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/9 ("DTLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #9157: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/10 ("DTLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #9158: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/11 ("DTLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #9159: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/0 ("TLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #9160: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/1 ("TLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #9161: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/2 ("TLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #9162: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/3 ("TLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #9163: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/4 ("TLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #9164: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/5 ("TLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #9165: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/6 ("DTLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #9166: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/7 ("DTLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #9167: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/8 ("DTLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #9168: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/9 ("DTLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #9169: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/10 ("DTLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #9170: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/11 ("DTLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #9171: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/0 ("TLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #9172: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/1 ("TLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #9173: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/2 ("TLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #9174: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/3 ("TLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #9175: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/4 ("TLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #9176: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/5 ("TLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #9177: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/6 ("TLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #9178: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/7 ("TLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #9179: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/8 ("DTLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #9180: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/9 ("DTLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #9181: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/10 ("DTLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #9182: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/11 ("DTLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #9183: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/12 ("DTLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #9184: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/13 ("DTLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #9185: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/14 ("DTLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #9186: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/15 ("DTLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #9187: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/0 ("TLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #9188: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/1 ("TLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #9189: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/2 ("TLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #9190: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/3 ("TLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #9191: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/4 ("TLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #9192: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/5 ("TLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #9193: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/6 ("TLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #9194: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/7 ("TLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #9195: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/8 ("DTLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #9196: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/9 ("DTLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #9197: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/10 ("DTLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #9198: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/11 ("DTLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #9199: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/12 ("DTLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #9200: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/13 ("DTLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #9201: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/14 ("DTLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #9202: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/15 ("DTLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #9203: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/0 ("TLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #9204: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/1 ("TLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #9205: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/2 ("TLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #9206: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/3 ("TLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #9207: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/4 ("TLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #9208: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/5 ("TLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #9209: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/6 ("TLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #9210: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/7 ("TLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #9211: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/8 ("DTLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #9212: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/9 ("DTLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #9213: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/10 ("DTLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #9214: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/11 ("DTLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #9215: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/12 ("DTLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #9216: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/13 ("DTLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #9217: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/14 ("DTLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #9218: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/15 ("DTLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #9219: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/0 ("TLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #9220: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/1 ("TLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #9221: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/2 ("TLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #9222: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/3 ("TLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #9223: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/4 ("TLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #9224: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/5 ("TLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #9225: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/6 ("TLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #9226: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/7 ("TLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #9227: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/8 ("DTLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #9228: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/9 ("DTLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #9229: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/10 ("DTLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #9230: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/11 ("DTLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #9231: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/12 ("DTLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #9232: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/13 ("DTLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #9233: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/14 ("DTLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #9234: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/15 ("DTLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #9235: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/0 ("TLS", 769, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #9236: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/1 ("TLS", 769, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #9237: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/2 ("TLS", 769, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #9238: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/3 ("TLS", 769, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #9239: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/4 ("TLS", 769, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #9240: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/5 ("TLS", 769, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #9241: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/6 ("TLS", 769, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #9242: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/7 ("TLS", 769, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #9243: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/8 ("TLS", 769, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #9244: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/9 ("TLS", 769, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #9245: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/10 ("TLS", 769, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #9246: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/11 ("TLS", 769, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #9247: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/12 ("TLS", 769, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #9248: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/13 ("TLS", 769, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #9249: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/14 ("TLS", 769, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #9250: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/15 ("TLS", 769, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #9251: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/16 ("TLS", 770, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #9252: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/17 ("TLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #9253: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/18 ("TLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #9254: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/19 ("TLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #9255: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/20 ("TLS", 770, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #9256: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/21 ("TLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #9257: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/22 ("TLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #9258: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/23 ("TLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #9259: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/24 ("TLS", 770, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #9260: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/25 ("TLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #9261: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/26 ("TLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #9262: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/27 ("TLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #9263: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/28 ("TLS", 770, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #9264: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/29 ("TLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #9265: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/30 ("TLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #9266: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/31 ("TLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #9267: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/32 ("TLS", 771, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #9268: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/33 ("TLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #9269: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/34 ("TLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #9270: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/35 ("TLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #9271: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/36 ("TLS", 771, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #9272: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/37 ("TLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #9273: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/38 ("TLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #9274: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/39 ("TLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #9275: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/40 ("TLS", 771, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #9276: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/41 ("TLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #9277: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/42 ("TLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #9278: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/43 ("TLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #9279: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/44 ("TLS", 771, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #9280: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/45 ("TLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #9281: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/46 ("TLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #9282: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/47 ("TLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #9283: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/0 ("TLS", 769, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #9284: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/1 ("TLS", 769, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #9285: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/2 ("TLS", 769, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #9286: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/3 ("TLS", 769, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #9287: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/4 ("TLS", 769, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #9288: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/5 ("TLS", 769, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #9289: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/6 ("TLS", 769, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #9290: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/7 ("TLS", 769, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #9291: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/8 ("TLS", 769, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #9292: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/9 ("TLS", 769, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #9293: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/10 ("TLS", 769, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #9294: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/11 ("TLS", 769, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #9295: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/12 ("TLS", 769, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #9296: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/13 ("TLS", 769, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #9297: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/14 ("TLS", 769, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #9298: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/15 ("TLS", 769, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #9299: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/16 ("TLS", 770, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #9300: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/17 ("TLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #9301: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/18 ("TLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #9302: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/19 ("TLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #9303: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/20 ("TLS", 770, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #9304: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/21 ("TLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #9305: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/22 ("TLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #9306: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/23 ("TLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #9307: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/24 ("TLS", 770, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #9308: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/25 ("TLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #9309: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/26 ("TLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #9310: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/27 ("TLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #9311: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/28 ("TLS", 770, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #9312: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/29 ("TLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #9313: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/30 ("TLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #9314: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/31 ("TLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #9315: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/32 ("TLS", 771, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #9316: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/33 ("TLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #9317: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/34 ("TLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #9318: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/35 ("TLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #9319: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/36 ("TLS", 771, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #9320: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/37 ("TLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #9321: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/38 ("TLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #9322: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/39 ("TLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #9323: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/40 ("TLS", 771, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #9324: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/41 ("TLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #9325: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/42 ("TLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #9326: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/43 ("TLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #9327: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/44 ("TLS", 771, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #9328: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/45 ("TLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #9329: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/46 ("TLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #9330: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/47 ("TLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #9331: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/0 ("TLS", 769, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #9332: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/1 ("TLS", 769, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #9333: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/2 ("TLS", 769, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #9334: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/3 ("TLS", 769, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #9335: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/4 ("TLS", 769, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #9336: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/5 ("TLS", 769, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #9337: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/6 ("TLS", 769, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #9338: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/7 ("TLS", 769, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #9339: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/8 ("TLS", 769, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #9340: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/9 ("TLS", 769, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #9341: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/10 ("TLS", 769, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #9342: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/11 ("TLS", 769, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #9343: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/12 ("TLS", 769, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #9344: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/13 ("TLS", 769, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #9345: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/14 ("TLS", 769, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #9346: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/15 ("TLS", 769, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #9347: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/16 ("TLS", 770, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #9348: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/17 ("TLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #9349: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/18 ("TLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #9350: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/19 ("TLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #9351: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/20 ("TLS", 770, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #9352: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/21 ("TLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #9353: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/22 ("TLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #9354: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/23 ("TLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #9355: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/24 ("TLS", 770, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #9356: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/25 ("TLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #9357: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/26 ("TLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #9358: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/27 ("TLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #9359: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/28 ("TLS", 770, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #9360: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/29 ("TLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #9361: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/30 ("TLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #9362: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/31 ("TLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #9363: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/32 ("TLS", 771, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #9364: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/33 ("TLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #9365: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/34 ("TLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #9366: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/35 ("TLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #9367: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/36 ("TLS", 771, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #9368: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/37 ("TLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #9369: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/38 ("TLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #9370: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/39 ("TLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #9371: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/40 ("TLS", 771, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #9372: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/41 ("TLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #9373: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/42 ("TLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #9374: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/43 ("TLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #9375: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/44 ("TLS", 771, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #9376: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/45 ("TLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #9377: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/46 ("TLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #9378: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/47 ("TLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #9379: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/0 ("TLS", 769, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #9380: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/1 ("TLS", 769, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #9381: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/2 ("TLS", 769, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #9382: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/3 ("TLS", 769, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #9383: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/4 ("TLS", 769, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #9384: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/5 ("TLS", 769, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #9385: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/6 ("TLS", 769, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #9386: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/7 ("TLS", 769, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #9387: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/8 ("TLS", 769, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #9388: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/9 ("TLS", 769, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #9389: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/10 ("TLS", 769, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #9390: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/11 ("TLS", 769, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #9391: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/12 ("TLS", 769, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #9392: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/13 ("TLS", 769, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #9393: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/14 ("TLS", 769, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #9394: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/15 ("TLS", 769, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #9395: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/16 ("TLS", 770, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #9396: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/17 ("TLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #9397: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/18 ("TLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #9398: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/19 ("TLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #9399: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/20 ("TLS", 770, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #9400: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/21 ("TLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #9401: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/22 ("TLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #9402: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/23 ("TLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #9403: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/24 ("TLS", 770, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #9404: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/25 ("TLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #9405: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/26 ("TLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #9406: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/27 ("TLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #9407: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/28 ("TLS", 770, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #9408: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/29 ("TLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #9409: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/30 ("TLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #9410: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/31 ("TLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #9411: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/32 ("TLS", 771, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #9412: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/33 ("TLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #9413: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/34 ("TLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #9414: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/35 ("TLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #9415: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/36 ("TLS", 771, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #9416: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/37 ("TLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #9417: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/38 ("TLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #9418: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/39 ("TLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #9419: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/40 ("TLS", 771, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #9420: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/41 ("TLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #9421: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/42 ("TLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #9422: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/43 ("TLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #9423: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/44 ("TLS", 771, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #9424: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/45 ("TLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #9425: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/46 ("TLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #9426: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/47 ("TLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #9427: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/0 ("DTLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #9428: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/1 ("DTLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #9429: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/2 ("DTLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #9430: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/3 ("DTLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #9431: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/4 ("DTLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #9432: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/5 ("DTLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #9433: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/6 ("DTLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #9434: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/7 ("DTLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #9435: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/8 ("DTLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #9436: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/9 ("DTLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #9437: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/10 ("DTLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #9438: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/11 ("DTLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #9439: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/12 ("DTLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #9440: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/13 ("DTLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #9441: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/14 ("DTLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #9442: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/15 ("DTLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #9443: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/16 ("DTLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #9444: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/17 ("DTLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #9445: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/18 ("DTLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #9446: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/19 ("DTLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #9447: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/20 ("DTLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #9448: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/21 ("DTLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #9449: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/22 ("DTLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #9450: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/23 ("DTLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #9451: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/0 ("DTLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #9452: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/1 ("DTLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #9453: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/2 ("DTLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #9454: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/3 ("DTLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #9455: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/4 ("DTLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #9456: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/5 ("DTLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #9457: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/6 ("DTLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #9458: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/7 ("DTLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #9459: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/8 ("DTLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #9460: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/9 ("DTLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #9461: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/10 ("DTLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #9462: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/11 ("DTLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #9463: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/12 ("DTLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #9464: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/13 ("DTLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #9465: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/14 ("DTLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #9466: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/15 ("DTLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #9467: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/16 ("DTLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #9468: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/17 ("DTLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #9469: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/18 ("DTLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #9470: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/19 ("DTLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #9471: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/20 ("DTLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #9472: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/21 ("DTLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #9473: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/22 ("DTLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #9474: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/23 ("DTLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #9475: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/0 ("DTLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #9476: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/1 ("DTLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #9477: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/2 ("DTLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #9478: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/3 ("DTLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #9479: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/4 ("DTLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #9480: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/5 ("DTLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #9481: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/6 ("DTLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #9482: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/7 ("DTLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #9483: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/8 ("DTLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #9484: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/9 ("DTLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #9485: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/10 ("DTLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #9486: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/11 ("DTLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #9487: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/12 ("DTLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #9488: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/13 ("DTLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #9489: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/14 ("DTLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #9490: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/15 ("DTLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #9491: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/16 ("DTLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #9492: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/17 ("DTLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #9493: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/18 ("DTLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #9494: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/19 ("DTLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #9495: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/20 ("DTLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #9496: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/21 ("DTLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #9497: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/22 ("DTLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #9498: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/23 ("DTLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #9499: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/0 ("DTLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #9500: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/1 ("DTLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #9501: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/2 ("DTLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #9502: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/3 ("DTLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #9503: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/4 ("DTLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #9504: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/5 ("DTLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #9505: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/6 ("DTLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #9506: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/7 ("DTLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #9507: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/8 ("DTLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #9508: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/9 ("DTLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #9509: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/10 ("DTLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #9510: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/11 ("DTLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #9511: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/12 ("DTLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #9512: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/13 ("DTLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #9513: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/14 ("DTLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #9514: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/15 ("DTLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #9515: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/16 ("DTLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #9516: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/17 ("DTLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #9517: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/18 ("DTLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #9518: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/19 ("DTLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #9519: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/20 ("DTLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #9520: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/21 ("DTLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #9521: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/22 ("DTLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #9522: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/23 ("DTLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #9523: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/0 TLS 1.0, TLS_ECDHE_RSA_WITH_NULL_SHA, name = "NULL", key size = 0' - PASSED ssl_gtest.sh: #9524: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/1 TLS 1.0, TLS_RSA_WITH_RC4_128_SHA, name = "RC4", key size = 128' - PASSED ssl_gtest.sh: #9525: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/2 TLS 1.0, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, name = "3DES-EDE-CBC", key size = 168' - PASSED ssl_gtest.sh: #9526: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/3 TLS 1.0, TLS_RSA_WITH_AES_128_CBC_SHA, name = "AES-128", key size = 128' - PASSED ssl_gtest.sh: #9527: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/4 TLS 1.2, TLS_RSA_WITH_AES_256_CBC_SHA256, name = "AES-256", key size = 256' - PASSED ssl_gtest.sh: #9528: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/5 TLS 1.2, TLS_RSA_WITH_AES_128_GCM_SHA256, name = "AES-128-GCM", key size = 128' - PASSED ssl_gtest.sh: #9529: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/6 TLS 1.2, TLS_RSA_WITH_AES_256_GCM_SHA384, name = "AES-256-GCM", key size = 256' - PASSED ssl_gtest.sh: #9530: 'DamageYStream/TlsDamageDHYTest: DamageServerY/0 ("TLS", 769, 0, true)' - PASSED ssl_gtest.sh: #9531: 'DamageYStream/TlsDamageDHYTest: DamageServerY/1 ("TLS", 769, 0, false)' - PASSED ssl_gtest.sh: #9532: 'DamageYStream/TlsDamageDHYTest: DamageServerY/2 ("TLS", 769, 1, true)' - PASSED ssl_gtest.sh: #9533: 'DamageYStream/TlsDamageDHYTest: DamageServerY/3 ("TLS", 769, 1, false)' - PASSED ssl_gtest.sh: #9534: 'DamageYStream/TlsDamageDHYTest: DamageServerY/4 ("TLS", 769, 2, true)' - PASSED ssl_gtest.sh: #9535: 'DamageYStream/TlsDamageDHYTest: DamageServerY/5 ("TLS", 769, 2, false)' - PASSED ssl_gtest.sh: #9536: 'DamageYStream/TlsDamageDHYTest: DamageServerY/6 ("TLS", 769, 3, true)' - PASSED ssl_gtest.sh: #9537: 'DamageYStream/TlsDamageDHYTest: DamageServerY/7 ("TLS", 769, 3, false)' - PASSED ssl_gtest.sh: #9538: 'DamageYStream/TlsDamageDHYTest: DamageServerY/8 ("TLS", 769, 4, true)' - PASSED ssl_gtest.sh: #9539: 'DamageYStream/TlsDamageDHYTest: DamageServerY/9 ("TLS", 769, 4, false)' - PASSED ssl_gtest.sh: #9540: 'DamageYStream/TlsDamageDHYTest: DamageServerY/10 ("TLS", 769, 5, true)' - PASSED ssl_gtest.sh: #9541: 'DamageYStream/TlsDamageDHYTest: DamageServerY/11 ("TLS", 769, 5, false)' - PASSED ssl_gtest.sh: #9542: 'DamageYStream/TlsDamageDHYTest: DamageServerY/12 ("TLS", 770, 0, true)' - PASSED ssl_gtest.sh: #9543: 'DamageYStream/TlsDamageDHYTest: DamageServerY/13 ("TLS", 770, 0, false)' - PASSED ssl_gtest.sh: #9544: 'DamageYStream/TlsDamageDHYTest: DamageServerY/14 ("TLS", 770, 1, true)' - PASSED ssl_gtest.sh: #9545: 'DamageYStream/TlsDamageDHYTest: DamageServerY/15 ("TLS", 770, 1, false)' - PASSED ssl_gtest.sh: #9546: 'DamageYStream/TlsDamageDHYTest: DamageServerY/16 ("TLS", 770, 2, true)' - PASSED ssl_gtest.sh: #9547: 'DamageYStream/TlsDamageDHYTest: DamageServerY/17 ("TLS", 770, 2, false)' - PASSED ssl_gtest.sh: #9548: 'DamageYStream/TlsDamageDHYTest: DamageServerY/18 ("TLS", 770, 3, true)' - PASSED ssl_gtest.sh: #9549: 'DamageYStream/TlsDamageDHYTest: DamageServerY/19 ("TLS", 770, 3, false)' - PASSED ssl_gtest.sh: #9550: 'DamageYStream/TlsDamageDHYTest: DamageServerY/20 ("TLS", 770, 4, true)' - PASSED ssl_gtest.sh: #9551: 'DamageYStream/TlsDamageDHYTest: DamageServerY/21 ("TLS", 770, 4, false)' - PASSED ssl_gtest.sh: #9552: 'DamageYStream/TlsDamageDHYTest: DamageServerY/22 ("TLS", 770, 5, true)' - PASSED ssl_gtest.sh: #9553: 'DamageYStream/TlsDamageDHYTest: DamageServerY/23 ("TLS", 770, 5, false)' - PASSED ssl_gtest.sh: #9554: 'DamageYStream/TlsDamageDHYTest: DamageServerY/24 ("TLS", 771, 0, true)' - PASSED ssl_gtest.sh: #9555: 'DamageYStream/TlsDamageDHYTest: DamageServerY/25 ("TLS", 771, 0, false)' - PASSED ssl_gtest.sh: #9556: 'DamageYStream/TlsDamageDHYTest: DamageServerY/26 ("TLS", 771, 1, true)' - PASSED ssl_gtest.sh: #9557: 'DamageYStream/TlsDamageDHYTest: DamageServerY/27 ("TLS", 771, 1, false)' - PASSED ssl_gtest.sh: #9558: 'DamageYStream/TlsDamageDHYTest: DamageServerY/28 ("TLS", 771, 2, true)' - PASSED ssl_gtest.sh: #9559: 'DamageYStream/TlsDamageDHYTest: DamageServerY/29 ("TLS", 771, 2, false)' - PASSED ssl_gtest.sh: #9560: 'DamageYStream/TlsDamageDHYTest: DamageServerY/30 ("TLS", 771, 3, true)' - PASSED ssl_gtest.sh: #9561: 'DamageYStream/TlsDamageDHYTest: DamageServerY/31 ("TLS", 771, 3, false)' - PASSED ssl_gtest.sh: #9562: 'DamageYStream/TlsDamageDHYTest: DamageServerY/32 ("TLS", 771, 4, true)' - PASSED ssl_gtest.sh: #9563: 'DamageYStream/TlsDamageDHYTest: DamageServerY/33 ("TLS", 771, 4, false)' - PASSED ssl_gtest.sh: #9564: 'DamageYStream/TlsDamageDHYTest: DamageServerY/34 ("TLS", 771, 5, true)' - PASSED ssl_gtest.sh: #9565: 'DamageYStream/TlsDamageDHYTest: DamageServerY/35 ("TLS", 771, 5, false)' - PASSED ssl_gtest.sh: #9566: 'DamageYStream/TlsDamageDHYTest: DamageClientY/0 ("TLS", 769, 0, true)' - PASSED ssl_gtest.sh: #9567: 'DamageYStream/TlsDamageDHYTest: DamageClientY/1 ("TLS", 769, 0, false)' - PASSED ssl_gtest.sh: #9568: 'DamageYStream/TlsDamageDHYTest: DamageClientY/2 ("TLS", 769, 1, true)' - PASSED ssl_gtest.sh: #9569: 'DamageYStream/TlsDamageDHYTest: DamageClientY/3 ("TLS", 769, 1, false)' - PASSED ssl_gtest.sh: #9570: 'DamageYStream/TlsDamageDHYTest: DamageClientY/4 ("TLS", 769, 2, true)' - PASSED ssl_gtest.sh: #9571: 'DamageYStream/TlsDamageDHYTest: DamageClientY/5 ("TLS", 769, 2, false)' - PASSED ssl_gtest.sh: #9572: 'DamageYStream/TlsDamageDHYTest: DamageClientY/6 ("TLS", 769, 3, true)' - PASSED ssl_gtest.sh: #9573: 'DamageYStream/TlsDamageDHYTest: DamageClientY/7 ("TLS", 769, 3, false)' - PASSED ssl_gtest.sh: #9574: 'DamageYStream/TlsDamageDHYTest: DamageClientY/8 ("TLS", 769, 4, true)' - PASSED ssl_gtest.sh: #9575: 'DamageYStream/TlsDamageDHYTest: DamageClientY/9 ("TLS", 769, 4, false)' - PASSED ssl_gtest.sh: #9576: 'DamageYStream/TlsDamageDHYTest: DamageClientY/10 ("TLS", 769, 5, true)' - PASSED ssl_gtest.sh: #9577: 'DamageYStream/TlsDamageDHYTest: DamageClientY/11 ("TLS", 769, 5, false)' - PASSED ssl_gtest.sh: #9578: 'DamageYStream/TlsDamageDHYTest: DamageClientY/12 ("TLS", 770, 0, true)' - PASSED ssl_gtest.sh: #9579: 'DamageYStream/TlsDamageDHYTest: DamageClientY/13 ("TLS", 770, 0, false)' - PASSED ssl_gtest.sh: #9580: 'DamageYStream/TlsDamageDHYTest: DamageClientY/14 ("TLS", 770, 1, true)' - PASSED ssl_gtest.sh: #9581: 'DamageYStream/TlsDamageDHYTest: DamageClientY/15 ("TLS", 770, 1, false)' - PASSED ssl_gtest.sh: #9582: 'DamageYStream/TlsDamageDHYTest: DamageClientY/16 ("TLS", 770, 2, true)' - PASSED ssl_gtest.sh: #9583: 'DamageYStream/TlsDamageDHYTest: DamageClientY/17 ("TLS", 770, 2, false)' - PASSED ssl_gtest.sh: #9584: 'DamageYStream/TlsDamageDHYTest: DamageClientY/18 ("TLS", 770, 3, true)' - PASSED ssl_gtest.sh: #9585: 'DamageYStream/TlsDamageDHYTest: DamageClientY/19 ("TLS", 770, 3, false)' - PASSED ssl_gtest.sh: #9586: 'DamageYStream/TlsDamageDHYTest: DamageClientY/20 ("TLS", 770, 4, true)' - PASSED ssl_gtest.sh: #9587: 'DamageYStream/TlsDamageDHYTest: DamageClientY/21 ("TLS", 770, 4, false)' - PASSED ssl_gtest.sh: #9588: 'DamageYStream/TlsDamageDHYTest: DamageClientY/22 ("TLS", 770, 5, true)' - PASSED ssl_gtest.sh: #9589: 'DamageYStream/TlsDamageDHYTest: DamageClientY/23 ("TLS", 770, 5, false)' - PASSED ssl_gtest.sh: #9590: 'DamageYStream/TlsDamageDHYTest: DamageClientY/24 ("TLS", 771, 0, true)' - PASSED ssl_gtest.sh: #9591: 'DamageYStream/TlsDamageDHYTest: DamageClientY/25 ("TLS", 771, 0, false)' - PASSED ssl_gtest.sh: #9592: 'DamageYStream/TlsDamageDHYTest: DamageClientY/26 ("TLS", 771, 1, true)' - PASSED ssl_gtest.sh: #9593: 'DamageYStream/TlsDamageDHYTest: DamageClientY/27 ("TLS", 771, 1, false)' - PASSED ssl_gtest.sh: #9594: 'DamageYStream/TlsDamageDHYTest: DamageClientY/28 ("TLS", 771, 2, true)' - PASSED ssl_gtest.sh: #9595: 'DamageYStream/TlsDamageDHYTest: DamageClientY/29 ("TLS", 771, 2, false)' - PASSED ssl_gtest.sh: #9596: 'DamageYStream/TlsDamageDHYTest: DamageClientY/30 ("TLS", 771, 3, true)' - PASSED ssl_gtest.sh: #9597: 'DamageYStream/TlsDamageDHYTest: DamageClientY/31 ("TLS", 771, 3, false)' - PASSED ssl_gtest.sh: #9598: 'DamageYStream/TlsDamageDHYTest: DamageClientY/32 ("TLS", 771, 4, true)' - PASSED ssl_gtest.sh: #9599: 'DamageYStream/TlsDamageDHYTest: DamageClientY/33 ("TLS", 771, 4, false)' - PASSED ssl_gtest.sh: #9600: 'DamageYStream/TlsDamageDHYTest: DamageClientY/34 ("TLS", 771, 5, true)' - PASSED ssl_gtest.sh: #9601: 'DamageYStream/TlsDamageDHYTest: DamageClientY/35 ("TLS", 771, 5, false)' - PASSED ssl_gtest.sh: #9602: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/0 ("DTLS", 770, 0, true)' - PASSED ssl_gtest.sh: #9603: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/1 ("DTLS", 770, 0, false)' - PASSED ssl_gtest.sh: #9604: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/2 ("DTLS", 770, 1, true)' - PASSED ssl_gtest.sh: #9605: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/3 ("DTLS", 770, 1, false)' - PASSED ssl_gtest.sh: #9606: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/4 ("DTLS", 770, 2, true)' - PASSED ssl_gtest.sh: #9607: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/5 ("DTLS", 770, 2, false)' - PASSED ssl_gtest.sh: #9608: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/6 ("DTLS", 770, 3, true)' - PASSED ssl_gtest.sh: #9609: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/7 ("DTLS", 770, 3, false)' - PASSED ssl_gtest.sh: #9610: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/8 ("DTLS", 770, 4, true)' - PASSED ssl_gtest.sh: #9611: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/9 ("DTLS", 770, 4, false)' - PASSED ssl_gtest.sh: #9612: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/10 ("DTLS", 770, 5, true)' - PASSED ssl_gtest.sh: #9613: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/11 ("DTLS", 770, 5, false)' - PASSED ssl_gtest.sh: #9614: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/12 ("DTLS", 771, 0, true)' - PASSED ssl_gtest.sh: #9615: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/13 ("DTLS", 771, 0, false)' - PASSED ssl_gtest.sh: #9616: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/14 ("DTLS", 771, 1, true)' - PASSED ssl_gtest.sh: #9617: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/15 ("DTLS", 771, 1, false)' - PASSED ssl_gtest.sh: #9618: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/16 ("DTLS", 771, 2, true)' - PASSED ssl_gtest.sh: #9619: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/17 ("DTLS", 771, 2, false)' - PASSED ssl_gtest.sh: #9620: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/18 ("DTLS", 771, 3, true)' - PASSED ssl_gtest.sh: #9621: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/19 ("DTLS", 771, 3, false)' - PASSED ssl_gtest.sh: #9622: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/20 ("DTLS", 771, 4, true)' - PASSED ssl_gtest.sh: #9623: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/21 ("DTLS", 771, 4, false)' - PASSED ssl_gtest.sh: #9624: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/22 ("DTLS", 771, 5, true)' - PASSED ssl_gtest.sh: #9625: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/23 ("DTLS", 771, 5, false)' - PASSED ssl_gtest.sh: #9626: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/0 ("DTLS", 770, 0, true)' - PASSED ssl_gtest.sh: #9627: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/1 ("DTLS", 770, 0, false)' - PASSED ssl_gtest.sh: #9628: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/2 ("DTLS", 770, 1, true)' - PASSED ssl_gtest.sh: #9629: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/3 ("DTLS", 770, 1, false)' - PASSED ssl_gtest.sh: #9630: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/4 ("DTLS", 770, 2, true)' - PASSED ssl_gtest.sh: #9631: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/5 ("DTLS", 770, 2, false)' - PASSED ssl_gtest.sh: #9632: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/6 ("DTLS", 770, 3, true)' - PASSED ssl_gtest.sh: #9633: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/7 ("DTLS", 770, 3, false)' - PASSED ssl_gtest.sh: #9634: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/8 ("DTLS", 770, 4, true)' - PASSED ssl_gtest.sh: #9635: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/9 ("DTLS", 770, 4, false)' - PASSED ssl_gtest.sh: #9636: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/10 ("DTLS", 770, 5, true)' - PASSED ssl_gtest.sh: #9637: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/11 ("DTLS", 770, 5, false)' - PASSED ssl_gtest.sh: #9638: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/12 ("DTLS", 771, 0, true)' - PASSED ssl_gtest.sh: #9639: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/13 ("DTLS", 771, 0, false)' - PASSED ssl_gtest.sh: #9640: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/14 ("DTLS", 771, 1, true)' - PASSED ssl_gtest.sh: #9641: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/15 ("DTLS", 771, 1, false)' - PASSED ssl_gtest.sh: #9642: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/16 ("DTLS", 771, 2, true)' - PASSED ssl_gtest.sh: #9643: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/17 ("DTLS", 771, 2, false)' - PASSED ssl_gtest.sh: #9644: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/18 ("DTLS", 771, 3, true)' - PASSED ssl_gtest.sh: #9645: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/19 ("DTLS", 771, 3, false)' - PASSED ssl_gtest.sh: #9646: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/20 ("DTLS", 771, 4, true)' - PASSED ssl_gtest.sh: #9647: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/21 ("DTLS", 771, 4, false)' - PASSED ssl_gtest.sh: #9648: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/22 ("DTLS", 771, 5, true)' - PASSED ssl_gtest.sh: #9649: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/23 ("DTLS", 771, 5, false)' - PASSED ssl_gtest.sh: #9650: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/0 ("TLS", 771)' - PASSED ssl_gtest.sh: #9651: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/1 ("TLS", 770)' - PASSED ssl_gtest.sh: #9652: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/2 ("DTLS", 771)' - PASSED ssl_gtest.sh: #9653: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/3 ("DTLS", 770)' - PASSED ssl_gtest.sh: #9654: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/0 ("TLS", 771)' - PASSED ssl_gtest.sh: #9655: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/1 ("TLS", 770)' - PASSED ssl_gtest.sh: #9656: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/2 ("DTLS", 771)' - PASSED ssl_gtest.sh: #9657: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/3 ("DTLS", 770)' - PASSED ssl_gtest.sh: #9658: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/0 ("TLS", 771)' - PASSED ssl_gtest.sh: #9659: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/1 ("TLS", 770)' - PASSED ssl_gtest.sh: #9660: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/2 ("DTLS", 771)' - PASSED ssl_gtest.sh: #9661: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/3 ("DTLS", 770)' - PASSED ssl_gtest.sh: #9662: 'TlsPadding/TlsPaddingTest: Correct/0 (1, true)' - PASSED ssl_gtest.sh: #9663: 'TlsPadding/TlsPaddingTest: Correct/1 (1, false)' - PASSED ssl_gtest.sh: #9664: 'TlsPadding/TlsPaddingTest: Correct/2 (19, true)' - PASSED ssl_gtest.sh: #9665: 'TlsPadding/TlsPaddingTest: Correct/3 (19, false)' - PASSED ssl_gtest.sh: #9666: 'TlsPadding/TlsPaddingTest: Correct/4 (20, true)' - PASSED ssl_gtest.sh: #9667: 'TlsPadding/TlsPaddingTest: Correct/5 (20, false)' - PASSED ssl_gtest.sh: #9668: 'TlsPadding/TlsPaddingTest: Correct/6 (30, true)' - PASSED ssl_gtest.sh: #9669: 'TlsPadding/TlsPaddingTest: Correct/7 (30, false)' - PASSED ssl_gtest.sh: #9670: 'TlsPadding/TlsPaddingTest: Correct/8 (31, true)' - PASSED ssl_gtest.sh: #9671: 'TlsPadding/TlsPaddingTest: Correct/9 (31, false)' - PASSED ssl_gtest.sh: #9672: 'TlsPadding/TlsPaddingTest: Correct/10 (32, true)' - PASSED ssl_gtest.sh: #9673: 'TlsPadding/TlsPaddingTest: Correct/11 (32, false)' - PASSED ssl_gtest.sh: #9674: 'TlsPadding/TlsPaddingTest: Correct/12 (36, true)' - PASSED ssl_gtest.sh: #9675: 'TlsPadding/TlsPaddingTest: Correct/13 (36, false)' - PASSED ssl_gtest.sh: #9676: 'TlsPadding/TlsPaddingTest: Correct/14 (256, true)' - PASSED ssl_gtest.sh: #9677: 'TlsPadding/TlsPaddingTest: Correct/15 (256, false)' - PASSED ssl_gtest.sh: #9678: 'TlsPadding/TlsPaddingTest: Correct/16 (257, true)' - PASSED ssl_gtest.sh: #9679: 'TlsPadding/TlsPaddingTest: Correct/17 (257, false)' - PASSED ssl_gtest.sh: #9680: 'TlsPadding/TlsPaddingTest: Correct/18 (287, true)' - PASSED ssl_gtest.sh: #9681: 'TlsPadding/TlsPaddingTest: Correct/19 (287, false)' - PASSED ssl_gtest.sh: #9682: 'TlsPadding/TlsPaddingTest: Correct/20 (288, true)' - PASSED ssl_gtest.sh: #9683: 'TlsPadding/TlsPaddingTest: Correct/21 (288, false)' - PASSED ssl_gtest.sh: #9684: 'TlsPadding/TlsPaddingTest: PadTooLong/0 (1, true)' - PASSED ssl_gtest.sh: #9685: 'TlsPadding/TlsPaddingTest: PadTooLong/1 (1, false)' - PASSED ssl_gtest.sh: #9686: 'TlsPadding/TlsPaddingTest: PadTooLong/2 (19, true)' - PASSED ssl_gtest.sh: #9687: 'TlsPadding/TlsPaddingTest: PadTooLong/3 (19, false)' - PASSED ssl_gtest.sh: #9688: 'TlsPadding/TlsPaddingTest: PadTooLong/4 (20, true)' - PASSED ssl_gtest.sh: #9689: 'TlsPadding/TlsPaddingTest: PadTooLong/5 (20, false)' - PASSED ssl_gtest.sh: #9690: 'TlsPadding/TlsPaddingTest: PadTooLong/6 (30, true)' - PASSED ssl_gtest.sh: #9691: 'TlsPadding/TlsPaddingTest: PadTooLong/7 (30, false)' - PASSED ssl_gtest.sh: #9692: 'TlsPadding/TlsPaddingTest: PadTooLong/8 (31, true)' - PASSED ssl_gtest.sh: #9693: 'TlsPadding/TlsPaddingTest: PadTooLong/9 (31, false)' - PASSED ssl_gtest.sh: #9694: 'TlsPadding/TlsPaddingTest: PadTooLong/10 (32, true)' - PASSED ssl_gtest.sh: #9695: 'TlsPadding/TlsPaddingTest: PadTooLong/11 (32, false)' - PASSED ssl_gtest.sh: #9696: 'TlsPadding/TlsPaddingTest: PadTooLong/12 (36, true)' - PASSED ssl_gtest.sh: #9697: 'TlsPadding/TlsPaddingTest: PadTooLong/13 (36, false)' - PASSED ssl_gtest.sh: #9698: 'TlsPadding/TlsPaddingTest: PadTooLong/14 (256, true)' - PASSED ssl_gtest.sh: #9699: 'TlsPadding/TlsPaddingTest: PadTooLong/15 (256, false)' - PASSED ssl_gtest.sh: #9700: 'TlsPadding/TlsPaddingTest: PadTooLong/16 (257, true)' - PASSED ssl_gtest.sh: #9701: 'TlsPadding/TlsPaddingTest: PadTooLong/17 (257, false)' - PASSED ssl_gtest.sh: #9702: 'TlsPadding/TlsPaddingTest: PadTooLong/18 (287, true)' - PASSED ssl_gtest.sh: #9703: 'TlsPadding/TlsPaddingTest: PadTooLong/19 (287, false)' - PASSED ssl_gtest.sh: #9704: 'TlsPadding/TlsPaddingTest: PadTooLong/20 (288, true)' - PASSED ssl_gtest.sh: #9705: 'TlsPadding/TlsPaddingTest: PadTooLong/21 (288, false)' - PASSED ssl_gtest.sh: #9706: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/0 (1, true)' - PASSED ssl_gtest.sh: #9707: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/1 (1, false)' - PASSED ssl_gtest.sh: #9708: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/2 (19, true)' - PASSED ssl_gtest.sh: #9709: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/3 (19, false)' - PASSED ssl_gtest.sh: #9710: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/4 (20, true)' - PASSED ssl_gtest.sh: #9711: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/5 (20, false)' - PASSED ssl_gtest.sh: #9712: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/6 (30, true)' - PASSED ssl_gtest.sh: #9713: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/7 (30, false)' - PASSED ssl_gtest.sh: #9714: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/8 (31, true)' - PASSED ssl_gtest.sh: #9715: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/9 (31, false)' - PASSED ssl_gtest.sh: #9716: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/10 (32, true)' - PASSED ssl_gtest.sh: #9717: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/11 (32, false)' - PASSED ssl_gtest.sh: #9718: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/12 (36, true)' - PASSED ssl_gtest.sh: #9719: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/13 (36, false)' - PASSED ssl_gtest.sh: #9720: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/14 (256, true)' - PASSED ssl_gtest.sh: #9721: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/15 (256, false)' - PASSED ssl_gtest.sh: #9722: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/16 (257, true)' - PASSED ssl_gtest.sh: #9723: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/17 (257, false)' - PASSED ssl_gtest.sh: #9724: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/18 (287, true)' - PASSED ssl_gtest.sh: #9725: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/19 (287, false)' - PASSED ssl_gtest.sh: #9726: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/20 (288, true)' - PASSED ssl_gtest.sh: #9727: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/21 (288, false)' - PASSED ssl_gtest.sh: #9728: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/0 (1, true)' - PASSED ssl_gtest.sh: #9729: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/1 (1, false)' - PASSED ssl_gtest.sh: #9730: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/2 (19, true)' - PASSED ssl_gtest.sh: #9731: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/3 (19, false)' - PASSED ssl_gtest.sh: #9732: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/4 (20, true)' - PASSED ssl_gtest.sh: #9733: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/5 (20, false)' - PASSED ssl_gtest.sh: #9734: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/6 (30, true)' - PASSED ssl_gtest.sh: #9735: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/7 (30, false)' - PASSED ssl_gtest.sh: #9736: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/8 (31, true)' - PASSED ssl_gtest.sh: #9737: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/9 (31, false)' - PASSED ssl_gtest.sh: #9738: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/10 (32, true)' - PASSED ssl_gtest.sh: #9739: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/11 (32, false)' - PASSED ssl_gtest.sh: #9740: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/12 (36, true)' - PASSED ssl_gtest.sh: #9741: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/13 (36, false)' - PASSED ssl_gtest.sh: #9742: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/14 (256, true)' - PASSED ssl_gtest.sh: #9743: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/15 (256, false)' - PASSED ssl_gtest.sh: #9744: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/16 (257, true)' - PASSED ssl_gtest.sh: #9745: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/17 (257, false)' - PASSED ssl_gtest.sh: #9746: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/18 (287, true)' - PASSED ssl_gtest.sh: #9747: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/19 (287, false)' - PASSED ssl_gtest.sh: #9748: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/20 (288, true)' - PASSED ssl_gtest.sh: #9749: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/21 (288, false)' - PASSED ssl_gtest.sh: #9750: 'SkipTls10/TlsSkipTest: SkipCertificateRsa/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #9751: 'SkipTls10/TlsSkipTest: SkipCertificateDhe/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #9752: 'SkipTls10/TlsSkipTest: SkipCertificateEcdhe/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #9753: 'SkipTls10/TlsSkipTest: SkipCertificateEcdsa/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #9754: 'SkipTls10/TlsSkipTest: SkipServerKeyExchange/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #9755: 'SkipTls10/TlsSkipTest: SkipServerKeyExchangeEcdsa/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #9756: 'SkipTls10/TlsSkipTest: SkipCertAndKeyExch/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #9757: 'SkipTls10/TlsSkipTest: SkipCertAndKeyExchEcdsa/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #9758: 'SkipVariants/TlsSkipTest: SkipCertificateRsa/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #9759: 'SkipVariants/TlsSkipTest: SkipCertificateRsa/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #9760: 'SkipVariants/TlsSkipTest: SkipCertificateRsa/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #9761: 'SkipVariants/TlsSkipTest: SkipCertificateRsa/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #9762: 'SkipVariants/TlsSkipTest: SkipCertificateDhe/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #9763: 'SkipVariants/TlsSkipTest: SkipCertificateDhe/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #9764: 'SkipVariants/TlsSkipTest: SkipCertificateDhe/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #9765: 'SkipVariants/TlsSkipTest: SkipCertificateDhe/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #9766: 'SkipVariants/TlsSkipTest: SkipCertificateEcdhe/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #9767: 'SkipVariants/TlsSkipTest: SkipCertificateEcdhe/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #9768: 'SkipVariants/TlsSkipTest: SkipCertificateEcdhe/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #9769: 'SkipVariants/TlsSkipTest: SkipCertificateEcdhe/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #9770: 'SkipVariants/TlsSkipTest: SkipCertificateEcdsa/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #9771: 'SkipVariants/TlsSkipTest: SkipCertificateEcdsa/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #9772: 'SkipVariants/TlsSkipTest: SkipCertificateEcdsa/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #9773: 'SkipVariants/TlsSkipTest: SkipCertificateEcdsa/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #9774: 'SkipVariants/TlsSkipTest: SkipServerKeyExchange/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #9775: 'SkipVariants/TlsSkipTest: SkipServerKeyExchange/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #9776: 'SkipVariants/TlsSkipTest: SkipServerKeyExchange/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #9777: 'SkipVariants/TlsSkipTest: SkipServerKeyExchange/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #9778: 'SkipVariants/TlsSkipTest: SkipServerKeyExchangeEcdsa/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #9779: 'SkipVariants/TlsSkipTest: SkipServerKeyExchangeEcdsa/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #9780: 'SkipVariants/TlsSkipTest: SkipServerKeyExchangeEcdsa/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #9781: 'SkipVariants/TlsSkipTest: SkipServerKeyExchangeEcdsa/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #9782: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExch/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #9783: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExch/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #9784: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExch/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #9785: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExch/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #9786: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExchEcdsa/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #9787: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExchEcdsa/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #9788: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExchEcdsa/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #9789: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExchEcdsa/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #9790: 'AllHashFuncs/TlsHkdfTest: HkdfNullNull/0 4' - PASSED ssl_gtest.sh: #9791: 'AllHashFuncs/TlsHkdfTest: HkdfNullNull/1 5' - PASSED ssl_gtest.sh: #9792: 'AllHashFuncs/TlsHkdfTest: HkdfKey1Only/0 4' - PASSED ssl_gtest.sh: #9793: 'AllHashFuncs/TlsHkdfTest: HkdfKey1Only/1 5' - PASSED ssl_gtest.sh: #9794: 'AllHashFuncs/TlsHkdfTest: HkdfKey2Only/0 4' - PASSED ssl_gtest.sh: #9795: 'AllHashFuncs/TlsHkdfTest: HkdfKey2Only/1 5' - PASSED ssl_gtest.sh: #9796: 'AllHashFuncs/TlsHkdfTest: HkdfKey1Key2/0 4' - PASSED ssl_gtest.sh: #9797: 'AllHashFuncs/TlsHkdfTest: HkdfKey1Key2/1 5' - PASSED ssl_gtest.sh: #9798: 'AllHashFuncs/TlsHkdfTest: HkdfExpandLabel/0 4' - PASSED ssl_gtest.sh: #9799: 'AllHashFuncs/TlsHkdfTest: HkdfExpandLabel/1 5' - PASSED TIMESTAMP ssl_gtests END: Fri Mar 31 18:30:32 UTC 2017 ssl_gtests.sh: Testing with upgraded library =============================== cp: cannot stat '/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/cert.done': No such file or directory Running tests for dbupgrade TIMESTAMP dbupgrade BEGIN: Fri Mar 31 18:30:33 UTC 2017 dbupgrade.sh: DB upgrade tests =============================== Reset databases to their initial values: certutil: could not find certificate named "objsigner": SEC_ERROR_BAD_DATABASE: security library: bad database. Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu dbupgrade.sh: Legacy to shared Library update =============================== alicedir upgrading db alicedir Generating key. This may take a few moments... dbupgrade.sh: #9800: Upgrading alicedir - PASSED bobdir upgrading db bobdir Generating key. This may take a few moments... dbupgrade.sh: #9801: Upgrading bobdir - PASSED CA upgrading db CA Generating key. This may take a few moments... dbupgrade.sh: #9802: Upgrading CA - PASSED cert_extensions upgrading db cert_extensions Generating key. This may take a few moments... dbupgrade.sh: #9803: Upgrading cert_extensions - PASSED client upgrading db client Generating key. This may take a few moments... dbupgrade.sh: #9804: Upgrading client - PASSED clientCA upgrading db clientCA Generating key. This may take a few moments... dbupgrade.sh: #9805: Upgrading clientCA - PASSED dave upgrading db dave Generating key. This may take a few moments... dbupgrade.sh: #9806: Upgrading dave - PASSED eccurves upgrading db eccurves Generating key. This may take a few moments... dbupgrade.sh: #9807: Upgrading eccurves - PASSED eve upgrading db eve Generating key. This may take a few moments... dbupgrade.sh: #9808: Upgrading eve - PASSED ext_client upgrading db ext_client Generating key. This may take a few moments... dbupgrade.sh: #9809: Upgrading ext_client - PASSED ext_server upgrading db ext_server Generating key. This may take a few moments... dbupgrade.sh: #9810: Upgrading ext_server - PASSED SDR upgrading db SDR Generating key. This may take a few moments... dbupgrade.sh: #9811: Upgrading SDR - PASSED server upgrading db server Generating key. This may take a few moments... dbupgrade.sh: #9812: Upgrading server - PASSED serverCA upgrading db serverCA Generating key. This may take a few moments... dbupgrade.sh: #9813: Upgrading serverCA - PASSED ssl_gtests skipping db ssl_gtests dbupgrade.sh: #9814: No directory ssl_gtests - PASSED stapling upgrading db stapling Generating key. This may take a few moments... dbupgrade.sh: #9815: Upgrading stapling - PASSED tools/copydir skipping db tools/copydir dbupgrade.sh: #9816: No directory tools/copydir - PASSED upgrading db fips Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. dbupgrade.sh: #9817: Upgrading fips - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu TIMESTAMP dbupgrade END: Fri Mar 31 18:31:22 UTC 2017 Running tests for tools TIMESTAMP tools BEGIN: Fri Mar 31 18:31:22 UTC 2017 tools.sh: Tools Tests with ECC =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9818: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 48:14:0b:b5:2b:98:70:5e:23:92:be:ae:3f:10:1e:bd Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9819: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9820: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9821: Exporting Alice's email EC cert & key (pk12util -o) - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9822: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: da:9b:5b:91:b4:95:e9:75:3a:81:8d:ee:37:96:9a:12 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Mar 31 14:09:43 2017 Not After : Thu Mar 31 14:09:43 2067 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:9a:10:09:f5:9f:6e:c1:cd:d2:59:f9:55:94:05: a8:cd:40:85:b4:30:5b:df:85:18:f5:7e:70:54:83:84: 04:91:d8:fd:0e:0f:62:65:ec:32:b7:52:b6:2b:7f:2d: e9:68:2f:fc:4a:5b:09:30:8b:47:69:f8:13:a4:c4:f6: 0d:22:3a:01:ac:82:a4:a6:ce:95:75:fb:30:44:1e:44: 5d:17:51:7a:2c:e6:b0:86:5f:3d:e3:80:b3:a9:48:34: 3b:63:0d:cf:0c:75:dc:d8:32:b1:a8:77:a2:b8:3f:03: be:eb:4a:09:a9:84:eb:b6:09:09:19:da:a3:0d:19:70: 94:c8:17:ee:f6 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:87:02:42:01:08:9d:fc:1b:89:98:ad:f6:fc:81: 00:06:ca:5e:8a:34:67:92:1e:8a:c0:36:15:0b:eb:ac: cc:f2:8d:da:93:5e:c6:86:c1:6d:66:cd:fc:b3:7b:56: 90:4a:c3:b8:cd:54:18:37:87:40:ca:7b:4f:e9:aa:4f: b5:d9:c3:c0:42:17:4f:02:41:12:4a:73:4d:1b:10:e6: e0:d4:11:f2:c6:6b:1d:cb:73:c6:34:62:29:d0:13:3d: e8:76:8b:36:e6:bf:1b:8a:f2:22:e3:30:e1:53:22:c0: 9f:e8:31:76:c1:96:16:8c:08:2b:80:68:77:46:5c:e9: ca:b0:8b:22:cd:c9:88:bb:60:38 Fingerprint (SHA-256): A0:6C:3D:C3:6C:74:00:D9:C7:A7:5B:6B:94:7E:A8:CE:65:71:4E:06:04:54:27:9D:B9:93:09:38:DC:78:BF:3E Fingerprint (SHA1): 77:55:A4:22:04:5D:A6:FA:1E:9E:29:F2:B2:C3:AE:1F:A3:D7:8D:8E Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Mar 31 14:12:04 2017 Not After : Thu Mar 31 14:12:04 2022 Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:ab:58:63:55:db:6b:d2:fe:f7:c4:61:4f:b2:47:65: 6d:b8:48:9e:6c:ff:6e:29:e9:8b:02:8c:9a:bc:77:45: 0e:bc:da:bc:b3:04:1f:27:e4:5d:d8:68:dd:6e:01:6d: ba:64:97:02:4f:25:f2:c6:b0:0a:ca:07:70:90:4b:99: 42:1b:78:39:6c:4d:20:c0:c5:f2:3e:e0:fc:a1:6a:55: 65:b2:07:4e:1b:95:db:ee:54:f0:3f:da:3e:16:42:5a: dc Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:87:02:42:00:9b:d3:10:29:41:48:4b:b7:69:01: 60:c7:9a:f7:80:00:cc:8c:da:a6:b4:b7:ae:53:9b:b1: eb:ff:bc:ee:e2:55:72:71:9e:15:de:07:9f:9a:07:af: fb:37:84:34:f8:ee:2e:e3:33:24:61:6d:63:af:c0:7c: 52:dd:bf:95:80:42:b8:02:41:41:94:d8:39:6f:60:60: 66:c4:20:0a:58:2f:75:76:d3:57:eb:1f:f9:77:9c:d9: 89:8c:e4:b6:71:04:9c:8a:69:af:b9:f9:07:86:c4:ce: d4:cc:a3:a2:40:59:98:b4:41:13:d9:b9:c5:9c:3f:5f: 42:4b:22:22:1c:42:09:69:f0:50 Fingerprint (SHA-256): F0:9F:D5:09:D2:CF:B1:07:8C:70:8B:7F:E9:19:09:AF:09:0B:97:46:D4:4E:35:89:0A:26:1E:DD:DE:D9:97:C8 Fingerprint (SHA1): 9D:CD:A7:A4:F0:12:56:F5:77:6A:0B:A6:F4:B4:5A:5F:C9:DC:48:8F Friendly Name: Alice-ec tools.sh: #9823: Listing Alice's pk12 EC file (pk12util -l) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9824: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: be:dc:50:89:10:03:15:1c:4c:de:5b:55:14:5f:74:8e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9825: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9826: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9827: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 9a:11:5f:e0:7e:9b:54:d6:00:1d:85:ec:53:50:d5:29 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9828: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9829: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9830: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 8b:4d:a3:84:0a:32:77:b4:b5:92:10:f6:be:26:5d:08 Iteration Count: 2000 (0x7d0) tools.sh: #9831: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9832: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9833: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b5:f2:83:ca:c9:86:95:7e:70:fe:e1:9c:35:11:66:36 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9834: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9835: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9836: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0c:ed:9f:07:fe:33:dc:a4:ab:51:4c:81:a8:26:2d:0a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9837: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9838: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9839: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e3:b0:52:69:da:39:d7:82:3c:6b:8c:b8:ba:65:80:b9 Iteration Count: 2000 (0x7d0) tools.sh: #9840: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9841: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9842: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fd:c4:7e:13:db:30:dc:a3:12:ef:5e:ea:25:65:00:6b Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:a4:a7:00:69:05:a4:77:0d:db:0d:50:0b:19:ee: 59:1c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9843: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9844: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9845: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 66:a6:2f:a0:5a:0f:42:68:ed:ca:4c:4f:22:1f:ef:c7 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:03:68:d9:e2:a1:f5:1f:b2:61:62:f8:44:db:35: 26:f7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9846: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9847: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9848: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f7:5e:c0:2c:63:f3:a0:76:31:2d:71:b6:e0:57:52:7b Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:2a:db:4c:f6:65:d0:83:6e:f9:1b:c5:98:8a:00: 95:2c tools.sh: #9849: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9850: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9851: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1b:37:d4:48:ec:ba:54:23:99:27:92:30:e5:37:08:f2 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:ed:b9:dc:e6:cc:04:5e:2d:f9:69:56:e0:19:a5: f1:b7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9852: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9853: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9854: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e4:69:30:dd:df:67:f7:ce:42:30:d3:23:fc:e3:ec:6e Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:f1:f1:42:9c:68:97:c6:12:4e:a0:fa:76:07:35: 1e:be Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9855: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9856: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9857: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fa:66:0b:a5:57:75:04:54:fd:4c:5e:45:e6:55:3b:84 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:20:27:81:95:78:f2:a0:e3:02:e3:2b:73:b8:5d: a7:c3 tools.sh: #9858: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9859: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9860: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6c:79:7b:52:24:cf:7c:a4:a7:5d:34:3c:25:23:c0:32 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:73:1a:c4:63:a2:fb:4e:57:da:e0:f3:be:22:05: 79:d9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9861: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9862: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9863: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 35:b0:7f:a5:d9:0c:f9:3d:52:5b:3a:55:f4:57:ef:b4 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:51:f3:2c:57:14:55:c0:b5:71:45:0f:31:ae:32: 93:fc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9864: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9865: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9866: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 14:d5:a4:de:95:ec:90:61:3b:f7:8e:84:a0:78:bb:e5 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:59:88:2f:0f:46:b2:3e:2c:60:e4:68:43:1f:29: 01:50 tools.sh: #9867: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9868: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9869: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 42:60:d8:f2:86:bb:a5:52:d2:db:4f:9b:29:54:36:5a Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:73:1e:b7:d8:97:6d:fd:b9:bf:e8:07:38:63:39: 31:05 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9870: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9871: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9872: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 30:6c:ed:13:09:59:db:87:4a:5d:aa:55:e3:00:39:76 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:c2:41:e4:b9:9a:cc:1a:1b:08:a3:61:cb:f9:f3: 9c:23 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9873: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9874: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9875: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 63:91:69:0f:af:05:4e:cb:3c:d4:e8:5b:58:df:47:89 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:ad:00:8b:47:c8:2d:5f:03:a6:36:a0:28:1b:89: 50:22 tools.sh: #9876: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9877: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9878: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: dc:b7:db:63:8d:8c:14:d3:77:8b:78:bc:96:6a:4e:24 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:41:57:1b:c3:b2:df:17:66:d8:e1:d5:7e:7b:da: 30:bf Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9879: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9880: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9881: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: da:78:57:d8:b0:8a:b8:42:92:61:b4:30:17:26:c2:b9 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:c7:b4:e4:1a:79:0e:8d:00:b9:14:ce:21:c8:58: a8:62 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9882: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9883: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9884: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e3:77:c1:1b:56:2c:bd:52:71:cd:3a:c9:4e:03:bc:54 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:e8:da:7f:a3:b3:a3:44:d0:e3:21:ae:03:71:ab: d2:47 tools.sh: #9885: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9886: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9887: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 64:3e:51:12:ae:74:07:fc:58:5c:eb:68:b3:ba:7c:00 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:f0:db:48:7f:03:28:d4:12:7d:34:72:79:55:f9: 77:ab Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9888: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9889: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9890: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 79:ce:1d:40:21:8c:b3:9d:85:93:98:d4:ca:fc:53:eb Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:6b:34:df:66:de:8d:aa:df:bd:9b:43:3c:f1:e1: 9d:76 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9891: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9892: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9893: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c0:c8:b9:a9:2c:ff:c5:47:f8:56:10:24:07:0f:86:ff Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:78:3f:c4:f3:6a:72:af:71:49:a2:48:2c:75:17: dc:ad tools.sh: #9894: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9895: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9896: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 91:0e:dd:0e:7a:11:82:75:d6:73:db:08:f5:e0:27:bd Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9897: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9898: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9899: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 6d:cd:e1:fb:ae:51:4b:f5:02:e9:ca:b4:d9:85:ef:1e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9900: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9901: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9902: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 41:4a:31:8f:37:a1:b2:f3:85:1d:e4:f4:0b:49:8c:68 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9903: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9904: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9905: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 27:32:d3:8b:65:88:c9:8c:78:4c:46:23:09:2c:e8:e5 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9906: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9907: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9908: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: a3:cd:da:be:f8:45:f8:ef:c8:a7:47:9c:4a:e5:97:15 Iteration Count: 2000 (0x7d0) tools.sh: #9909: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9910: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9911: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 8c:55:db:86:f0:12:fa:0d:01:50:aa:89:f0:f4:07:3d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9912: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9913: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9914: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 10:83:46:b3:ed:5c:1d:ce:d6:99:a5:fe:2e:7c:4c:5e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9915: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9916: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9917: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 0e:eb:6f:29:8d:ea:f5:14:42:03:69:ad:11:03:eb:78 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9918: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9919: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9920: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 18:c4:af:d3:80:96:63:51:39:9e:1d:ae:03:2e:22:61 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9921: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9922: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9923: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 34:fc:8a:df:66:95:86:47:ca:b4:93:00:a3:73:0c:d4 Iteration Count: 2000 (0x7d0) tools.sh: #9924: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9925: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9926: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 84:8f:58:2e:1d:8e:c4:40:63:d0:85:1e:6c:65:48:e4 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9927: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9928: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9929: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: b6:9f:85:ea:42:93:33:a8:75:8a:e2:54:83:f3:74:38 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9930: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9931: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9932: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: bf:15:0a:87:3b:03:bf:b6:2b:48:d7:a3:0f:25:22:a3 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9933: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9934: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9935: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 26:19:0f:da:13:02:5f:0a:d9:48:74:67:f6:fd:f3:39 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9936: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9937: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9938: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ba:86:67:0c:52:cb:0d:0b:0f:db:3d:ef:8c:a6:62:c4 Iteration Count: 2000 (0x7d0) tools.sh: #9939: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9940: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9941: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b6:52:b4:aa:cf:84:58:cc:de:f6:54:50:6c:e2:40:43 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9942: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9943: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9944: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4d:a8:95:61:0b:eb:bc:f2:0b:66:ae:73:2f:b0:16:1d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9945: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9946: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9947: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 85:71:9d:c2:42:d2:10:e4:e6:85:66:c0:16:4f:2d:6d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9948: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9949: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9950: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 95:72:74:2b:1f:2f:a9:1c:27:fd:24:08:c5:41:fb:16 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9951: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9952: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9953: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fe:ed:62:8d:a0:bf:20:8f:41:56:de:41:55:dc:d2:86 Iteration Count: 2000 (0x7d0) tools.sh: #9954: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9955: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9956: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e9:a4:ac:6b:98:5f:43:6a:4e:2b:74:78:72:46:f7:6b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9957: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9958: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9959: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7d:9f:ee:c7:0b:db:3b:5d:5c:64:5c:7c:15:48:49:e8 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9960: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9961: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9962: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f5:c1:dd:77:22:3e:d0:04:be:25:61:4d:32:6a:db:40 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9963: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9964: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9965: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 81:f5:59:1e:6c:cd:39:e0:ad:b6:90:59:9e:c4:58:28 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9966: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9967: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9968: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ea:eb:c4:d8:45:34:4a:48:d0:c5:51:2e:23:34:e9:50 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9969: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9970: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9971: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ef:6a:5c:ad:f8:3c:d8:7b:39:47:aa:aa:9a:dd:cc:e5 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9972: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9973: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9974: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5d:1c:ee:d1:1e:b4:db:a5:e8:4b:85:6e:a5:c6:2d:5f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9975: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9976: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9977: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c8:c2:98:a6:3d:ed:60:36:b4:e9:e7:3e:e7:be:8d:23 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9978: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9979: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9980: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e5:0a:55:4e:10:91:72:9c:d7:c7:61:0f:20:53:4c:ab Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9981: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9982: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9983: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4c:21:cf:77:10:bf:71:76:be:c0:94:d8:41:ba:63:c3 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:08:02 2017 Not After : Thu Mar 31 14:08:02 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:68:4f:fd:78:81:4e:f0:37:2f:d5:ad:ad:d8:f3:49: 70:cd:2e:50:75:1d:06:dd:e7:3f:a0:b4:be:24:a4:3f: 2a:3f:70:a5:66:7d:6a:79:53:ad:13:e5:61:12:9f:cd: c0:ec:fb:3e:1b:72:1f:ba:d9:c7:64:02:f8:9c:f2:63: 3e:87:fb:f2:95:3f:0e:b4:81:3d:84:6f:fd:f0:f4:1b: 4e:f4:e1:56:aa:e3:07:32:89:c9:4b:ae:f7:0e:22:de: aa:d1:dd:4f:99:39:3f:17:37:75:a9:a5:ff:51:9d:20: 66:e3:77:da:a2:c2:5c:06:a2:11:4a:c0:9d:bd:eb:1a: 46:42:5a:2b:13:2d:6f:da:4e:01:c9:ba:ec:dd:3f:76: 1b:a4:57:92:9c:88:b6:7e:92:92:ef:39:46:e3:e3:c7: 6a:15:31:18:f5:08:94:ce:86:b1:fb:52:1c:6e:90:68: fd:4c:07:9e:91:41:82:f4:97:61:37:61:04:92:16:45: 56:ff:7a:fb:86:69:57:93:f3:cd:7a:7d:c7:a7:0a:b8: 5c:db:71:23:dd:64:6c:90:92:0b:42:89:a0:ee:d9:c9: 08:e0:84:84:57:cf:97:c2:32:ee:17:35:63:35:f8:11: 2a:7f:32:d5:f8:b2:90:ac:3d:d0:08:ec:22:b7:30:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:d0:06:c7:70:cd:b1:a7:cf:40:3f:d5:50:ea:fe:11: 33:27:2b:33:03:a7:e9:40:34:15:2b:3e:91:ef:78:d2: b5:c7:d4:39:2a:f0:d0:b6:b6:3b:be:50:e3:ce:fa:a7: db:37:c9:fa:1d:54:8a:1c:45:02:43:8c:70:0d:78:c6: f1:1e:47:c0:66:3b:2f:be:d7:d1:4e:ac:99:1c:5e:b4: 9b:2a:c8:b3:9f:b3:ef:c2:5f:64:c3:7f:7d:c9:d8:19: fe:61:f2:65:d4:0a:c0:00:34:23:ee:43:a6:12:63:0a: 51:e8:ae:59:3c:10:68:5c:a7:a2:30:de:3b:63:70:38: be:6d:0b:df:13:41:a2:9b:0a:3a:20:d7:f3:e6:1d:97: 1c:5a:45:e3:7a:17:94:20:ee:0d:72:ce:b9:14:65:58: b2:88:55:75:bc:3c:2e:4c:cf:42:46:0d:59:fe:d0:7d: b4:c0:2e:6d:4f:7d:f6:0c:31:df:95:28:b2:d7:7f:77: fa:32:31:47:5b:da:0a:a7:5e:8b:a5:00:69:56:ca:4a: 2d:5e:51:78:1a:11:ca:25:c0:04:17:00:cc:e5:14:75: 7e:ec:84:89:92:e6:32:37:68:95:4b:8e:f9:b1:fb:2c: 91:51:15:45:67:ec:d3:e9:b8:ec:fa:e8:44:8d:b0:43 Fingerprint (SHA-256): 5F:59:73:66:3F:44:E0:B0:48:6B:5F:AB:50:43:65:FB:DE:D2:05:A3:82:72:59:56:C0:B1:45:A9:A1:53:7D:D1 Fingerprint (SHA1): 9E:59:76:62:BA:20:88:3B:F1:E0:95:A3:E2:44:0C:17:12:C4:5E:75 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:11:58 2017 Not After : Thu Mar 31 14:11:58 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:60:0e:3f:7f:8b:95:5b:24:52:42:d4:5b:71:cf:a4: b8:2a:ef:f2:dd:2d:5d:71:3e:1c:53:b0:16:4f:84:8b: 32:9c:af:e9:8d:68:7f:7b:a6:c6:b3:96:de:af:84:dd: e5:07:89:74:7a:c8:bc:ff:84:a1:1e:3c:63:73:ae:f7: 69:ee:07:3e:bc:0f:d5:68:b6:e8:b8:14:76:b2:01:54: af:a5:09:50:98:bd:66:bf:0e:d5:d5:5e:3d:62:84:10: 60:bf:22:3e:90:48:59:52:1d:04:00:30:c9:67:4b:50: c9:1b:05:80:68:6b:37:18:eb:51:33:e3:08:86:86:3d: f3:59:c7:12:92:9e:51:23:68:36:8e:2f:41:31:91:13: 3e:ea:26:07:2f:2c:31:86:08:58:ba:dc:97:46:d9:ef: 46:71:39:c4:a1:09:8b:d9:14:6a:bf:3c:d9:8a:dc:1c: bd:93:d2:f3:d7:39:61:40:5f:a2:e2:9c:98:5a:4a:1f: 65:c1:fb:a9:98:25:6f:96:c8:34:72:2a:51:05:77:d7: dc:80:51:dd:dc:fd:7a:a7:8f:d9:3f:65:f1:dd:88:26: 51:3e:64:34:6e:9a:39:98:a0:54:26:46:27:a3:96:1e: 9e:e9:69:5f:9b:5c:8e:b6:fa:b6:f0:d1:95:a0:64:df Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:5f:8c:c9:f6:97:a2:47:d3:fb:66:ea:78:37:7b:2d: 76:62:1a:3f:5b:13:49:b8:57:a6:e2:82:e5:dd:5c:ef: 14:53:40:54:25:b4:65:15:60:8e:cf:a1:5e:e0:14:64: 76:72:0b:5d:79:48:0a:e8:93:10:80:80:42:a6:cc:8b: c6:52:fe:31:88:0b:4c:cc:37:87:89:b2:79:0d:ca:6d: 87:cd:35:54:c0:9f:a0:57:b6:7f:1d:13:63:02:9e:56: 87:da:b3:64:e9:fc:73:c2:d8:ca:c6:40:eb:09:5d:50: 79:3e:fa:7c:3d:34:43:14:89:7b:52:92:d6:97:93:05: 34:f1:8f:c7:9b:2d:85:20:4e:2d:ec:7c:da:9f:1f:45: 19:72:9e:85:d0:4b:18:92:52:88:83:1a:fe:b4:22:58: 3d:bb:69:dd:d7:f5:9a:5b:48:31:a7:55:16:17:8d:97: 22:f0:20:0a:7b:67:9a:35:ef:43:e4:04:a2:d5:78:60: cc:2e:39:54:12:50:9c:19:7c:bc:87:c0:75:d7:c4:95: e7:5b:e8:1c:05:3d:b9:b4:35:84:f8:cd:1c:da:93:0e: 52:f6:2a:ab:d8:92:7a:47:e7:4d:97:3a:11:c9:0a:f2: 2e:7f:df:1f:fe:b4:33:c0:91:38:3e:04:9d:45:5b:e4 Fingerprint (SHA-256): 5D:5E:15:37:A4:0D:9F:0A:8C:75:CE:7B:45:6A:98:F8:37:4B:71:0A:AD:F8:ED:B9:8D:13:12:9C:D8:6A:26:3F Fingerprint (SHA1): 51:24:7F:F0:F8:65:D0:50:1E:90:AF:A1:9D:FF:CB:D2:BE:C0:05:10 Friendly Name: Alice tools.sh: #9984: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9985: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #9986: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9987: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #9988: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #9989: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #9990: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #9991: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #9992: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #9993: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #9994: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Fri Mar 31 18:33:37 UTC 2017 Running tests for fips TIMESTAMP fips BEGIN: Fri Mar 31 18:33:37 UTC 2017 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #9995: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #9996: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 69a3c48fc41c02203a55b054f6b109ba4289abf1 FIPS_PUB_140_Test_Certificate fips.sh: #9997: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #9998: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #9999: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #10000: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #10001: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #10002: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #10003: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10004: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #10005: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #10006: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #10007: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 69a3c48fc41c02203a55b054f6b109ba4289abf1 FIPS_PUB_140_Test_Certificate fips.sh: #10008: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #10009: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10010: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #10011: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #10012: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 69a3c48fc41c02203a55b054f6b109ba4289abf1 FIPS_PUB_140_Test_Certificate fips.sh: #10013: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #10014: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #10015: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle mkdir: cannot create directory '/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle': File exists cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest1.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x00033964 (211300): from 21 (33) to 01 (1) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/fips/mangle dbtest -r -d ../fips fips.sh: #10016: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Fri Mar 31 18:35:11 UTC 2017 Running tests for crmf TIMESTAMP crmf BEGIN: Fri Mar 31 18:35:11 UTC 2017 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #10017: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #10018: CMMF test . - PASSED TIMESTAMP crmf END: Fri Mar 31 18:35:13 UTC 2017 Running tests for smime TIMESTAMP smime BEGIN: Fri Mar 31 18:35:13 UTC 2017 smime.sh: S/MIME Tests with ECC =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #10019: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10020: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #10021: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #10022: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #10023: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #10024: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10025: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #10026: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1 smime.sh: #10027: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED diff alice.txt alice-ec.data.SHA1 smime.sh: #10028: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #10029: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10030: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #10031: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #10032: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #10033: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #10034: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10035: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #10036: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256 smime.sh: #10037: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED diff alice.txt alice-ec.data.SHA256 smime.sh: #10038: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #10039: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10040: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #10041: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #10042: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #10043: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #10044: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10045: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #10046: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384 smime.sh: #10047: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED diff alice.txt alice-ec.data.SHA384 smime.sh: #10048: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #10049: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10050: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #10051: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #10052: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #10053: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #10054: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10055: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #10056: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512 smime.sh: #10057: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED diff alice.txt alice-ec.data.SHA512 smime.sh: #10058: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #10059: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #10060: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #10061: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #10062: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #10063: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #10064: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #10065: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #10066: Decrypt with a Multiple Email cert . - PASSED smime.sh: #10067: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #10068: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #10069: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #10070: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #10071: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #10072: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #10073: Decode Encrypted-Data . - PASSED smime.sh: #10074: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #10075: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #10076: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #10077: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #10078: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #10079: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Fri Mar 31 18:35:50 UTC 2017 Running tests for ssl TIMESTAMP ssl BEGIN: Fri Mar 31 18:35:50 UTC 2017 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:35:50 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:35:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:35:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10080: Server never started - PASSED kill -0 7059 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7059 found at Fri Mar 31 18:35:56 UTC 2017 selfserv_9626 with PID 7059 started at Fri Mar 31 18:35:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10081: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 7059 at Fri Mar 31 18:35:57 UTC 2017 kill -USR1 7059 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7059 killed at Fri Mar 31 18:35:57 UTC 2017 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:35:57 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:35:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:36:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10082: Server never started - PASSED kill -0 7127 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7127 found at Fri Mar 31 18:36:03 UTC 2017 selfserv_9626 with PID 7127 started at Fri Mar 31 18:36:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10083: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 7127 at Fri Mar 31 18:36:04 UTC 2017 kill -USR1 7127 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7127 killed at Fri Mar 31 18:36:04 UTC 2017 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:36:04 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:36:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:36:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10084: Server never started - PASSED kill -0 7209 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7209 found at Fri Mar 31 18:36:10 UTC 2017 selfserv_9626 with PID 7209 started at Fri Mar 31 18:36:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10085: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 7209 at Fri Mar 31 18:36:11 UTC 2017 kill -USR1 7209 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7209 killed at Fri Mar 31 18:36:11 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:36:12 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:36:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:36:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10086: Server never started - PASSED kill -0 7289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7289 found at Fri Mar 31 18:36:18 UTC 2017 selfserv_9626 with PID 7289 started at Fri Mar 31 18:36:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10087: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 7289 at Fri Mar 31 18:36:18 UTC 2017 kill -USR1 7289 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7289 killed at Fri Mar 31 18:36:19 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:36:19 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:36:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:36:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10088: Server never started - PASSED kill -0 7360 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7360 found at Fri Mar 31 18:36:25 UTC 2017 selfserv_9626 with PID 7360 started at Fri Mar 31 18:36:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10089: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 7360 at Fri Mar 31 18:36:25 UTC 2017 kill -USR1 7360 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7360 killed at Fri Mar 31 18:36:26 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:36:26 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:36:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:36:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10090: Server never started - PASSED kill -0 7429 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7429 found at Fri Mar 31 18:36:32 UTC 2017 selfserv_9626 with PID 7429 started at Fri Mar 31 18:36:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10091: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 7429 at Fri Mar 31 18:36:32 UTC 2017 kill -USR1 7429 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7429 killed at Fri Mar 31 18:36:33 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:36:33 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:36:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:36:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10092: Server never started - PASSED kill -0 7509 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7509 found at Fri Mar 31 18:36:39 UTC 2017 selfserv_9626 with PID 7509 started at Fri Mar 31 18:36:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10093: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 7509 at Fri Mar 31 18:36:39 UTC 2017 kill -USR1 7509 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7509 killed at Fri Mar 31 18:36:40 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:36:40 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:36:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:36:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10094: Server never started - PASSED kill -0 7577 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7577 found at Fri Mar 31 18:36:46 UTC 2017 selfserv_9626 with PID 7577 started at Fri Mar 31 18:36:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10095: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 7577 at Fri Mar 31 18:36:46 UTC 2017 kill -USR1 7577 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7577 killed at Fri Mar 31 18:36:47 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:36:47 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:36:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:36:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10096: Server never started - PASSED kill -0 7648 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7648 found at Fri Mar 31 18:36:53 UTC 2017 selfserv_9626 with PID 7648 started at Fri Mar 31 18:36:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10097: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 7648 at Fri Mar 31 18:36:54 UTC 2017 kill -USR1 7648 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7648 killed at Fri Mar 31 18:36:54 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:36:54 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:36:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:37:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10098: Server never started - PASSED kill -0 7728 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7728 found at Fri Mar 31 18:37:00 UTC 2017 selfserv_9626 with PID 7728 started at Fri Mar 31 18:37:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10099: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 7728 at Fri Mar 31 18:37:01 UTC 2017 kill -USR1 7728 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7728 killed at Fri Mar 31 18:37:01 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:37:01 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:37:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:37:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10100: Server never started - PASSED kill -0 7798 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7798 found at Fri Mar 31 18:37:07 UTC 2017 selfserv_9626 with PID 7798 started at Fri Mar 31 18:37:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10101: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 7798 at Fri Mar 31 18:37:08 UTC 2017 kill -USR1 7798 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7798 killed at Fri Mar 31 18:37:08 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:37:08 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:37:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:37:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10102: Server never started - PASSED kill -0 7878 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7878 found at Fri Mar 31 18:37:14 UTC 2017 selfserv_9626 with PID 7878 started at Fri Mar 31 18:37:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10103: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 7878 at Fri Mar 31 18:37:15 UTC 2017 kill -USR1 7878 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7878 killed at Fri Mar 31 18:37:15 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:37:15 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:37:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:37:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10104: Server never started - PASSED kill -0 7961 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7961 found at Fri Mar 31 18:37:21 UTC 2017 selfserv_9626 with PID 7961 started at Fri Mar 31 18:37:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10105: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 7961 at Fri Mar 31 18:37:22 UTC 2017 kill -USR1 7961 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7961 killed at Fri Mar 31 18:37:22 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:37:23 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:37:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:37:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10106: Server never started - PASSED kill -0 8030 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8030 found at Fri Mar 31 18:37:29 UTC 2017 selfserv_9626 with PID 8030 started at Fri Mar 31 18:37:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10107: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 8030 at Fri Mar 31 18:37:29 UTC 2017 kill -USR1 8030 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8030 killed at Fri Mar 31 18:37:29 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:37:30 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:37:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:37:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10108: Server never started - PASSED kill -0 8098 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8098 found at Fri Mar 31 18:37:36 UTC 2017 selfserv_9626 with PID 8098 started at Fri Mar 31 18:37:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10109: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 8098 at Fri Mar 31 18:37:36 UTC 2017 kill -USR1 8098 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8098 killed at Fri Mar 31 18:37:37 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:37:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:37:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:37:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10110: Server never started - PASSED kill -0 8178 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8178 found at Fri Mar 31 18:37:43 UTC 2017 selfserv_9626 with PID 8178 started at Fri Mar 31 18:37:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10111: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 8178 at Fri Mar 31 18:37:43 UTC 2017 kill -USR1 8178 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8178 killed at Fri Mar 31 18:37:44 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:37:44 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:37:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:37:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10112: Server never started - PASSED kill -0 8247 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8247 found at Fri Mar 31 18:37:50 UTC 2017 selfserv_9626 with PID 8247 started at Fri Mar 31 18:37:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10113: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 8247 at Fri Mar 31 18:37:50 UTC 2017 kill -USR1 8247 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8247 killed at Fri Mar 31 18:37:51 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:37:51 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:37:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:37:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10114: Server never started - PASSED kill -0 8315 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8315 found at Fri Mar 31 18:37:57 UTC 2017 selfserv_9626 with PID 8315 started at Fri Mar 31 18:37:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10115: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 8315 at Fri Mar 31 18:37:57 UTC 2017 kill -USR1 8315 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8315 killed at Fri Mar 31 18:37:58 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:37:58 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:37:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:38:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10116: Server never started - PASSED kill -0 8395 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8395 found at Fri Mar 31 18:38:04 UTC 2017 selfserv_9626 with PID 8395 started at Fri Mar 31 18:38:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10117: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 8395 at Fri Mar 31 18:38:05 UTC 2017 kill -USR1 8395 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8395 killed at Fri Mar 31 18:38:05 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:38:05 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:38:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:38:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10118: Server never started - PASSED kill -0 8479 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8479 found at Fri Mar 31 18:38:11 UTC 2017 selfserv_9626 with PID 8479 started at Fri Mar 31 18:38:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10119: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 8479 at Fri Mar 31 18:38:12 UTC 2017 kill -USR1 8479 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8479 killed at Fri Mar 31 18:38:12 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:38:12 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:38:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:38:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10120: Server never started - PASSED kill -0 8552 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8552 found at Fri Mar 31 18:38:18 UTC 2017 selfserv_9626 with PID 8552 started at Fri Mar 31 18:38:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10121: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 8552 at Fri Mar 31 18:38:19 UTC 2017 kill -USR1 8552 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8552 killed at Fri Mar 31 18:38:19 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:38:19 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:38:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:38:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10122: Server never started - PASSED kill -0 8632 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8632 found at Fri Mar 31 18:38:25 UTC 2017 selfserv_9626 with PID 8632 started at Fri Mar 31 18:38:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10123: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 8632 at Fri Mar 31 18:38:26 UTC 2017 kill -USR1 8632 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8632 killed at Fri Mar 31 18:38:26 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:38:26 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:38:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:38:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10124: Server never started - PASSED kill -0 8701 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8701 found at Fri Mar 31 18:38:32 UTC 2017 selfserv_9626 with PID 8701 started at Fri Mar 31 18:38:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10125: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 8701 at Fri Mar 31 18:38:33 UTC 2017 kill -USR1 8701 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8701 killed at Fri Mar 31 18:38:33 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:38:33 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:38:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:38:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10126: Server never started - PASSED kill -0 8769 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8769 found at Fri Mar 31 18:38:39 UTC 2017 selfserv_9626 with PID 8769 started at Fri Mar 31 18:38:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10127: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 8769 at Fri Mar 31 18:38:40 UTC 2017 kill -USR1 8769 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8769 killed at Fri Mar 31 18:38:40 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:38:41 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:38:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:38:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10128: Server never started - PASSED kill -0 8849 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8849 found at Fri Mar 31 18:38:47 UTC 2017 selfserv_9626 with PID 8849 started at Fri Mar 31 18:38:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10129: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 8849 at Fri Mar 31 18:38:47 UTC 2017 kill -USR1 8849 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8849 killed at Fri Mar 31 18:38:48 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:38:48 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:38:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:38:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10130: Server never started - PASSED kill -0 8918 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8918 found at Fri Mar 31 18:38:54 UTC 2017 selfserv_9626 with PID 8918 started at Fri Mar 31 18:38:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10131: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 8918 at Fri Mar 31 18:38:54 UTC 2017 kill -USR1 8918 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8918 killed at Fri Mar 31 18:38:55 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:38:55 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:38:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:39:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10132: Server never started - PASSED kill -0 8986 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 8986 found at Fri Mar 31 18:39:01 UTC 2017 selfserv_9626 with PID 8986 started at Fri Mar 31 18:39:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10133: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 8986 at Fri Mar 31 18:39:01 UTC 2017 kill -USR1 8986 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 8986 killed at Fri Mar 31 18:39:02 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:39:02 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:39:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:39:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10134: Server never started - PASSED kill -0 9084 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9084 found at Fri Mar 31 18:39:08 UTC 2017 selfserv_9626 with PID 9084 started at Fri Mar 31 18:39:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10135: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 9084 at Fri Mar 31 18:39:08 UTC 2017 kill -USR1 9084 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9084 killed at Fri Mar 31 18:39:09 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:39:09 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:39:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:39:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10136: Server never started - PASSED kill -0 9153 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9153 found at Fri Mar 31 18:39:15 UTC 2017 selfserv_9626 with PID 9153 started at Fri Mar 31 18:39:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10137: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 9153 at Fri Mar 31 18:39:16 UTC 2017 kill -USR1 9153 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9153 killed at Fri Mar 31 18:39:16 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:39:16 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:39:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:39:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10138: Server never started - PASSED kill -0 9226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9226 found at Fri Mar 31 18:39:22 UTC 2017 selfserv_9626 with PID 9226 started at Fri Mar 31 18:39:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10139: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 9226 at Fri Mar 31 18:39:23 UTC 2017 kill -USR1 9226 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9226 killed at Fri Mar 31 18:39:23 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:39:23 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:39:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:39:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10140: Server never started - PASSED kill -0 9306 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9306 found at Fri Mar 31 18:39:29 UTC 2017 selfserv_9626 with PID 9306 started at Fri Mar 31 18:39:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10141: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 9306 at Fri Mar 31 18:39:30 UTC 2017 kill -USR1 9306 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9306 killed at Fri Mar 31 18:39:30 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:39:30 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:39:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:39:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10142: Server never started - PASSED kill -0 9375 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9375 found at Fri Mar 31 18:39:36 UTC 2017 selfserv_9626 with PID 9375 started at Fri Mar 31 18:39:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10143: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 9375 at Fri Mar 31 18:39:37 UTC 2017 kill -USR1 9375 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9375 killed at Fri Mar 31 18:39:37 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:39:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:39:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:39:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10144: Server never started - PASSED kill -0 9443 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9443 found at Fri Mar 31 18:39:43 UTC 2017 selfserv_9626 with PID 9443 started at Fri Mar 31 18:39:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10145: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 9443 at Fri Mar 31 18:39:44 UTC 2017 kill -USR1 9443 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9443 killed at Fri Mar 31 18:39:44 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:39:45 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:39:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:39:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10146: Server never started - PASSED kill -0 9523 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9523 found at Fri Mar 31 18:39:50 UTC 2017 selfserv_9626 with PID 9523 started at Fri Mar 31 18:39:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10147: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 9523 at Fri Mar 31 18:39:51 UTC 2017 kill -USR1 9523 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9523 killed at Fri Mar 31 18:39:51 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:39:52 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:39:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:39:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10148: Server never started - PASSED kill -0 9592 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9592 found at Fri Mar 31 18:39:58 UTC 2017 selfserv_9626 with PID 9592 started at Fri Mar 31 18:39:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10149: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 9592 at Fri Mar 31 18:39:58 UTC 2017 kill -USR1 9592 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9592 killed at Fri Mar 31 18:39:59 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:39:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:39:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:40:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10150: Server never started - PASSED kill -0 9660 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9660 found at Fri Mar 31 18:40:05 UTC 2017 selfserv_9626 with PID 9660 started at Fri Mar 31 18:40:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10151: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 9660 at Fri Mar 31 18:40:05 UTC 2017 kill -USR1 9660 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9660 killed at Fri Mar 31 18:40:06 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:40:06 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:40:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:40:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10152: Server never started - PASSED kill -0 9754 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9754 found at Fri Mar 31 18:40:12 UTC 2017 selfserv_9626 with PID 9754 started at Fri Mar 31 18:40:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10153: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 9754 at Fri Mar 31 18:40:12 UTC 2017 kill -USR1 9754 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9754 killed at Fri Mar 31 18:40:13 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:40:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:40:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:40:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10154: Server never started - PASSED kill -0 9826 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9826 found at Fri Mar 31 18:40:19 UTC 2017 selfserv_9626 with PID 9826 started at Fri Mar 31 18:40:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10155: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 9826 at Fri Mar 31 18:40:19 UTC 2017 kill -USR1 9826 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9826 killed at Fri Mar 31 18:40:20 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:40:20 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:40:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:40:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10156: Server never started - PASSED kill -0 9894 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9894 found at Fri Mar 31 18:40:26 UTC 2017 selfserv_9626 with PID 9894 started at Fri Mar 31 18:40:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10157: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 9894 at Fri Mar 31 18:40:26 UTC 2017 kill -USR1 9894 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9894 killed at Fri Mar 31 18:40:27 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:40:27 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:40:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:40:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10158: Server never started - PASSED kill -0 9974 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9974 found at Fri Mar 31 18:40:33 UTC 2017 selfserv_9626 with PID 9974 started at Fri Mar 31 18:40:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10159: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 9974 at Fri Mar 31 18:40:34 UTC 2017 kill -USR1 9974 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9974 killed at Fri Mar 31 18:40:34 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:40:34 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:40:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:40:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10160: Server never started - PASSED kill -0 10043 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10043 found at Fri Mar 31 18:40:40 UTC 2017 selfserv_9626 with PID 10043 started at Fri Mar 31 18:40:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10161: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 10043 at Fri Mar 31 18:40:41 UTC 2017 kill -USR1 10043 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 10043 killed at Fri Mar 31 18:40:41 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:40:41 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:40:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:40:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10162: Server never started - PASSED kill -0 10111 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10111 found at Fri Mar 31 18:40:47 UTC 2017 selfserv_9626 with PID 10111 started at Fri Mar 31 18:40:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10163: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 10111 at Fri Mar 31 18:40:48 UTC 2017 kill -USR1 10111 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 10111 killed at Fri Mar 31 18:40:48 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:40:48 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:40:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:40:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10164: Server never started - PASSED kill -0 10192 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10192 found at Fri Mar 31 18:40:54 UTC 2017 selfserv_9626 with PID 10192 started at Fri Mar 31 18:40:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10165: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 10192 at Fri Mar 31 18:40:55 UTC 2017 kill -USR1 10192 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 10192 killed at Fri Mar 31 18:40:55 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:40:55 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:40:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:41:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10166: Server never started - PASSED kill -0 10260 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10260 found at Fri Mar 31 18:41:01 UTC 2017 selfserv_9626 with PID 10260 started at Fri Mar 31 18:41:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10167: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 10260 at Fri Mar 31 18:41:02 UTC 2017 kill -USR1 10260 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 10260 killed at Fri Mar 31 18:41:02 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:41:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:41:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:41:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10168: Server never started - PASSED kill -0 10341 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10341 found at Fri Mar 31 18:41:08 UTC 2017 selfserv_9626 with PID 10341 started at Fri Mar 31 18:41:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10169: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 10341 at Fri Mar 31 18:41:09 UTC 2017 kill -USR1 10341 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 10341 killed at Fri Mar 31 18:41:09 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:41:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:41:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:41:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10170: Server never started - PASSED kill -0 10422 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10422 found at Fri Mar 31 18:41:16 UTC 2017 selfserv_9626 with PID 10422 started at Fri Mar 31 18:41:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10171: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 10422 at Fri Mar 31 18:41:16 UTC 2017 kill -USR1 10422 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 10422 killed at Fri Mar 31 18:41:17 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:41:17 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:41:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:41:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10172: Server never started - PASSED kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10493 found at Fri Mar 31 18:41:23 UTC 2017 selfserv_9626 with PID 10493 started at Fri Mar 31 18:41:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10173: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 10493 at Fri Mar 31 18:41:23 UTC 2017 kill -USR1 10493 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 10493 killed at Fri Mar 31 18:41:24 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:41:24 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:41:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:41:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10174: Server never started - PASSED kill -0 10561 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10561 found at Fri Mar 31 18:41:30 UTC 2017 selfserv_9626 with PID 10561 started at Fri Mar 31 18:41:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10175: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 10561 at Fri Mar 31 18:41:30 UTC 2017 kill -USR1 10561 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 10561 killed at Fri Mar 31 18:41:31 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:41:31 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:41:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:41:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10176: Server never started - PASSED kill -0 10642 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10642 found at Fri Mar 31 18:41:37 UTC 2017 selfserv_9626 with PID 10642 started at Fri Mar 31 18:41:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10177: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 10642 at Fri Mar 31 18:41:37 UTC 2017 kill -USR1 10642 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 10642 killed at Fri Mar 31 18:41:38 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:41:38 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:41:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:41:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10178: Server never started - PASSED kill -0 10710 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10710 found at Fri Mar 31 18:41:44 UTC 2017 selfserv_9626 with PID 10710 started at Fri Mar 31 18:41:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10179: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 10710 at Fri Mar 31 18:41:45 UTC 2017 kill -USR1 10710 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 10710 killed at Fri Mar 31 18:41:45 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:41:45 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:41:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:41:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10180: Server never started - PASSED kill -0 10778 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10778 found at Fri Mar 31 18:41:51 UTC 2017 selfserv_9626 with PID 10778 started at Fri Mar 31 18:41:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10181: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 10778 at Fri Mar 31 18:41:52 UTC 2017 kill -USR1 10778 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 10778 killed at Fri Mar 31 18:41:52 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:41:52 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:41:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:41:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10182: Server never started - PASSED kill -0 10859 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10859 found at Fri Mar 31 18:41:58 UTC 2017 selfserv_9626 with PID 10859 started at Fri Mar 31 18:41:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10183: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 10859 at Fri Mar 31 18:41:59 UTC 2017 kill -USR1 10859 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 10859 killed at Fri Mar 31 18:41:59 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:41:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:41:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:42:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10184: Server never started - PASSED kill -0 10927 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10927 found at Fri Mar 31 18:42:05 UTC 2017 selfserv_9626 with PID 10927 started at Fri Mar 31 18:42:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10185: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 10927 at Fri Mar 31 18:42:06 UTC 2017 kill -USR1 10927 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 10927 killed at Fri Mar 31 18:42:06 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:42:06 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:42:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:42:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10186: Server never started - PASSED kill -0 11009 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11009 found at Fri Mar 31 18:42:12 UTC 2017 selfserv_9626 with PID 11009 started at Fri Mar 31 18:42:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10187: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 11009 at Fri Mar 31 18:42:13 UTC 2017 kill -USR1 11009 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 11009 killed at Fri Mar 31 18:42:13 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:42:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:42:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:42:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10188: Server never started - PASSED kill -0 11093 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11093 found at Fri Mar 31 18:42:19 UTC 2017 selfserv_9626 with PID 11093 started at Fri Mar 31 18:42:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10189: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 11093 at Fri Mar 31 18:42:20 UTC 2017 kill -USR1 11093 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 11093 killed at Fri Mar 31 18:42:20 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:42:21 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:42:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:42:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10190: Server never started - PASSED kill -0 11161 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11161 found at Fri Mar 31 18:42:27 UTC 2017 selfserv_9626 with PID 11161 started at Fri Mar 31 18:42:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10191: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 11161 at Fri Mar 31 18:42:27 UTC 2017 kill -USR1 11161 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 11161 killed at Fri Mar 31 18:42:28 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:42:28 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:42:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:42:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10192: Server never started - PASSED kill -0 11229 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11229 found at Fri Mar 31 18:42:34 UTC 2017 selfserv_9626 with PID 11229 started at Fri Mar 31 18:42:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10193: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 11229 at Fri Mar 31 18:42:34 UTC 2017 kill -USR1 11229 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 11229 killed at Fri Mar 31 18:42:35 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:42:35 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:42:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:42:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10194: Server never started - PASSED kill -0 11310 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11310 found at Fri Mar 31 18:42:41 UTC 2017 selfserv_9626 with PID 11310 started at Fri Mar 31 18:42:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10195: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 11310 at Fri Mar 31 18:42:41 UTC 2017 kill -USR1 11310 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 11310 killed at Fri Mar 31 18:42:42 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:42:42 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:42:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:42:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10196: Server never started - PASSED kill -0 11378 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11378 found at Fri Mar 31 18:42:48 UTC 2017 selfserv_9626 with PID 11378 started at Fri Mar 31 18:42:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10197: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 11378 at Fri Mar 31 18:42:48 UTC 2017 kill -USR1 11378 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 11378 killed at Fri Mar 31 18:42:49 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:42:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:42:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:42:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10198: Server never started - PASSED kill -0 11446 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11446 found at Fri Mar 31 18:42:55 UTC 2017 selfserv_9626 with PID 11446 started at Fri Mar 31 18:42:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10199: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 11446 at Fri Mar 31 18:42:55 UTC 2017 kill -USR1 11446 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 11446 killed at Fri Mar 31 18:42:56 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:42:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:42:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:43:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10200: Server never started - PASSED kill -0 11527 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11527 found at Fri Mar 31 18:43:02 UTC 2017 selfserv_9626 with PID 11527 started at Fri Mar 31 18:43:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10201: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 11527 at Fri Mar 31 18:43:03 UTC 2017 kill -USR1 11527 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 11527 killed at Fri Mar 31 18:43:03 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:43:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:43:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:43:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10202: Server never started - PASSED kill -0 11608 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11608 found at Fri Mar 31 18:43:09 UTC 2017 selfserv_9626 with PID 11608 started at Fri Mar 31 18:43:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10203: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 11608 at Fri Mar 31 18:43:10 UTC 2017 kill -USR1 11608 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 11608 killed at Fri Mar 31 18:43:10 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:43:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:43:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:43:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10204: Server never started - PASSED kill -0 11676 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11676 found at Fri Mar 31 18:43:16 UTC 2017 selfserv_9626 with PID 11676 started at Fri Mar 31 18:43:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10205: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 11676 at Fri Mar 31 18:43:17 UTC 2017 kill -USR1 11676 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 11676 killed at Fri Mar 31 18:43:17 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:43:17 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:43:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:43:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10206: Server never started - PASSED kill -0 11760 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11760 found at Fri Mar 31 18:43:23 UTC 2017 selfserv_9626 with PID 11760 started at Fri Mar 31 18:43:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10207: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 11760 at Fri Mar 31 18:43:24 UTC 2017 kill -USR1 11760 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 11760 killed at Fri Mar 31 18:43:24 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:43:24 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:43:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:43:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10208: Server never started - PASSED kill -0 11828 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11828 found at Fri Mar 31 18:43:30 UTC 2017 selfserv_9626 with PID 11828 started at Fri Mar 31 18:43:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10209: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 11828 at Fri Mar 31 18:43:31 UTC 2017 kill -USR1 11828 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 11828 killed at Fri Mar 31 18:43:31 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:43:32 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:43:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:43:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10210: Server never started - PASSED kill -0 11896 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11896 found at Fri Mar 31 18:43:38 UTC 2017 selfserv_9626 with PID 11896 started at Fri Mar 31 18:43:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10211: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 11896 at Fri Mar 31 18:43:38 UTC 2017 kill -USR1 11896 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 11896 killed at Fri Mar 31 18:43:39 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:43:39 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:43:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:43:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10212: Server never started - PASSED kill -0 11977 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 11977 found at Fri Mar 31 18:43:45 UTC 2017 selfserv_9626 with PID 11977 started at Fri Mar 31 18:43:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10213: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 11977 at Fri Mar 31 18:43:45 UTC 2017 kill -USR1 11977 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 11977 killed at Fri Mar 31 18:43:46 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:43:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:43:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:43:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10214: Server never started - PASSED kill -0 12045 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12045 found at Fri Mar 31 18:43:52 UTC 2017 selfserv_9626 with PID 12045 started at Fri Mar 31 18:43:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10215: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 12045 at Fri Mar 31 18:43:52 UTC 2017 kill -USR1 12045 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12045 killed at Fri Mar 31 18:43:53 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:43:53 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:43:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:43:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10216: Server never started - PASSED kill -0 12113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12113 found at Fri Mar 31 18:43:59 UTC 2017 selfserv_9626 with PID 12113 started at Fri Mar 31 18:43:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10217: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 12113 at Fri Mar 31 18:43:59 UTC 2017 kill -USR1 12113 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12113 killed at Fri Mar 31 18:44:00 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:44:00 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:44:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:44:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10218: Server never started - PASSED kill -0 12194 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12194 found at Fri Mar 31 18:44:06 UTC 2017 selfserv_9626 with PID 12194 started at Fri Mar 31 18:44:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10219: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 12194 at Fri Mar 31 18:44:06 UTC 2017 kill -USR1 12194 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12194 killed at Fri Mar 31 18:44:07 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:44:07 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:44:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:44:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10220: Server never started - PASSED kill -0 12275 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12275 found at Fri Mar 31 18:44:13 UTC 2017 selfserv_9626 with PID 12275 started at Fri Mar 31 18:44:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10221: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 12275 at Fri Mar 31 18:44:14 UTC 2017 kill -USR1 12275 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12275 killed at Fri Mar 31 18:44:14 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:44:14 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:44:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:44:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10222: Server never started - PASSED kill -0 12348 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12348 found at Fri Mar 31 18:44:20 UTC 2017 selfserv_9626 with PID 12348 started at Fri Mar 31 18:44:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10223: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 12348 at Fri Mar 31 18:44:21 UTC 2017 kill -USR1 12348 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12348 killed at Fri Mar 31 18:44:21 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:44:21 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:44:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:44:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10224: Server never started - PASSED kill -0 12428 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12428 found at Fri Mar 31 18:44:27 UTC 2017 selfserv_9626 with PID 12428 started at Fri Mar 31 18:44:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10225: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 12428 at Fri Mar 31 18:44:28 UTC 2017 kill -USR1 12428 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12428 killed at Fri Mar 31 18:44:28 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:44:28 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:44:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:44:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10226: Server never started - PASSED kill -0 12496 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12496 found at Fri Mar 31 18:44:34 UTC 2017 selfserv_9626 with PID 12496 started at Fri Mar 31 18:44:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10227: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 12496 at Fri Mar 31 18:44:35 UTC 2017 kill -USR1 12496 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12496 killed at Fri Mar 31 18:44:35 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:44:35 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:44:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:44:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10228: Server never started - PASSED kill -0 12565 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12565 found at Fri Mar 31 18:44:41 UTC 2017 selfserv_9626 with PID 12565 started at Fri Mar 31 18:44:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10229: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 12565 at Fri Mar 31 18:44:42 UTC 2017 kill -USR1 12565 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12565 killed at Fri Mar 31 18:44:42 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:44:43 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:44:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:44:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10230: Server never started - PASSED kill -0 12645 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12645 found at Fri Mar 31 18:44:48 UTC 2017 selfserv_9626 with PID 12645 started at Fri Mar 31 18:44:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10231: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 12645 at Fri Mar 31 18:44:49 UTC 2017 kill -USR1 12645 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12645 killed at Fri Mar 31 18:44:49 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:44:50 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:44:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:44:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10232: Server never started - PASSED kill -0 12713 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12713 found at Fri Mar 31 18:44:56 UTC 2017 selfserv_9626 with PID 12713 started at Fri Mar 31 18:44:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10233: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 12713 at Fri Mar 31 18:44:56 UTC 2017 kill -USR1 12713 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12713 killed at Fri Mar 31 18:44:57 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:44:57 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:44:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:45:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10234: Server never started - PASSED kill -0 12782 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12782 found at Fri Mar 31 18:45:03 UTC 2017 selfserv_9626 with PID 12782 started at Fri Mar 31 18:45:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10235: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 12782 at Fri Mar 31 18:45:03 UTC 2017 kill -USR1 12782 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12782 killed at Fri Mar 31 18:45:04 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:45:04 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:45:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:45:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10236: Server never started - PASSED kill -0 12876 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12876 found at Fri Mar 31 18:45:10 UTC 2017 selfserv_9626 with PID 12876 started at Fri Mar 31 18:45:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10237: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 12876 at Fri Mar 31 18:45:10 UTC 2017 kill -USR1 12876 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12876 killed at Fri Mar 31 18:45:11 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:45:11 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:45:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:45:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10238: Server never started - PASSED kill -0 12944 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12944 found at Fri Mar 31 18:45:17 UTC 2017 selfserv_9626 with PID 12944 started at Fri Mar 31 18:45:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10239: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 12944 at Fri Mar 31 18:45:17 UTC 2017 kill -USR1 12944 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12944 killed at Fri Mar 31 18:45:18 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:45:18 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:45:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:45:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10240: Server never started - PASSED kill -0 13016 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13016 found at Fri Mar 31 18:45:24 UTC 2017 selfserv_9626 with PID 13016 started at Fri Mar 31 18:45:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10241: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 13016 at Fri Mar 31 18:45:24 UTC 2017 kill -USR1 13016 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13016 killed at Fri Mar 31 18:45:25 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:45:25 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:45:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:45:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10242: Server never started - PASSED kill -0 13096 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13096 found at Fri Mar 31 18:45:31 UTC 2017 selfserv_9626 with PID 13096 started at Fri Mar 31 18:45:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10243: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 13096 at Fri Mar 31 18:45:32 UTC 2017 kill -USR1 13096 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13096 killed at Fri Mar 31 18:45:32 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:45:32 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:45:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:45:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10244: Server never started - PASSED kill -0 13164 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13164 found at Fri Mar 31 18:45:38 UTC 2017 selfserv_9626 with PID 13164 started at Fri Mar 31 18:45:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10245: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 13164 at Fri Mar 31 18:45:39 UTC 2017 kill -USR1 13164 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13164 killed at Fri Mar 31 18:45:39 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 18:45:39 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:45:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:45:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10246: Server never started - PASSED kill -0 13233 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13233 found at Fri Mar 31 18:45:45 UTC 2017 selfserv_9626 with PID 13233 started at Fri Mar 31 18:45:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10247: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 13233 at Fri Mar 31 18:45:46 UTC 2017 kill -USR1 13233 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13233 killed at Fri Mar 31 18:45:46 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:45:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:45:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:45:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10248: Server never started - PASSED kill -0 13313 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13313 found at Fri Mar 31 18:45:52 UTC 2017 selfserv_9626 with PID 13313 started at Fri Mar 31 18:45:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10249: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 13313 at Fri Mar 31 18:45:53 UTC 2017 kill -USR1 13313 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13313 killed at Fri Mar 31 18:45:53 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:45:53 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:45:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:45:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10250: Server never started - PASSED kill -0 13381 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13381 found at Fri Mar 31 18:45:59 UTC 2017 selfserv_9626 with PID 13381 started at Fri Mar 31 18:45:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10251: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 13381 at Fri Mar 31 18:46:00 UTC 2017 kill -USR1 13381 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13381 killed at Fri Mar 31 18:46:00 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:46:01 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:46:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:46:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10252: Server never started - PASSED kill -0 13450 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13450 found at Fri Mar 31 18:46:07 UTC 2017 selfserv_9626 with PID 13450 started at Fri Mar 31 18:46:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10253: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 13450 at Fri Mar 31 18:46:07 UTC 2017 kill -USR1 13450 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13450 killed at Fri Mar 31 18:46:08 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:46:08 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:46:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:46:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10254: Server never started - PASSED kill -0 13543 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13543 found at Fri Mar 31 18:46:14 UTC 2017 selfserv_9626 with PID 13543 started at Fri Mar 31 18:46:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10255: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 13543 at Fri Mar 31 18:46:14 UTC 2017 kill -USR1 13543 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13543 killed at Fri Mar 31 18:46:15 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:46:15 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:46:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:46:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10256: Server never started - PASSED kill -0 13614 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13614 found at Fri Mar 31 18:46:21 UTC 2017 selfserv_9626 with PID 13614 started at Fri Mar 31 18:46:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10257: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 13614 at Fri Mar 31 18:46:21 UTC 2017 kill -USR1 13614 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13614 killed at Fri Mar 31 18:46:22 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:46:22 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:46:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:46:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10258: Server never started - PASSED kill -0 13683 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13683 found at Fri Mar 31 18:46:28 UTC 2017 selfserv_9626 with PID 13683 started at Fri Mar 31 18:46:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10259: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 13683 at Fri Mar 31 18:46:28 UTC 2017 kill -USR1 13683 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13683 killed at Fri Mar 31 18:46:29 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:46:29 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:46:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:46:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10260: Server never started - PASSED kill -0 13772 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13772 found at Fri Mar 31 18:46:35 UTC 2017 selfserv_9626 with PID 13772 started at Fri Mar 31 18:46:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10261: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 13772 at Fri Mar 31 18:46:36 UTC 2017 kill -USR1 13772 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13772 killed at Fri Mar 31 18:46:36 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:46:36 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:46:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:46:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10262: Server never started - PASSED kill -0 13840 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13840 found at Fri Mar 31 18:46:42 UTC 2017 selfserv_9626 with PID 13840 started at Fri Mar 31 18:46:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10263: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 13840 at Fri Mar 31 18:46:43 UTC 2017 kill -USR1 13840 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13840 killed at Fri Mar 31 18:46:43 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:46:43 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:46:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:46:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10264: Server never started - PASSED kill -0 13909 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13909 found at Fri Mar 31 18:46:49 UTC 2017 selfserv_9626 with PID 13909 started at Fri Mar 31 18:46:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10265: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 13909 at Fri Mar 31 18:46:50 UTC 2017 kill -USR1 13909 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13909 killed at Fri Mar 31 18:46:50 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:46:50 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:46:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:46:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10266: Server never started - PASSED kill -0 13989 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13989 found at Fri Mar 31 18:46:56 UTC 2017 selfserv_9626 with PID 13989 started at Fri Mar 31 18:46:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10267: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 13989 at Fri Mar 31 18:46:57 UTC 2017 kill -USR1 13989 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13989 killed at Fri Mar 31 18:46:57 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:46:57 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:46:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:47:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10268: Server never started - PASSED kill -0 14057 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14057 found at Fri Mar 31 18:47:03 UTC 2017 selfserv_9626 with PID 14057 started at Fri Mar 31 18:47:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10269: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 14057 at Fri Mar 31 18:47:04 UTC 2017 kill -USR1 14057 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14057 killed at Fri Mar 31 18:47:04 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:47:04 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:47:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:47:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10270: Server never started - PASSED kill -0 14139 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14139 found at Fri Mar 31 18:47:10 UTC 2017 selfserv_9626 with PID 14139 started at Fri Mar 31 18:47:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10271: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 14139 at Fri Mar 31 18:47:11 UTC 2017 kill -USR1 14139 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14139 killed at Fri Mar 31 18:47:11 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:47:12 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:47:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:47:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10272: Server never started - PASSED kill -0 14219 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14219 found at Fri Mar 31 18:47:18 UTC 2017 selfserv_9626 with PID 14219 started at Fri Mar 31 18:47:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10273: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 14219 at Fri Mar 31 18:47:18 UTC 2017 kill -USR1 14219 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14219 killed at Fri Mar 31 18:47:19 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:47:19 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:47:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:47:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10274: Server never started - PASSED kill -0 14291 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14291 found at Fri Mar 31 18:47:25 UTC 2017 selfserv_9626 with PID 14291 started at Fri Mar 31 18:47:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10275: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 14291 at Fri Mar 31 18:47:25 UTC 2017 kill -USR1 14291 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14291 killed at Fri Mar 31 18:47:26 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:47:26 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:47:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:47:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10276: Server never started - PASSED kill -0 14359 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14359 found at Fri Mar 31 18:47:32 UTC 2017 selfserv_9626 with PID 14359 started at Fri Mar 31 18:47:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10277: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 14359 at Fri Mar 31 18:47:32 UTC 2017 kill -USR1 14359 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14359 killed at Fri Mar 31 18:47:33 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:47:33 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:47:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:47:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10278: Server never started - PASSED kill -0 14439 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14439 found at Fri Mar 31 18:47:39 UTC 2017 selfserv_9626 with PID 14439 started at Fri Mar 31 18:47:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10279: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 14439 at Fri Mar 31 18:47:39 UTC 2017 kill -USR1 14439 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14439 killed at Fri Mar 31 18:47:40 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:47:40 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:47:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:47:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10280: Server never started - PASSED kill -0 14508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14508 found at Fri Mar 31 18:47:46 UTC 2017 selfserv_9626 with PID 14508 started at Fri Mar 31 18:47:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10281: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 14508 at Fri Mar 31 18:47:47 UTC 2017 kill -USR1 14508 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14508 killed at Fri Mar 31 18:47:47 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:47:47 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:47:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:47:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10282: Server never started - PASSED kill -0 14576 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14576 found at Fri Mar 31 18:47:53 UTC 2017 selfserv_9626 with PID 14576 started at Fri Mar 31 18:47:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10283: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 14576 at Fri Mar 31 18:47:54 UTC 2017 kill -USR1 14576 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14576 killed at Fri Mar 31 18:47:54 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:47:54 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:47:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:48:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10284: Server never started - PASSED kill -0 14656 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14656 found at Fri Mar 31 18:48:00 UTC 2017 selfserv_9626 with PID 14656 started at Fri Mar 31 18:48:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10285: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 14656 at Fri Mar 31 18:48:01 UTC 2017 kill -USR1 14656 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14656 killed at Fri Mar 31 18:48:01 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:48:01 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:48:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:48:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10286: Server never started - PASSED kill -0 14727 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14727 found at Fri Mar 31 18:48:07 UTC 2017 selfserv_9626 with PID 14727 started at Fri Mar 31 18:48:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10287: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 14727 at Fri Mar 31 18:48:08 UTC 2017 kill -USR1 14727 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14727 killed at Fri Mar 31 18:48:08 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:48:08 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:48:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:48:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10288: Server never started - PASSED kill -0 14807 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14807 found at Fri Mar 31 18:48:14 UTC 2017 selfserv_9626 with PID 14807 started at Fri Mar 31 18:48:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10289: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 14807 at Fri Mar 31 18:48:15 UTC 2017 kill -USR1 14807 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14807 killed at Fri Mar 31 18:48:15 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:48:16 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:48:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:48:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10290: Server never started - PASSED kill -0 14890 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14890 found at Fri Mar 31 18:48:22 UTC 2017 selfserv_9626 with PID 14890 started at Fri Mar 31 18:48:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10291: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 14890 at Fri Mar 31 18:48:22 UTC 2017 kill -USR1 14890 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14890 killed at Fri Mar 31 18:48:23 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:48:23 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:48:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:48:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10292: Server never started - PASSED kill -0 14959 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14959 found at Fri Mar 31 18:48:29 UTC 2017 selfserv_9626 with PID 14959 started at Fri Mar 31 18:48:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10293: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 14959 at Fri Mar 31 18:48:29 UTC 2017 kill -USR1 14959 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14959 killed at Fri Mar 31 18:48:30 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:48:30 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:48:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:48:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10294: Server never started - PASSED kill -0 15027 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15027 found at Fri Mar 31 18:48:36 UTC 2017 selfserv_9626 with PID 15027 started at Fri Mar 31 18:48:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10295: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 15027 at Fri Mar 31 18:48:36 UTC 2017 kill -USR1 15027 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15027 killed at Fri Mar 31 18:48:37 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:48:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:48:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:48:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10296: Server never started - PASSED kill -0 15107 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15107 found at Fri Mar 31 18:48:43 UTC 2017 selfserv_9626 with PID 15107 started at Fri Mar 31 18:48:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10297: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 15107 at Fri Mar 31 18:48:43 UTC 2017 kill -USR1 15107 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15107 killed at Fri Mar 31 18:48:44 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:48:44 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:48:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:48:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10298: Server never started - PASSED kill -0 15176 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15176 found at Fri Mar 31 18:48:50 UTC 2017 selfserv_9626 with PID 15176 started at Fri Mar 31 18:48:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10299: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 15176 at Fri Mar 31 18:48:50 UTC 2017 kill -USR1 15176 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15176 killed at Fri Mar 31 18:48:51 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:48:51 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:48:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:48:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10300: Server never started - PASSED kill -0 15244 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15244 found at Fri Mar 31 18:48:57 UTC 2017 selfserv_9626 with PID 15244 started at Fri Mar 31 18:48:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10301: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 15244 at Fri Mar 31 18:48:58 UTC 2017 kill -USR1 15244 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15244 killed at Fri Mar 31 18:48:58 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:48:58 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:48:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:49:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10302: Server never started - PASSED kill -0 15324 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15324 found at Fri Mar 31 18:49:04 UTC 2017 selfserv_9626 with PID 15324 started at Fri Mar 31 18:49:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10303: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 15324 at Fri Mar 31 18:49:05 UTC 2017 kill -USR1 15324 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15324 killed at Fri Mar 31 18:49:05 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:49:05 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:49:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:49:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10304: Server never started - PASSED kill -0 15406 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15406 found at Fri Mar 31 18:49:11 UTC 2017 selfserv_9626 with PID 15406 started at Fri Mar 31 18:49:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10305: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 15406 at Fri Mar 31 18:49:12 UTC 2017 kill -USR1 15406 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15406 killed at Fri Mar 31 18:49:12 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:49:12 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:49:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:49:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10306: Server never started - PASSED kill -0 15474 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15474 found at Fri Mar 31 18:49:18 UTC 2017 selfserv_9626 with PID 15474 started at Fri Mar 31 18:49:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10307: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 15474 at Fri Mar 31 18:49:19 UTC 2017 kill -USR1 15474 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15474 killed at Fri Mar 31 18:49:19 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:49:19 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:49:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:49:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10308: Server never started - PASSED kill -0 15557 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15557 found at Fri Mar 31 18:49:25 UTC 2017 selfserv_9626 with PID 15557 started at Fri Mar 31 18:49:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10309: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 15557 at Fri Mar 31 18:49:26 UTC 2017 kill -USR1 15557 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15557 killed at Fri Mar 31 18:49:26 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:49:27 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:49:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:49:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10310: Server never started - PASSED kill -0 15626 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15626 found at Fri Mar 31 18:49:33 UTC 2017 selfserv_9626 with PID 15626 started at Fri Mar 31 18:49:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10311: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 15626 at Fri Mar 31 18:49:33 UTC 2017 kill -USR1 15626 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15626 killed at Fri Mar 31 18:49:34 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:49:34 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:49:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:49:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10312: Server never started - PASSED kill -0 15694 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15694 found at Fri Mar 31 18:49:40 UTC 2017 selfserv_9626 with PID 15694 started at Fri Mar 31 18:49:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10313: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 15694 at Fri Mar 31 18:49:40 UTC 2017 kill -USR1 15694 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15694 killed at Fri Mar 31 18:49:41 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:49:41 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:49:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:49:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10314: Server never started - PASSED kill -0 15774 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15774 found at Fri Mar 31 18:49:47 UTC 2017 selfserv_9626 with PID 15774 started at Fri Mar 31 18:49:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10315: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 15774 at Fri Mar 31 18:49:47 UTC 2017 kill -USR1 15774 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15774 killed at Fri Mar 31 18:49:48 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:49:48 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:49:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:49:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10316: Server never started - PASSED kill -0 15843 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15843 found at Fri Mar 31 18:49:54 UTC 2017 selfserv_9626 with PID 15843 started at Fri Mar 31 18:49:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10317: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 15843 at Fri Mar 31 18:49:54 UTC 2017 kill -USR1 15843 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15843 killed at Fri Mar 31 18:49:55 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:49:55 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:49:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:50:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10318: Server never started - PASSED kill -0 15911 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 15911 found at Fri Mar 31 18:50:01 UTC 2017 selfserv_9626 with PID 15911 started at Fri Mar 31 18:50:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10319: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 15911 at Fri Mar 31 18:50:02 UTC 2017 kill -USR1 15911 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 15911 killed at Fri Mar 31 18:50:02 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:50:02 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:50:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:50:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10320: Server never started - PASSED kill -0 16005 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16005 found at Fri Mar 31 18:50:08 UTC 2017 selfserv_9626 with PID 16005 started at Fri Mar 31 18:50:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10321: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 16005 at Fri Mar 31 18:50:09 UTC 2017 kill -USR1 16005 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16005 killed at Fri Mar 31 18:50:09 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:50:09 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:50:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:50:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10322: Server never started - PASSED kill -0 16074 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16074 found at Fri Mar 31 18:50:15 UTC 2017 selfserv_9626 with PID 16074 started at Fri Mar 31 18:50:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10323: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 16074 at Fri Mar 31 18:50:16 UTC 2017 kill -USR1 16074 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16074 killed at Fri Mar 31 18:50:16 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:50:16 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:50:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:50:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10324: Server never started - PASSED kill -0 16145 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16145 found at Fri Mar 31 18:50:22 UTC 2017 selfserv_9626 with PID 16145 started at Fri Mar 31 18:50:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10325: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 16145 at Fri Mar 31 18:50:23 UTC 2017 kill -USR1 16145 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16145 killed at Fri Mar 31 18:50:23 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:50:23 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:50:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:50:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10326: Server never started - PASSED kill -0 16225 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16225 found at Fri Mar 31 18:50:29 UTC 2017 selfserv_9626 with PID 16225 started at Fri Mar 31 18:50:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10327: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 16225 at Fri Mar 31 18:50:30 UTC 2017 kill -USR1 16225 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16225 killed at Fri Mar 31 18:50:30 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:50:31 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:50:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:50:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10328: Server never started - PASSED kill -0 16293 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16293 found at Fri Mar 31 18:50:37 UTC 2017 selfserv_9626 with PID 16293 started at Fri Mar 31 18:50:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10329: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 16293 at Fri Mar 31 18:50:37 UTC 2017 kill -USR1 16293 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16293 killed at Fri Mar 31 18:50:37 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:50:38 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:50:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:50:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10330: Server never started - PASSED kill -0 16362 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16362 found at Fri Mar 31 18:50:44 UTC 2017 selfserv_9626 with PID 16362 started at Fri Mar 31 18:50:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10331: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 16362 at Fri Mar 31 18:50:44 UTC 2017 kill -USR1 16362 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16362 killed at Fri Mar 31 18:50:45 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:50:45 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:50:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:50:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10332: Server never started - PASSED kill -0 16444 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16444 found at Fri Mar 31 18:50:51 UTC 2017 selfserv_9626 with PID 16444 started at Fri Mar 31 18:50:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 16444 at Fri Mar 31 18:50:51 UTC 2017 kill -USR1 16444 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16444 killed at Fri Mar 31 18:50:52 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:50:52 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:50:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:50:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10334: Server never started - PASSED kill -0 16512 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16512 found at Fri Mar 31 18:50:58 UTC 2017 selfserv_9626 with PID 16512 started at Fri Mar 31 18:50:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 16512 at Fri Mar 31 18:50:58 UTC 2017 kill -USR1 16512 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16512 killed at Fri Mar 31 18:50:59 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:50:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:50:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:51:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10336: Server never started - PASSED kill -0 16581 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16581 found at Fri Mar 31 18:51:05 UTC 2017 selfserv_9626 with PID 16581 started at Fri Mar 31 18:51:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 16581 at Fri Mar 31 18:51:05 UTC 2017 kill -USR1 16581 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16581 killed at Fri Mar 31 18:51:06 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:51:06 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:51:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:51:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10338: Server never started - PASSED kill -0 16675 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16675 found at Fri Mar 31 18:51:12 UTC 2017 selfserv_9626 with PID 16675 started at Fri Mar 31 18:51:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 16675 at Fri Mar 31 18:51:13 UTC 2017 kill -USR1 16675 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16675 killed at Fri Mar 31 18:51:13 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:51:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:51:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:51:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10340: Server never started - PASSED kill -0 16743 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16743 found at Fri Mar 31 18:51:19 UTC 2017 selfserv_9626 with PID 16743 started at Fri Mar 31 18:51:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 16743 at Fri Mar 31 18:51:20 UTC 2017 kill -USR1 16743 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16743 killed at Fri Mar 31 18:51:20 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:51:20 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:51:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:51:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10342: Server never started - PASSED kill -0 16815 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16815 found at Fri Mar 31 18:51:26 UTC 2017 selfserv_9626 with PID 16815 started at Fri Mar 31 18:51:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 16815 at Fri Mar 31 18:51:27 UTC 2017 kill -USR1 16815 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16815 killed at Fri Mar 31 18:51:27 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:51:27 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:51:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:51:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10344: Server never started - PASSED kill -0 16895 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16895 found at Fri Mar 31 18:51:33 UTC 2017 selfserv_9626 with PID 16895 started at Fri Mar 31 18:51:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10345: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 16895 at Fri Mar 31 18:51:34 UTC 2017 kill -USR1 16895 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16895 killed at Fri Mar 31 18:51:34 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:51:34 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:51:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:51:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10346: Server never started - PASSED kill -0 16963 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16963 found at Fri Mar 31 18:51:40 UTC 2017 selfserv_9626 with PID 16963 started at Fri Mar 31 18:51:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10347: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 16963 at Fri Mar 31 18:51:41 UTC 2017 kill -USR1 16963 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16963 killed at Fri Mar 31 18:51:41 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:51:42 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:51:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:51:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10348: Server never started - PASSED kill -0 17031 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17031 found at Fri Mar 31 18:51:47 UTC 2017 selfserv_9626 with PID 17031 started at Fri Mar 31 18:51:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10349: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 17031 at Fri Mar 31 18:51:48 UTC 2017 kill -USR1 17031 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17031 killed at Fri Mar 31 18:51:48 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:51:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:51:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:51:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10350: Server never started - PASSED kill -0 17112 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17112 found at Fri Mar 31 18:51:55 UTC 2017 selfserv_9626 with PID 17112 started at Fri Mar 31 18:51:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10351: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 17112 at Fri Mar 31 18:51:55 UTC 2017 kill -USR1 17112 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17112 killed at Fri Mar 31 18:51:56 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:51:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:51:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:52:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10352: Server never started - PASSED kill -0 17180 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17180 found at Fri Mar 31 18:52:02 UTC 2017 selfserv_9626 with PID 17180 started at Fri Mar 31 18:52:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10353: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 17180 at Fri Mar 31 18:52:02 UTC 2017 kill -USR1 17180 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17180 killed at Fri Mar 31 18:52:03 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:52:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:52:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:52:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10354: Server never started - PASSED kill -0 17263 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17263 found at Fri Mar 31 18:52:09 UTC 2017 selfserv_9626 with PID 17263 started at Fri Mar 31 18:52:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10355: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 17263 at Fri Mar 31 18:52:09 UTC 2017 kill -USR1 17263 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17263 killed at Fri Mar 31 18:52:10 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:52:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:52:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:52:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10356: Server never started - PASSED kill -0 17344 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17344 found at Fri Mar 31 18:52:16 UTC 2017 selfserv_9626 with PID 17344 started at Fri Mar 31 18:52:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10357: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 17344 at Fri Mar 31 18:52:16 UTC 2017 kill -USR1 17344 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17344 killed at Fri Mar 31 18:52:17 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:52:17 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:52:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:52:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10358: Server never started - PASSED kill -0 17415 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17415 found at Fri Mar 31 18:52:23 UTC 2017 selfserv_9626 with PID 17415 started at Fri Mar 31 18:52:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10359: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 17415 at Fri Mar 31 18:52:24 UTC 2017 kill -USR1 17415 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17415 killed at Fri Mar 31 18:52:24 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:52:24 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:52:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:52:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10360: Server never started - PASSED kill -0 17483 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17483 found at Fri Mar 31 18:52:30 UTC 2017 selfserv_9626 with PID 17483 started at Fri Mar 31 18:52:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10361: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 17483 at Fri Mar 31 18:52:31 UTC 2017 kill -USR1 17483 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17483 killed at Fri Mar 31 18:52:31 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:52:31 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:52:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:52:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10362: Server never started - PASSED kill -0 17564 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17564 found at Fri Mar 31 18:52:37 UTC 2017 selfserv_9626 with PID 17564 started at Fri Mar 31 18:52:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10363: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 17564 at Fri Mar 31 18:52:38 UTC 2017 kill -USR1 17564 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17564 killed at Fri Mar 31 18:52:38 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:52:38 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:52:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:52:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10364: Server never started - PASSED kill -0 17632 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17632 found at Fri Mar 31 18:52:44 UTC 2017 selfserv_9626 with PID 17632 started at Fri Mar 31 18:52:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10365: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 17632 at Fri Mar 31 18:52:45 UTC 2017 kill -USR1 17632 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17632 killed at Fri Mar 31 18:52:45 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:52:45 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:52:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:52:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10366: Server never started - PASSED kill -0 17700 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17700 found at Fri Mar 31 18:52:51 UTC 2017 selfserv_9626 with PID 17700 started at Fri Mar 31 18:52:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10367: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 17700 at Fri Mar 31 18:52:52 UTC 2017 kill -USR1 17700 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17700 killed at Fri Mar 31 18:52:52 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:52:53 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:52:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:52:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10368: Server never started - PASSED kill -0 17781 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17781 found at Fri Mar 31 18:52:59 UTC 2017 selfserv_9626 with PID 17781 started at Fri Mar 31 18:52:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10369: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 17781 at Fri Mar 31 18:52:59 UTC 2017 kill -USR1 17781 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17781 killed at Fri Mar 31 18:52:59 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:53:00 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:53:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:53:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10370: Server never started - PASSED kill -0 17849 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17849 found at Fri Mar 31 18:53:06 UTC 2017 selfserv_9626 with PID 17849 started at Fri Mar 31 18:53:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10371: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 17849 at Fri Mar 31 18:53:06 UTC 2017 kill -USR1 17849 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17849 killed at Fri Mar 31 18:53:07 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 18:53:07 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:53:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:53:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10372: Server never started - PASSED kill -0 17930 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17930 found at Fri Mar 31 18:53:13 UTC 2017 selfserv_9626 with PID 17930 started at Fri Mar 31 18:53:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10373: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 17930 at Fri Mar 31 18:53:13 UTC 2017 kill -USR1 17930 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17930 killed at Fri Mar 31 18:53:14 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:53:14 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:53:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:53:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10374: Server never started - PASSED kill -0 18014 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18014 found at Fri Mar 31 18:53:20 UTC 2017 selfserv_9626 with PID 18014 started at Fri Mar 31 18:53:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10375: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 18014 at Fri Mar 31 18:53:20 UTC 2017 kill -USR1 18014 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18014 killed at Fri Mar 31 18:53:21 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:53:21 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:53:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:53:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10376: Server never started - PASSED kill -0 18082 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18082 found at Fri Mar 31 18:53:27 UTC 2017 selfserv_9626 with PID 18082 started at Fri Mar 31 18:53:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10377: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 18082 at Fri Mar 31 18:53:27 UTC 2017 kill -USR1 18082 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18082 killed at Fri Mar 31 18:53:28 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:53:28 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:53:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:53:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10378: Server never started - PASSED kill -0 18151 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18151 found at Fri Mar 31 18:53:34 UTC 2017 selfserv_9626 with PID 18151 started at Fri Mar 31 18:53:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10379: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 18151 at Fri Mar 31 18:53:35 UTC 2017 kill -USR1 18151 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18151 killed at Fri Mar 31 18:53:35 UTC 2017 ssl.sh: Cache CRL SSL Client Tests - with ECC =============================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/authin.tl.tmp 0 selfserv_9626 starting at Fri Mar 31 18:53:35 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:53:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:53:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10380: Server never started - PASSED kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:41 UTC 2017 selfserv_9626 with PID 18226 started at Fri Mar 31 18:53:41 UTC 2017 Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:42 UTC 2017 ssl.sh: #10381: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:42 UTC 2017 ssl.sh: #10382: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:43 UTC 2017 ssl.sh: #10383: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:44 UTC 2017 ssl.sh: #10384: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:44 UTC 2017 ssl.sh: #10385: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:45 UTC 2017 ssl.sh: #10386: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:45 UTC 2017 ssl.sh: #10387: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:46 UTC 2017 ssl.sh: #10388: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:47 UTC 2017 ssl.sh: #10389: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:47 UTC 2017 ssl.sh: #10390: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:48 UTC 2017 ssl.sh: #10391: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:49 UTC 2017 ssl.sh: #10392: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:49 UTC 2017 ssl.sh: #10393: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:50 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10394: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:51 UTC 2017 ssl.sh: #10395: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:51 UTC 2017 ssl.sh: #10396: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:52 UTC 2017 ssl.sh: #10397: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:52 UTC 2017 ssl.sh: #10398: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:53 UTC 2017 ssl.sh: #10399: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:54 UTC 2017 ssl.sh: #10400: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:54 UTC 2017 ssl.sh: #10401: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:55 UTC 2017 ssl.sh: #10402: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:56 UTC 2017 ssl.sh: #10403: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:56 UTC 2017 ssl.sh: #10404: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:57 UTC 2017 ssl.sh: #10405: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:58 UTC 2017 ssl.sh: #10406: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:58 UTC 2017 ssl.sh: #10407: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:53:59 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10408: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:54:00 UTC 2017 ssl.sh: #10409: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:54:00 UTC 2017 ssl.sh: #10410: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:54:01 UTC 2017 ssl.sh: #10411: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:54:01 UTC 2017 ssl.sh: #10412: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:54:02 UTC 2017 ssl.sh: #10413: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:54:03 UTC 2017 ssl.sh: #10414: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:54:03 UTC 2017 ssl.sh: #10415: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:54:04 UTC 2017 ssl.sh: #10416: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:54:05 UTC 2017 ssl.sh: #10417: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:54:05 UTC 2017 ssl.sh: #10418: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:54:06 UTC 2017 ssl.sh: #10419: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:54:07 UTC 2017 ssl.sh: #10420: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 18226 found at Fri Mar 31 18:54:07 UTC 2017 ssl.sh: #10421: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 18226 at Fri Mar 31 18:54:07 UTC 2017 kill -USR1 18226 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 18226 killed at Fri Mar 31 18:54:08 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:54:08 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:54:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:54:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10422: Server never started - PASSED kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:14 UTC 2017 selfserv_9626 with PID 19674 started at Fri Mar 31 18:54:14 UTC 2017 Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:15 UTC 2017 ssl.sh: #10423: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:15 UTC 2017 ssl.sh: #10424: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:16 UTC 2017 ssl.sh: #10425: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:16 UTC 2017 ssl.sh: #10426: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:17 UTC 2017 ssl.sh: #10427: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:18 UTC 2017 ssl.sh: #10428: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:18 UTC 2017 ssl.sh: #10429: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:19 UTC 2017 ssl.sh: #10430: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:20 UTC 2017 ssl.sh: #10431: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:20 UTC 2017 ssl.sh: #10432: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:21 UTC 2017 ssl.sh: #10433: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:22 UTC 2017 ssl.sh: #10434: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:22 UTC 2017 ssl.sh: #10435: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:23 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10436: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:23 UTC 2017 ssl.sh: #10437: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:24 UTC 2017 ssl.sh: #10438: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:25 UTC 2017 ssl.sh: #10439: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:25 UTC 2017 ssl.sh: #10440: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:26 UTC 2017 ssl.sh: #10441: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:27 UTC 2017 ssl.sh: #10442: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:27 UTC 2017 ssl.sh: #10443: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:28 UTC 2017 ssl.sh: #10444: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:29 UTC 2017 ssl.sh: #10445: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:29 UTC 2017 ssl.sh: #10446: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:30 UTC 2017 ssl.sh: #10447: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:31 UTC 2017 ssl.sh: #10448: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:31 UTC 2017 ssl.sh: #10449: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:32 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10450: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:32 UTC 2017 ssl.sh: #10451: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:33 UTC 2017 ssl.sh: #10452: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:34 UTC 2017 ssl.sh: #10453: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:34 UTC 2017 ssl.sh: #10454: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:35 UTC 2017 ssl.sh: #10455: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:36 UTC 2017 ssl.sh: #10456: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:36 UTC 2017 ssl.sh: #10457: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:37 UTC 2017 ssl.sh: #10458: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:37 UTC 2017 ssl.sh: #10459: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:38 UTC 2017 ssl.sh: #10460: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:39 UTC 2017 ssl.sh: #10461: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:39 UTC 2017 ssl.sh: #10462: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19674 found at Fri Mar 31 18:54:40 UTC 2017 ssl.sh: #10463: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 19674 at Fri Mar 31 18:54:40 UTC 2017 kill -USR1 19674 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19674 killed at Fri Mar 31 18:54:41 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:54:41 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:54:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:54:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10464: Server never started - PASSED kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:47 UTC 2017 selfserv_9626 with PID 21113 started at Fri Mar 31 18:54:47 UTC 2017 Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:47 UTC 2017 ssl.sh: #10465: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:48 UTC 2017 ssl.sh: #10466: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:49 UTC 2017 ssl.sh: #10467: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:49 UTC 2017 ssl.sh: #10468: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:50 UTC 2017 ssl.sh: #10469: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:51 UTC 2017 ssl.sh: #10470: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:51 UTC 2017 ssl.sh: #10471: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:52 UTC 2017 ssl.sh: #10472: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:52 UTC 2017 ssl.sh: #10473: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:53 UTC 2017 ssl.sh: #10474: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:54 UTC 2017 ssl.sh: #10475: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:54 UTC 2017 ssl.sh: #10476: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:55 UTC 2017 ssl.sh: #10477: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:56 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10478: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:56 UTC 2017 ssl.sh: #10479: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:57 UTC 2017 ssl.sh: #10480: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:58 UTC 2017 ssl.sh: #10481: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:58 UTC 2017 ssl.sh: #10482: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:59 UTC 2017 ssl.sh: #10483: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:54:59 UTC 2017 ssl.sh: #10484: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:00 UTC 2017 ssl.sh: #10485: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:01 UTC 2017 ssl.sh: #10486: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:01 UTC 2017 ssl.sh: #10487: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:02 UTC 2017 ssl.sh: #10488: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:03 UTC 2017 ssl.sh: #10489: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:03 UTC 2017 ssl.sh: #10490: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:04 UTC 2017 ssl.sh: #10491: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:05 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10492: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:05 UTC 2017 ssl.sh: #10493: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:06 UTC 2017 ssl.sh: #10494: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:07 UTC 2017 ssl.sh: #10495: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:07 UTC 2017 ssl.sh: #10496: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:08 UTC 2017 ssl.sh: #10497: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:08 UTC 2017 ssl.sh: #10498: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:09 UTC 2017 ssl.sh: #10499: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:10 UTC 2017 ssl.sh: #10500: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:10 UTC 2017 ssl.sh: #10501: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:11 UTC 2017 ssl.sh: #10502: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:12 UTC 2017 ssl.sh: #10503: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:12 UTC 2017 ssl.sh: #10504: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 21113 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 21113 found at Fri Mar 31 18:55:13 UTC 2017 ssl.sh: #10505: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 21113 at Fri Mar 31 18:55:13 UTC 2017 kill -USR1 21113 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 21113 killed at Fri Mar 31 18:55:14 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:55:14 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:55:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:55:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10506: Server never started - PASSED kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:20 UTC 2017 selfserv_9626 with PID 22566 started at Fri Mar 31 18:55:20 UTC 2017 Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:20 UTC 2017 ssl.sh: #10507: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:21 UTC 2017 ssl.sh: #10508: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:22 UTC 2017 ssl.sh: #10509: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:22 UTC 2017 ssl.sh: #10510: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:23 UTC 2017 ssl.sh: #10511: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:23 UTC 2017 ssl.sh: #10512: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:24 UTC 2017 ssl.sh: #10513: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:25 UTC 2017 ssl.sh: #10514: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:25 UTC 2017 ssl.sh: #10515: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:26 UTC 2017 ssl.sh: #10516: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:27 UTC 2017 ssl.sh: #10517: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:27 UTC 2017 ssl.sh: #10518: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:28 UTC 2017 ssl.sh: #10519: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:29 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10520: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:29 UTC 2017 ssl.sh: #10521: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:30 UTC 2017 ssl.sh: #10522: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:30 UTC 2017 ssl.sh: #10523: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:31 UTC 2017 ssl.sh: #10524: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:32 UTC 2017 ssl.sh: #10525: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:32 UTC 2017 ssl.sh: #10526: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:33 UTC 2017 ssl.sh: #10527: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:34 UTC 2017 ssl.sh: #10528: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:34 UTC 2017 ssl.sh: #10529: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:35 UTC 2017 ssl.sh: #10530: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:36 UTC 2017 ssl.sh: #10531: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:36 UTC 2017 ssl.sh: #10532: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:37 UTC 2017 ssl.sh: #10533: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:38 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10534: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:38 UTC 2017 ssl.sh: #10535: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:39 UTC 2017 ssl.sh: #10536: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:39 UTC 2017 ssl.sh: #10537: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:40 UTC 2017 ssl.sh: #10538: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:41 UTC 2017 ssl.sh: #10539: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:41 UTC 2017 ssl.sh: #10540: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:42 UTC 2017 ssl.sh: #10541: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:43 UTC 2017 ssl.sh: #10542: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:43 UTC 2017 ssl.sh: #10543: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:44 UTC 2017 ssl.sh: #10544: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:45 UTC 2017 ssl.sh: #10545: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:45 UTC 2017 ssl.sh: #10546: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22566 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22566 found at Fri Mar 31 18:55:46 UTC 2017 ssl.sh: #10547: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 22566 at Fri Mar 31 18:55:46 UTC 2017 kill -USR1 22566 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22566 killed at Fri Mar 31 18:55:47 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:55:47 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:55:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:55:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10548: Server never started - PASSED kill -0 24001 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24001 found at Fri Mar 31 18:55:53 UTC 2017 selfserv_9626 with PID 24001 started at Fri Mar 31 18:55:53 UTC 2017 trying to kill selfserv_9626 with PID 24001 at Fri Mar 31 18:55:53 UTC 2017 kill -USR1 24001 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24001 killed at Fri Mar 31 18:55:53 UTC 2017 selfserv_9626 starting at Fri Mar 31 18:55:53 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:55:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:55:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10549: Server never started - PASSED kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:55:59 UTC 2017 selfserv_9626 with PID 24056 started at Fri Mar 31 18:55:59 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:00 UTC 2017 ssl.sh: #10550: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:00 UTC 2017 ssl.sh: #10551: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:01 UTC 2017 ssl.sh: #10552: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:02 UTC 2017 ssl.sh: #10553: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:02 UTC 2017 ssl.sh: #10554: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:03 UTC 2017 ssl.sh: #10555: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:04 UTC 2017 ssl.sh: #10556: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:04 UTC 2017 ssl.sh: #10557: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:05 UTC 2017 ssl.sh: #10558: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:06 UTC 2017 ssl.sh: #10559: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:06 UTC 2017 ssl.sh: #10560: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:07 UTC 2017 ssl.sh: #10561: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:08 UTC 2017 ssl.sh: #10562: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:08 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10563: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:09 UTC 2017 ssl.sh: #10564: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:09 UTC 2017 ssl.sh: #10565: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:10 UTC 2017 ssl.sh: #10566: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:11 UTC 2017 ssl.sh: #10567: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:11 UTC 2017 ssl.sh: #10568: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:12 UTC 2017 ssl.sh: #10569: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:13 UTC 2017 ssl.sh: #10570: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:13 UTC 2017 ssl.sh: #10571: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:14 UTC 2017 ssl.sh: #10572: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:15 UTC 2017 ssl.sh: #10573: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:15 UTC 2017 ssl.sh: #10574: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:16 UTC 2017 ssl.sh: #10575: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:17 UTC 2017 ssl.sh: #10576: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:17 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10577: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:18 UTC 2017 ssl.sh: #10578: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:18 UTC 2017 ssl.sh: #10579: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:19 UTC 2017 ssl.sh: #10580: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:20 UTC 2017 ssl.sh: #10581: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:20 UTC 2017 ssl.sh: #10582: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:21 UTC 2017 ssl.sh: #10583: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:22 UTC 2017 ssl.sh: #10584: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:22 UTC 2017 ssl.sh: #10585: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:23 UTC 2017 ssl.sh: #10586: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:24 UTC 2017 ssl.sh: #10587: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:24 UTC 2017 ssl.sh: #10588: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:25 UTC 2017 ssl.sh: #10589: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 24056 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24056 found at Fri Mar 31 18:56:26 UTC 2017 ssl.sh: #10590: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 24056 at Fri Mar 31 18:56:26 UTC 2017 kill -USR1 24056 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24056 killed at Fri Mar 31 18:56:26 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:56:26 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:56:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:56:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10591: Server never started - PASSED kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:32 UTC 2017 selfserv_9626 with PID 25508 started at Fri Mar 31 18:56:32 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:33 UTC 2017 ssl.sh: #10592: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:33 UTC 2017 ssl.sh: #10593: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:34 UTC 2017 ssl.sh: #10594: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:35 UTC 2017 ssl.sh: #10595: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:35 UTC 2017 ssl.sh: #10596: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:36 UTC 2017 ssl.sh: #10597: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:37 UTC 2017 ssl.sh: #10598: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:37 UTC 2017 ssl.sh: #10599: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:38 UTC 2017 ssl.sh: #10600: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:39 UTC 2017 ssl.sh: #10601: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:39 UTC 2017 ssl.sh: #10602: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:40 UTC 2017 ssl.sh: #10603: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:41 UTC 2017 ssl.sh: #10604: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:41 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10605: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:42 UTC 2017 ssl.sh: #10606: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:42 UTC 2017 ssl.sh: #10607: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:43 UTC 2017 ssl.sh: #10608: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:44 UTC 2017 ssl.sh: #10609: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:44 UTC 2017 ssl.sh: #10610: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:45 UTC 2017 ssl.sh: #10611: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:46 UTC 2017 ssl.sh: #10612: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:46 UTC 2017 ssl.sh: #10613: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:47 UTC 2017 ssl.sh: #10614: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:48 UTC 2017 ssl.sh: #10615: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:48 UTC 2017 ssl.sh: #10616: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:49 UTC 2017 ssl.sh: #10617: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:50 UTC 2017 ssl.sh: #10618: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:50 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10619: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:51 UTC 2017 ssl.sh: #10620: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:51 UTC 2017 ssl.sh: #10621: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:52 UTC 2017 ssl.sh: #10622: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:53 UTC 2017 ssl.sh: #10623: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:53 UTC 2017 ssl.sh: #10624: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:54 UTC 2017 ssl.sh: #10625: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:55 UTC 2017 ssl.sh: #10626: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:55 UTC 2017 ssl.sh: #10627: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:56 UTC 2017 ssl.sh: #10628: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:56 UTC 2017 ssl.sh: #10629: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:57 UTC 2017 ssl.sh: #10630: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:58 UTC 2017 ssl.sh: #10631: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 25508 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25508 found at Fri Mar 31 18:56:59 UTC 2017 ssl.sh: #10632: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 25508 at Fri Mar 31 18:56:59 UTC 2017 kill -USR1 25508 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25508 killed at Fri Mar 31 18:56:59 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:56:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:56:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:57:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10633: Server never started - PASSED kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:05 UTC 2017 selfserv_9626 with PID 26947 started at Fri Mar 31 18:57:05 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:06 UTC 2017 ssl.sh: #10634: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:06 UTC 2017 ssl.sh: #10635: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:07 UTC 2017 ssl.sh: #10636: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:08 UTC 2017 ssl.sh: #10637: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:08 UTC 2017 ssl.sh: #10638: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:09 UTC 2017 ssl.sh: #10639: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:09 UTC 2017 ssl.sh: #10640: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:10 UTC 2017 ssl.sh: #10641: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:11 UTC 2017 ssl.sh: #10642: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:11 UTC 2017 ssl.sh: #10643: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:12 UTC 2017 ssl.sh: #10644: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:13 UTC 2017 ssl.sh: #10645: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:13 UTC 2017 ssl.sh: #10646: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:14 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10647: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:15 UTC 2017 ssl.sh: #10648: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:15 UTC 2017 ssl.sh: #10649: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:16 UTC 2017 ssl.sh: #10650: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:17 UTC 2017 ssl.sh: #10651: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:17 UTC 2017 ssl.sh: #10652: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:18 UTC 2017 ssl.sh: #10653: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:18 UTC 2017 ssl.sh: #10654: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:19 UTC 2017 ssl.sh: #10655: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:20 UTC 2017 ssl.sh: #10656: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:20 UTC 2017 ssl.sh: #10657: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:21 UTC 2017 ssl.sh: #10658: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:22 UTC 2017 ssl.sh: #10659: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:22 UTC 2017 ssl.sh: #10660: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:23 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10661: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:24 UTC 2017 ssl.sh: #10662: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:24 UTC 2017 ssl.sh: #10663: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:25 UTC 2017 ssl.sh: #10664: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:26 UTC 2017 ssl.sh: #10665: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:26 UTC 2017 ssl.sh: #10666: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:27 UTC 2017 ssl.sh: #10667: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:27 UTC 2017 ssl.sh: #10668: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:28 UTC 2017 ssl.sh: #10669: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:29 UTC 2017 ssl.sh: #10670: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:29 UTC 2017 ssl.sh: #10671: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:30 UTC 2017 ssl.sh: #10672: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:31 UTC 2017 ssl.sh: #10673: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 26947 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26947 found at Fri Mar 31 18:57:31 UTC 2017 ssl.sh: #10674: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 26947 at Fri Mar 31 18:57:32 UTC 2017 kill -USR1 26947 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 26947 killed at Fri Mar 31 18:57:32 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:57:32 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:57:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:57:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10675: Server never started - PASSED kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:38 UTC 2017 selfserv_9626 with PID 28400 started at Fri Mar 31 18:57:38 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:39 UTC 2017 ssl.sh: #10676: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:39 UTC 2017 ssl.sh: #10677: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:40 UTC 2017 ssl.sh: #10678: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:41 UTC 2017 ssl.sh: #10679: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:41 UTC 2017 ssl.sh: #10680: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:42 UTC 2017 ssl.sh: #10681: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:42 UTC 2017 ssl.sh: #10682: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:43 UTC 2017 ssl.sh: #10683: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:44 UTC 2017 ssl.sh: #10684: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:44 UTC 2017 ssl.sh: #10685: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:45 UTC 2017 ssl.sh: #10686: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:46 UTC 2017 ssl.sh: #10687: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:46 UTC 2017 ssl.sh: #10688: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:47 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10689: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:48 UTC 2017 ssl.sh: #10690: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:48 UTC 2017 ssl.sh: #10691: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:49 UTC 2017 ssl.sh: #10692: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:49 UTC 2017 ssl.sh: #10693: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:50 UTC 2017 ssl.sh: #10694: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:51 UTC 2017 ssl.sh: #10695: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:51 UTC 2017 ssl.sh: #10696: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:52 UTC 2017 ssl.sh: #10697: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:53 UTC 2017 ssl.sh: #10698: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:53 UTC 2017 ssl.sh: #10699: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:54 UTC 2017 ssl.sh: #10700: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:55 UTC 2017 ssl.sh: #10701: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:55 UTC 2017 ssl.sh: #10702: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:56 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10703: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:57 UTC 2017 ssl.sh: #10704: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:57 UTC 2017 ssl.sh: #10705: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:58 UTC 2017 ssl.sh: #10706: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:58 UTC 2017 ssl.sh: #10707: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:57:59 UTC 2017 ssl.sh: #10708: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:58:00 UTC 2017 ssl.sh: #10709: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:58:00 UTC 2017 ssl.sh: #10710: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:58:01 UTC 2017 ssl.sh: #10711: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:58:02 UTC 2017 ssl.sh: #10712: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:58:03 UTC 2017 ssl.sh: #10713: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:58:03 UTC 2017 ssl.sh: #10714: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:58:04 UTC 2017 ssl.sh: #10715: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 28400 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28400 found at Fri Mar 31 18:58:05 UTC 2017 ssl.sh: #10716: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 28400 at Fri Mar 31 18:58:05 UTC 2017 kill -USR1 28400 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28400 killed at Fri Mar 31 18:58:05 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:58:05 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:58:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:58:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10717: Server never started - PASSED kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:11 UTC 2017 selfserv_9626 with PID 29850 started at Fri Mar 31 18:58:11 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:12 UTC 2017 ssl.sh: #10718: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:12 UTC 2017 ssl.sh: #10719: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:13 UTC 2017 ssl.sh: #10720: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:14 UTC 2017 ssl.sh: #10721: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:14 UTC 2017 ssl.sh: #10722: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:15 UTC 2017 ssl.sh: #10723: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:16 UTC 2017 ssl.sh: #10724: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:16 UTC 2017 ssl.sh: #10725: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:17 UTC 2017 ssl.sh: #10726: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:18 UTC 2017 ssl.sh: #10727: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:18 UTC 2017 ssl.sh: #10728: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:19 UTC 2017 ssl.sh: #10729: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:20 UTC 2017 ssl.sh: #10730: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:20 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10731: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:21 UTC 2017 ssl.sh: #10732: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:21 UTC 2017 ssl.sh: #10733: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:22 UTC 2017 ssl.sh: #10734: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:23 UTC 2017 ssl.sh: #10735: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:23 UTC 2017 ssl.sh: #10736: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:24 UTC 2017 ssl.sh: #10737: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:25 UTC 2017 ssl.sh: #10738: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:25 UTC 2017 ssl.sh: #10739: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:26 UTC 2017 ssl.sh: #10740: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:27 UTC 2017 ssl.sh: #10741: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:27 UTC 2017 ssl.sh: #10742: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:28 UTC 2017 ssl.sh: #10743: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:29 UTC 2017 ssl.sh: #10744: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:29 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10745: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:30 UTC 2017 ssl.sh: #10746: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:30 UTC 2017 ssl.sh: #10747: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:31 UTC 2017 ssl.sh: #10748: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:32 UTC 2017 ssl.sh: #10749: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:32 UTC 2017 ssl.sh: #10750: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:33 UTC 2017 ssl.sh: #10751: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:34 UTC 2017 ssl.sh: #10752: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:34 UTC 2017 ssl.sh: #10753: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:35 UTC 2017 ssl.sh: #10754: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:36 UTC 2017 ssl.sh: #10755: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:36 UTC 2017 ssl.sh: #10756: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:37 UTC 2017 ssl.sh: #10757: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 29850 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29850 found at Fri Mar 31 18:58:38 UTC 2017 ssl.sh: #10758: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 29850 at Fri Mar 31 18:58:38 UTC 2017 kill -USR1 29850 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29850 killed at Fri Mar 31 18:58:38 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:58:38 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:58:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:58:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10759: Server never started - PASSED kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:44 UTC 2017 selfserv_9626 with PID 31289 started at Fri Mar 31 18:58:44 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:45 UTC 2017 ssl.sh: #10760: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:45 UTC 2017 ssl.sh: #10761: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:46 UTC 2017 ssl.sh: #10762: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:47 UTC 2017 ssl.sh: #10763: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:47 UTC 2017 ssl.sh: #10764: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:48 UTC 2017 ssl.sh: #10765: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:49 UTC 2017 ssl.sh: #10766: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:49 UTC 2017 ssl.sh: #10767: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:50 UTC 2017 ssl.sh: #10768: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:51 UTC 2017 ssl.sh: #10769: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:51 UTC 2017 ssl.sh: #10770: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:52 UTC 2017 ssl.sh: #10771: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:53 UTC 2017 ssl.sh: #10772: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:53 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10773: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:54 UTC 2017 ssl.sh: #10774: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:54 UTC 2017 ssl.sh: #10775: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:55 UTC 2017 ssl.sh: #10776: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:56 UTC 2017 ssl.sh: #10777: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:56 UTC 2017 ssl.sh: #10778: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:57 UTC 2017 ssl.sh: #10779: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:58 UTC 2017 ssl.sh: #10780: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:58 UTC 2017 ssl.sh: #10781: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:58:59 UTC 2017 ssl.sh: #10782: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:59:00 UTC 2017 ssl.sh: #10783: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:59:00 UTC 2017 ssl.sh: #10784: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:59:01 UTC 2017 ssl.sh: #10785: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:59:02 UTC 2017 ssl.sh: #10786: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:59:02 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10787: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:59:03 UTC 2017 ssl.sh: #10788: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:59:03 UTC 2017 ssl.sh: #10789: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:59:04 UTC 2017 ssl.sh: #10790: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:59:05 UTC 2017 ssl.sh: #10791: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:59:05 UTC 2017 ssl.sh: #10792: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:59:06 UTC 2017 ssl.sh: #10793: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:59:07 UTC 2017 ssl.sh: #10794: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:59:07 UTC 2017 ssl.sh: #10795: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:59:08 UTC 2017 ssl.sh: #10796: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:59:09 UTC 2017 ssl.sh: #10797: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:59:09 UTC 2017 ssl.sh: #10798: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:59:10 UTC 2017 ssl.sh: #10799: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 31289 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31289 found at Fri Mar 31 18:59:11 UTC 2017 ssl.sh: #10800: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 31289 at Fri Mar 31 18:59:11 UTC 2017 kill -USR1 31289 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31289 killed at Fri Mar 31 18:59:11 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:59:11 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:59:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:59:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10801: Server never started - PASSED kill -0 32738 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32738 found at Fri Mar 31 18:59:17 UTC 2017 selfserv_9626 with PID 32738 started at Fri Mar 31 18:59:17 UTC 2017 trying to kill selfserv_9626 with PID 32738 at Fri Mar 31 18:59:17 UTC 2017 kill -USR1 32738 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32738 killed at Fri Mar 31 18:59:18 UTC 2017 selfserv_9626 starting at Fri Mar 31 18:59:18 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:59:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:59:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10802: Server never started - PASSED kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:24 UTC 2017 selfserv_9626 with PID 328 started at Fri Mar 31 18:59:24 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:24 UTC 2017 ssl.sh: #10803: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:25 UTC 2017 ssl.sh: #10804: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:26 UTC 2017 ssl.sh: #10805: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:26 UTC 2017 ssl.sh: #10806: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:27 UTC 2017 ssl.sh: #10807: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:28 UTC 2017 ssl.sh: #10808: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:28 UTC 2017 ssl.sh: #10809: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:29 UTC 2017 ssl.sh: #10810: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:30 UTC 2017 ssl.sh: #10811: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:30 UTC 2017 ssl.sh: #10812: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:31 UTC 2017 ssl.sh: #10813: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:32 UTC 2017 ssl.sh: #10814: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:32 UTC 2017 ssl.sh: #10815: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:33 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10816: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:33 UTC 2017 ssl.sh: #10817: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:34 UTC 2017 ssl.sh: #10818: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:35 UTC 2017 ssl.sh: #10819: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:35 UTC 2017 ssl.sh: #10820: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:36 UTC 2017 ssl.sh: #10821: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:37 UTC 2017 ssl.sh: #10822: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:37 UTC 2017 ssl.sh: #10823: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:38 UTC 2017 ssl.sh: #10824: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:39 UTC 2017 ssl.sh: #10825: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:39 UTC 2017 ssl.sh: #10826: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:40 UTC 2017 ssl.sh: #10827: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:41 UTC 2017 ssl.sh: #10828: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:41 UTC 2017 ssl.sh: #10829: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:42 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10830: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:42 UTC 2017 ssl.sh: #10831: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:43 UTC 2017 ssl.sh: #10832: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:44 UTC 2017 ssl.sh: #10833: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:44 UTC 2017 ssl.sh: #10834: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:45 UTC 2017 ssl.sh: #10835: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:46 UTC 2017 ssl.sh: #10836: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:46 UTC 2017 ssl.sh: #10837: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:47 UTC 2017 ssl.sh: #10838: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:48 UTC 2017 ssl.sh: #10839: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:48 UTC 2017 ssl.sh: #10840: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:49 UTC 2017 ssl.sh: #10841: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:50 UTC 2017 ssl.sh: #10842: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 328 found at Fri Mar 31 18:59:50 UTC 2017 ssl.sh: #10843: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 328 at Fri Mar 31 18:59:50 UTC 2017 kill -USR1 328 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 328 killed at Fri Mar 31 18:59:51 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 18:59:51 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 18:59:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 18:59:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10844: Server never started - PASSED kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 18:59:57 UTC 2017 selfserv_9626 with PID 1794 started at Fri Mar 31 18:59:57 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 18:59:58 UTC 2017 ssl.sh: #10845: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 18:59:58 UTC 2017 ssl.sh: #10846: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 18:59:59 UTC 2017 ssl.sh: #10847: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 18:59:59 UTC 2017 ssl.sh: #10848: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:00 UTC 2017 ssl.sh: #10849: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:01 UTC 2017 ssl.sh: #10850: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:01 UTC 2017 ssl.sh: #10851: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:02 UTC 2017 ssl.sh: #10852: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:03 UTC 2017 ssl.sh: #10853: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:03 UTC 2017 ssl.sh: #10854: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:04 UTC 2017 ssl.sh: #10855: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:05 UTC 2017 ssl.sh: #10856: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:05 UTC 2017 ssl.sh: #10857: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:06 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10858: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:07 UTC 2017 ssl.sh: #10859: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:07 UTC 2017 ssl.sh: #10860: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:08 UTC 2017 ssl.sh: #10861: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:08 UTC 2017 ssl.sh: #10862: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:09 UTC 2017 ssl.sh: #10863: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:10 UTC 2017 ssl.sh: #10864: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:10 UTC 2017 ssl.sh: #10865: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:11 UTC 2017 ssl.sh: #10866: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:12 UTC 2017 ssl.sh: #10867: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:12 UTC 2017 ssl.sh: #10868: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:13 UTC 2017 ssl.sh: #10869: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:14 UTC 2017 ssl.sh: #10870: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:14 UTC 2017 ssl.sh: #10871: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:15 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10872: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:16 UTC 2017 ssl.sh: #10873: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:16 UTC 2017 ssl.sh: #10874: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:17 UTC 2017 ssl.sh: #10875: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:17 UTC 2017 ssl.sh: #10876: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:18 UTC 2017 ssl.sh: #10877: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:19 UTC 2017 ssl.sh: #10878: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:19 UTC 2017 ssl.sh: #10879: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:20 UTC 2017 ssl.sh: #10880: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:21 UTC 2017 ssl.sh: #10881: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:21 UTC 2017 ssl.sh: #10882: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:22 UTC 2017 ssl.sh: #10883: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:23 UTC 2017 ssl.sh: #10884: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1794 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1794 found at Fri Mar 31 19:00:23 UTC 2017 ssl.sh: #10885: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 1794 at Fri Mar 31 19:00:24 UTC 2017 kill -USR1 1794 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1794 killed at Fri Mar 31 19:00:24 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:00:24 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:00:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:00:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10886: Server never started - PASSED kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:30 UTC 2017 selfserv_9626 with PID 3259 started at Fri Mar 31 19:00:30 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:31 UTC 2017 ssl.sh: #10887: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:31 UTC 2017 ssl.sh: #10888: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:32 UTC 2017 ssl.sh: #10889: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:32 UTC 2017 ssl.sh: #10890: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:33 UTC 2017 ssl.sh: #10891: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:34 UTC 2017 ssl.sh: #10892: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:34 UTC 2017 ssl.sh: #10893: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:35 UTC 2017 ssl.sh: #10894: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:36 UTC 2017 ssl.sh: #10895: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:36 UTC 2017 ssl.sh: #10896: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:37 UTC 2017 ssl.sh: #10897: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:38 UTC 2017 ssl.sh: #10898: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:38 UTC 2017 ssl.sh: #10899: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:39 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10900: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:40 UTC 2017 ssl.sh: #10901: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:40 UTC 2017 ssl.sh: #10902: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:41 UTC 2017 ssl.sh: #10903: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:41 UTC 2017 ssl.sh: #10904: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:42 UTC 2017 ssl.sh: #10905: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:43 UTC 2017 ssl.sh: #10906: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:43 UTC 2017 ssl.sh: #10907: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:44 UTC 2017 ssl.sh: #10908: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:45 UTC 2017 ssl.sh: #10909: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:45 UTC 2017 ssl.sh: #10910: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:46 UTC 2017 ssl.sh: #10911: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:47 UTC 2017 ssl.sh: #10912: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:47 UTC 2017 ssl.sh: #10913: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:48 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10914: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:49 UTC 2017 ssl.sh: #10915: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:49 UTC 2017 ssl.sh: #10916: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:50 UTC 2017 ssl.sh: #10917: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:50 UTC 2017 ssl.sh: #10918: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:51 UTC 2017 ssl.sh: #10919: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:52 UTC 2017 ssl.sh: #10920: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:52 UTC 2017 ssl.sh: #10921: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:53 UTC 2017 ssl.sh: #10922: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:54 UTC 2017 ssl.sh: #10923: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:54 UTC 2017 ssl.sh: #10924: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:55 UTC 2017 ssl.sh: #10925: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:56 UTC 2017 ssl.sh: #10926: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3259 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3259 found at Fri Mar 31 19:00:56 UTC 2017 ssl.sh: #10927: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 3259 at Fri Mar 31 19:00:57 UTC 2017 kill -USR1 3259 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 3259 killed at Fri Mar 31 19:00:57 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:00:57 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:00:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:01:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10928: Server never started - PASSED kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:03 UTC 2017 selfserv_9626 with PID 4745 started at Fri Mar 31 19:01:03 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:04 UTC 2017 ssl.sh: #10929: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:04 UTC 2017 ssl.sh: #10930: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:05 UTC 2017 ssl.sh: #10931: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:05 UTC 2017 ssl.sh: #10932: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:06 UTC 2017 ssl.sh: #10933: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:07 UTC 2017 ssl.sh: #10934: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:07 UTC 2017 ssl.sh: #10935: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:08 UTC 2017 ssl.sh: #10936: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:09 UTC 2017 ssl.sh: #10937: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:09 UTC 2017 ssl.sh: #10938: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:10 UTC 2017 ssl.sh: #10939: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:11 UTC 2017 ssl.sh: #10940: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:11 UTC 2017 ssl.sh: #10941: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:12 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10942: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:13 UTC 2017 ssl.sh: #10943: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:13 UTC 2017 ssl.sh: #10944: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:14 UTC 2017 ssl.sh: #10945: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:14 UTC 2017 ssl.sh: #10946: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:15 UTC 2017 ssl.sh: #10947: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:16 UTC 2017 ssl.sh: #10948: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:16 UTC 2017 ssl.sh: #10949: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:17 UTC 2017 ssl.sh: #10950: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:18 UTC 2017 ssl.sh: #10951: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:18 UTC 2017 ssl.sh: #10952: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:19 UTC 2017 ssl.sh: #10953: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:20 UTC 2017 ssl.sh: #10954: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:20 UTC 2017 ssl.sh: #10955: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:21 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10956: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:22 UTC 2017 ssl.sh: #10957: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:22 UTC 2017 ssl.sh: #10958: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:23 UTC 2017 ssl.sh: #10959: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:23 UTC 2017 ssl.sh: #10960: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:24 UTC 2017 ssl.sh: #10961: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:25 UTC 2017 ssl.sh: #10962: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:25 UTC 2017 ssl.sh: #10963: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:26 UTC 2017 ssl.sh: #10964: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:27 UTC 2017 ssl.sh: #10965: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:27 UTC 2017 ssl.sh: #10966: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:28 UTC 2017 ssl.sh: #10967: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:29 UTC 2017 ssl.sh: #10968: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4745 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4745 found at Fri Mar 31 19:01:30 UTC 2017 ssl.sh: #10969: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 4745 at Fri Mar 31 19:01:30 UTC 2017 kill -USR1 4745 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 4745 killed at Fri Mar 31 19:01:30 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:01:30 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:01:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:01:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #10970: Server never started - PASSED kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:36 UTC 2017 selfserv_9626 with PID 6212 started at Fri Mar 31 19:01:36 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:37 UTC 2017 ssl.sh: #10971: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:37 UTC 2017 ssl.sh: #10972: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:38 UTC 2017 ssl.sh: #10973: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:39 UTC 2017 ssl.sh: #10974: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:39 UTC 2017 ssl.sh: #10975: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:40 UTC 2017 ssl.sh: #10976: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:41 UTC 2017 ssl.sh: #10977: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:41 UTC 2017 ssl.sh: #10978: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:42 UTC 2017 ssl.sh: #10979: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:42 UTC 2017 ssl.sh: #10980: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:43 UTC 2017 ssl.sh: #10981: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:44 UTC 2017 ssl.sh: #10982: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:45 UTC 2017 ssl.sh: #10983: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:45 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10984: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:46 UTC 2017 ssl.sh: #10985: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:46 UTC 2017 ssl.sh: #10986: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:47 UTC 2017 ssl.sh: #10987: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:48 UTC 2017 ssl.sh: #10988: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:48 UTC 2017 ssl.sh: #10989: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:49 UTC 2017 ssl.sh: #10990: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:50 UTC 2017 ssl.sh: #10991: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:50 UTC 2017 ssl.sh: #10992: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:51 UTC 2017 ssl.sh: #10993: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:51 UTC 2017 ssl.sh: #10994: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:52 UTC 2017 ssl.sh: #10995: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:53 UTC 2017 ssl.sh: #10996: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:54 UTC 2017 ssl.sh: #10997: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:54 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10998: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:55 UTC 2017 ssl.sh: #10999: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:55 UTC 2017 ssl.sh: #11000: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:56 UTC 2017 ssl.sh: #11001: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:57 UTC 2017 ssl.sh: #11002: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:57 UTC 2017 ssl.sh: #11003: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:58 UTC 2017 ssl.sh: #11004: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:59 UTC 2017 ssl.sh: #11005: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:01:59 UTC 2017 ssl.sh: #11006: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:02:00 UTC 2017 ssl.sh: #11007: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:02:01 UTC 2017 ssl.sh: #11008: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:02:01 UTC 2017 ssl.sh: #11009: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:02:02 UTC 2017 ssl.sh: #11010: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6212 found at Fri Mar 31 19:02:03 UTC 2017 ssl.sh: #11011: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 6212 at Fri Mar 31 19:02:03 UTC 2017 kill -USR1 6212 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6212 killed at Fri Mar 31 19:02:03 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:02:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:02:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:02:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #11012: Server never started - PASSED kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:09 UTC 2017 selfserv_9626 with PID 7664 started at Fri Mar 31 19:02:09 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:10 UTC 2017 ssl.sh: #11013: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:10 UTC 2017 ssl.sh: #11014: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:11 UTC 2017 ssl.sh: #11015: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:12 UTC 2017 ssl.sh: #11016: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:12 UTC 2017 ssl.sh: #11017: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:13 UTC 2017 ssl.sh: #11018: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:14 UTC 2017 ssl.sh: #11019: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:14 UTC 2017 ssl.sh: #11020: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:15 UTC 2017 ssl.sh: #11021: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:16 UTC 2017 ssl.sh: #11022: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:16 UTC 2017 ssl.sh: #11023: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:17 UTC 2017 ssl.sh: #11024: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:18 UTC 2017 ssl.sh: #11025: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:18 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #11026: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:19 UTC 2017 ssl.sh: #11027: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:19 UTC 2017 ssl.sh: #11028: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:20 UTC 2017 ssl.sh: #11029: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:21 UTC 2017 ssl.sh: #11030: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:21 UTC 2017 ssl.sh: #11031: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:22 UTC 2017 ssl.sh: #11032: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:23 UTC 2017 ssl.sh: #11033: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:23 UTC 2017 ssl.sh: #11034: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:24 UTC 2017 ssl.sh: #11035: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:25 UTC 2017 ssl.sh: #11036: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:25 UTC 2017 ssl.sh: #11037: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:26 UTC 2017 ssl.sh: #11038: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:27 UTC 2017 ssl.sh: #11039: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:27 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #11040: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:28 UTC 2017 ssl.sh: #11041: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:28 UTC 2017 ssl.sh: #11042: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:29 UTC 2017 ssl.sh: #11043: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:30 UTC 2017 ssl.sh: #11044: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:30 UTC 2017 ssl.sh: #11045: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:31 UTC 2017 ssl.sh: #11046: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:32 UTC 2017 ssl.sh: #11047: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:32 UTC 2017 ssl.sh: #11048: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:33 UTC 2017 ssl.sh: #11049: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:34 UTC 2017 ssl.sh: #11050: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:34 UTC 2017 ssl.sh: #11051: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:35 UTC 2017 ssl.sh: #11052: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7664 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7664 found at Fri Mar 31 19:02:36 UTC 2017 ssl.sh: #11053: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 7664 at Fri Mar 31 19:02:36 UTC 2017 kill -USR1 7664 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7664 killed at Fri Mar 31 19:02:36 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:02:36 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:02:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:02:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #11054: Server never started - PASSED kill -0 9108 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9108 found at Fri Mar 31 19:02:42 UTC 2017 selfserv_9626 with PID 9108 started at Fri Mar 31 19:02:42 UTC 2017 trying to kill selfserv_9626 with PID 9108 at Fri Mar 31 19:02:42 UTC 2017 kill -USR1 9108 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9108 killed at Fri Mar 31 19:02:43 UTC 2017 TIMESTAMP ssl END: Fri Mar 31 19:02:43 UTC 2017 Running tests for merge TIMESTAMP merge BEGIN: Fri Mar 31 19:02:43 UTC 2017 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/tests.v3.2460 -t Test2 -f ../tests.pw merge.sh: #11055: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id dave --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #11056: Merging Dave - PASSED merge.sh: Merging in new user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id server --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #11057: Merging server - PASSED merge.sh: Merging in new chain certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id ext_client --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #11058: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict1 --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #11059: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict2 --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #11060: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:19:48 2017 Not After : Thu Mar 31 14:19:48 2022 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:94:b7:d4:83:d7:a1:15:8e:2c:3d:f1:67:58:5e:20: f0:d3:10:df:b3:21:e1:50:6b:94:0c:f7:53:c8:0b:56: 5b:f7:fb:3b:16:6b:3e:a9:4d:5f:6e:67:37:c7:41:2c: b7:8e:6b:66:ae:79:07:0b:6f:38:8b:73:ee:bb:8d:72: a7:43:34:79:a3:41:2c:c3:7a:88:67:ee:af:cc:01:6c: df:50:62:e0:11:93:8e:49:76:da:a8:0f:97:a5:c3:68: a8:32:17:76:51:39:33:15:ee:d7:bf:6e:df:75:34:d3: d8:58:f9:c1:7d:7a:00:61:76:c7:c9:64:bd:ae:7f:31: 87:a0:46:9f:6f:77:eb:e5:86:34:e9:74:3a:f3:6b:31: 7c:b7:fd:81:b1:cf:a1:bf:32:c2:cd:8c:9c:15:eb:b1: 62:e9:cc:80:64:7b:b9:34:84:9f:c8:15:e6:5c:bf:a6: 59:22:4c:ec:db:b9:88:25:5d:e5:22:3c:e5:cf:0b:60: 98:5c:eb:b0:fb:e1:17:3e:8c:65:71:81:69:b3:4a:c2: 36:6d:ea:c8:91:e3:79:42:6f:97:85:c8:cd:dd:90:a8: 67:95:9a:9d:bb:1b:0b:8f:2b:37:08:81:c5:5c:2e:db: 1c:f2:de:cf:b9:d5:7f:34:78:9f:77:df:71:37:62:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:31:61:a3:6a:de:5b:7a:05:02:7f:30:99:55:b7:f5: 48:f3:18:a3:43:38:5b:4a:c8:8f:41:c7:8b:28:02:ae: 73:92:ef:c7:ef:71:a5:13:e9:4b:6e:5c:7e:c2:b6:67: 18:19:ae:c5:02:f2:4c:18:07:ce:c2:3f:9f:61:62:2e: cb:ea:81:7c:59:06:da:96:0b:76:0c:00:54:b2:a3:c5: 92:73:81:18:77:58:3a:9e:3e:5d:b2:de:47:77:4f:98: c4:ef:f5:e4:f6:a1:ad:8f:1d:66:41:81:96:9e:bc:56: 4e:af:2f:e6:7e:cd:59:03:6e:25:a6:01:b9:cf:9e:fe: 48:e6:0e:b6:f8:94:42:d7:37:b3:1e:03:be:93:05:a4: 9b:03:11:b8:54:2e:d3:43:1b:5e:21:76:2c:1b:05:bb: f1:4e:c6:2e:20:ea:03:8c:ec:31:06:74:df:9e:1a:68: fa:ca:29:53:c6:37:c9:70:a9:69:17:6f:e7:56:eb:3a: c4:58:a9:06:35:0e:4d:e6:48:fc:71:ca:4a:06:8b:b9: 1c:8f:77:0b:d1:f4:f5:5b:c7:57:6e:59:11:1c:27:f5: 23:58:56:96:ff:32:62:e0:c6:32:52:0f:bd:5b:1f:d9: 18:57:6c:d1:ae:89:5e:4c:08:57:d2:16:66:1f:29:bd Fingerprint (SHA-256): 7C:60:48:87:6D:EE:6D:53:B1:60:D9:AA:99:CB:01:E2:19:DA:62:66:12:D7:CC:F7:B8:5F:C3:EC:EA:2A:69:A1 Fingerprint (SHA1): FD:B3:7E:B1:02:E4:33:52:4E:D7:E6:2D:45:88:AA:6B:76:20:05:2B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #11061: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 14:20:09 2017 Not After : Thu Mar 31 14:20:09 2022 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:76:c8:a9:8f:f9:b0:b4:77:50:66:c3:a7:12:14:5b: 51:45:4f:e1:cf:40:96:f1:9a:43:e0:63:8d:49:a2:66: e0:42:39:35:ed:9d:b9:3a:99:ec:70:c2:fd:4d:31:aa: 78:d0:50:60:3c:f2:d3:05:1a:62:02:71:fd:28:b5:ae: 4f:5e:bd:64:7a:43:12:0c:ec:46:20:f7:07:c2:40:6e: 2b:00:6d:41:1d:8e:8d:c8:26:3b:5c:e1:15:34:8d:11: 08:1f:4b:3e:d7:de:a4:1a:d1:fd:bc:3a:41:c9:5e:e1: a0:6b:66:75:8a:6a:6d:06:02:e8:f3:2b:06:de:f3:cd: a4:12:69:63:a1:bc:bb:ee:ea:39:96:d0:1a:a2:bd:88: ab:17:b1:bf:0f:fe:02:29:b3:31:dc:a3:5f:38:eb:66: 14:f9:d3:f3:ac:f9:de:74:c0:95:c4:63:95:71:7f:5b: c7:8d:26:73:e1:50:66:7b:5a:fe:81:01:67:99:27:28: 8a:d5:3d:40:df:f7:6f:e6:b0:89:cc:4d:f1:8a:92:65: 96:05:10:a9:60:55:2c:bb:da:50:b6:31:4c:55:83:37: d0:8f:8c:1a:4c:34:ea:06:21:a1:04:08:59:e2:8b:51: bb:85:6e:22:5b:e8:06:1a:ab:ed:a7:45:47:d1:6e:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:c1:db:34:90:99:23:b5:43:98:44:39:b4:33:b8:76: ea:1e:a6:e5:90:a4:2c:d5:c1:10:0a:1c:c1:bb:3c:f9: aa:5d:28:1f:57:ae:fd:05:3a:27:e7:e3:5a:34:14:5a: ea:22:18:47:54:14:b5:86:88:af:ef:4d:d8:b2:20:27: 9e:b6:f5:db:b7:ad:a2:2b:55:89:69:0e:9a:d5:37:ac: 70:92:35:f7:e9:f9:82:e7:f2:b8:b0:3b:68:f7:35:17: 88:c0:14:14:2d:19:e6:e5:3a:6f:0e:ea:5b:11:c6:67: fa:c8:1a:7c:44:1a:35:e2:59:e6:8a:d9:ba:1e:fe:f3: 56:a6:f5:d9:f7:9f:6d:1e:e3:52:a9:29:c9:de:6f:12: a9:78:03:84:cc:c7:e7:c8:d8:ec:75:bf:50:20:c9:43: 60:9f:16:fd:9c:a7:d6:d4:9f:52:89:c9:fb:e3:8b:59: fc:94:ba:c7:8b:47:eb:8a:57:2d:af:d6:bd:d2:14:6e: 7f:14:35:26:8e:44:5d:fd:0c:a9:a5:24:8f:36:44:aa: 4f:ce:d6:3f:10:1d:87:34:be:49:7a:ba:f4:cb:9b:83: 09:3b:b2:05:34:28:3d:83:9e:12:06:81:6f:cf:c4:ab: 7a:10:9e:70:f8:96:54:52:38:cb:76:b3:20:65:c8:30 Fingerprint (SHA-256): 3C:4A:31:79:CE:B8:98:1C:F0:3D:EE:3E:12:8D:86:B0:B8:02:18:5F:87:BD:A6:68:C6:97:C9:92:9B:49:00:3E Fingerprint (SHA1): AE:B2:1C:6B:79:BD:F3:0C:63:0C:18:51:5D:BC:B6:EB:9C:7A:C9:55 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #11062: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id sdr --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #11063: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA-dsa CT,C,C Alice u,u,u Alice-dsamixed u,u,u Alice-ec u,u,u bob@bogus.com ,, Dave u,u,u eve@bogus.com ,, bob-ec@bogus.com ,, Dave-ec u,u,u TestCA CT,C,C TestCA-ec CT,C,C Alice-dsa u,u,u Alice-ecmixed u,u,u Dave-dsamixed u,u,u Dave-dsa u,u,u Dave-ecmixed u,u,u localhost.localdomain u,u,u localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u localhost-sni.localdomain-dsa u,u,u localhost-sni.localdomain-ecmixed u,u,u localhost.localdomain-dsa u,u,u localhost.localdomain-ecmixed u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-dsamixed u,u,u localhost-sni.localdomain-ec u,u,u ExtendedSSLUser-dsa u,u,u serverCA-dsa C,C,C ExtendedSSLUser-ecmixed u,u,u clientCA-ec T,C,C chain-2-clientCA-ec ,, chain-1-clientCA-dsa ,, chain-2-clientCA ,, clientCA T,C,C ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-dsamixed u,u,u ExtendedSSLUser-ec u,u,u serverCA-ec C,C,C chain-1-clientCA ,, clientCA-dsa T,C,C chain-2-clientCA-dsa ,, chain-1-clientCA-ec ,, Alice #1 ,, Alice #2 ,, Alice #99 ,, Alice #3 ,, Alice #100 ,, Alice #4 ,, CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/tests.v3.2460 -t Test2 -f ../tests.pw merge.sh: #11064: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/tests.v1.2460 -t Test1 -f ../tests.pw merge.sh: #11065: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #11066: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #11067: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #11068: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Fri Mar 31 14:22:15 2017 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Fri Mar 31 14:07:55 2017 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Fri Mar 31 14:22:08 2017 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #11069: Verifying TestCA CRL - PASSED TEST_MODE=UPGRADE_DB NSS_DEFAULT_DB_TYPE=sql TIMESTAMP merge END: Fri Mar 31 19:03:03 UTC 2017 Running tests for ec TIMESTAMP ec BEGIN: Fri Mar 31 19:03:03 UTC 2017 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Fri Mar 31 19:03:03 UTC 2017 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #11070: ec(perf) test - PASSED TIMESTAMP ecperf END: Fri Mar 31 19:03:04 UTC 2017 Running ec tests for ectest TIMESTAMP ectest BEGIN: Fri Mar 31 19:03:04 UTC 2017 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #11071: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #11072: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #11073: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #11074: ec test certutil keygen - secp521r1 - PASSED 32 256 generic 8164351eae73f29b7e5cc8a037e55c2b71ca2c656dc3210b72dd58c1dff882c2 okay (OID 208) - PK11 test 48 384 generic 4f0e97f19e500bf5545802f0b4f4a0dd7f57b099a0fba003cdacaebc82dc019d2fae574b63c891075d3a7bdf6324aa14 okay (OID 220) - PK11 test 66 528 generic 01d5d5531ab7d19352f1044d482524236819142e31d9d2b2272801355ada126bce7730aba6aaf3ac591ee89e79580cf652ef1804df9301472a0fb9ca4ed03babacf4 okay (OID 221) - PK11 test ectest.sh: #11075: pk11 ec tests - PASSED TIMESTAMP ectest END: Fri Mar 31 19:03:08 UTC 2017 TIMESTAMP ec END: Fri Mar 31 19:03:08 UTC 2017 Running tests for gtests TIMESTAMP gtests BEGIN: Fri Mar 31 19:03:08 UTC 2017 gtests: der_gtest pk11_gtest gtests.sh: der_gtest =============================== executing der_gtest [==========] Running 16 tests from 2 test cases. [----------] Global test environment set-up. [----------] 13 tests from DERIntegerDecodingTest [ RUN ] DERIntegerDecodingTest.DecodeLongMinus126 [ OK ] DERIntegerDecodingTest.DecodeLongMinus126 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130 [ OK ] DERIntegerDecodingTest.DecodeLong130 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130Padded [ OK ] DERIntegerDecodingTest.DecodeLong130Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong0 [ OK ] DERIntegerDecodingTest.DecodeLong0 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong1 [ OK ] DERIntegerDecodingTest.DecodeLong1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1Padded [ OK ] DERIntegerDecodingTest.DecodeLongMinus1Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMax [ OK ] DERIntegerDecodingTest.DecodeLongMax (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMin [ OK ] DERIntegerDecodingTest.DecodeLongMin (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinPlus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxPlus1 (0 ms) [----------] 13 tests from DERIntegerDecodingTest (5 ms total) [----------] 3 tests from DERPrivateKeyImportTest [ RUN ] DERPrivateKeyImportTest.ImportPrivateRSAKey [ OK ] DERPrivateKeyImportTest.ImportPrivateRSAKey (1 ms) [ RUN ] DERPrivateKeyImportTest.ImportInvalidPrivateKey [ OK ] DERPrivateKeyImportTest.ImportInvalidPrivateKey (0 ms) [ RUN ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey [ OK ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey (0 ms) [----------] 3 tests from DERPrivateKeyImportTest (2 ms total) [----------] Global test environment tear-down [==========] 16 tests from 2 test cases ran. (8 ms total) [ PASSED ] 16 tests. gtests.sh: #11076: der_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/der_gtest/report.xml executing sed to parse the xml report processing the parsed report gtests.sh: #11077: 'DERIntegerDecodingTest: DecodeLongMinus126' - PASSED gtests.sh: #11078: 'DERIntegerDecodingTest: DecodeLong130' - PASSED gtests.sh: #11079: 'DERIntegerDecodingTest: DecodeLong130Padded' - PASSED gtests.sh: #11080: 'DERIntegerDecodingTest: DecodeLong0' - PASSED gtests.sh: #11081: 'DERIntegerDecodingTest: DecodeLong1' - PASSED gtests.sh: #11082: 'DERIntegerDecodingTest: DecodeLongMinus1' - PASSED gtests.sh: #11083: 'DERIntegerDecodingTest: DecodeLongMinus1Padded' - PASSED gtests.sh: #11084: 'DERIntegerDecodingTest: DecodeLongMax' - PASSED gtests.sh: #11085: 'DERIntegerDecodingTest: DecodeLongMin' - PASSED gtests.sh: #11086: 'DERIntegerDecodingTest: DecodeLongMaxMinus1' - PASSED gtests.sh: #11087: 'DERIntegerDecodingTest: DecodeLongMinPlus1' - PASSED gtests.sh: #11088: 'DERIntegerDecodingTest: DecodeLongMinMinus1' - PASSED gtests.sh: #11089: 'DERIntegerDecodingTest: DecodeLongMaxPlus1' - PASSED gtests.sh: #11090: 'DERPrivateKeyImportTest: ImportPrivateRSAKey' - PASSED gtests.sh: #11091: 'DERPrivateKeyImportTest: ImportInvalidPrivateKey' - PASSED gtests.sh: #11092: 'DERPrivateKeyImportTest: ImportZeroLengthPrivateKey' - PASSED gtests.sh: pk11_gtest =============================== executing pk11_gtest [==========] Running 11 tests from 5 test cases. [----------] Global test environment set-up. [----------] 6 tests from Pkcs11AESKeyWrapTest [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest1 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest1 (0 ms) [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest2 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest2 (0 ms) [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest3 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest3 (1 ms) [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest4 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest4 (0 ms) [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest5 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest5 (0 ms) [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest6 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest6 (0 ms) [----------] 6 tests from Pkcs11AESKeyWrapTest (4 ms total) [----------] 1 test from Pkcs11ExportTest [ RUN ] Pkcs11ExportTest.DeriveNonExport [ OK ] Pkcs11ExportTest.DeriveNonExport (1 ms) [----------] 1 test from Pkcs11ExportTest (1 ms total) [----------] 1 test from TlsPrfTest [ RUN ] TlsPrfTest.ExtendedMsParamErr [ OK ] TlsPrfTest.ExtendedMsParamErr (1 ms) [----------] 1 test from TlsPrfTest (1 ms total) [----------] 1 test from Pkcs11RsaPssTest [ RUN ] Pkcs11RsaPssTest.GenerateAndSignAndVerify [ OK ] Pkcs11RsaPssTest.GenerateAndSignAndVerify (796 ms) [----------] 1 test from Pkcs11RsaPssTest (797 ms total) [----------] 2 tests from Pkcs11RsaPssVectorTest [ RUN ] Pkcs11RsaPssVectorTest.VerifyKnownSignature1 [ OK ] Pkcs11RsaPssVectorTest.VerifyKnownSignature1 (0 ms) [ RUN ] Pkcs11RsaPssVectorTest.VerifyKnownSignature2 [ OK ] Pkcs11RsaPssVectorTest.VerifyKnownSignature2 (2 ms) [----------] 2 tests from Pkcs11RsaPssVectorTest (3 ms total) [----------] Global test environment tear-down [==========] 11 tests from 5 test cases ran. (808 ms total) [ PASSED ] 11 tests. gtests.sh: #11093: pk11_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/upgradedb/pk11_gtest/report.xml executing sed to parse the xml report processing the parsed report gtests.sh: #11094: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest1' - PASSED gtests.sh: #11095: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest2' - PASSED gtests.sh: #11096: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest3' - PASSED gtests.sh: #11097: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest4' - PASSED gtests.sh: #11098: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest5' - PASSED gtests.sh: #11099: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest6' - PASSED gtests.sh: #11100: 'Pkcs11ExportTest: DeriveNonExport' - PASSED gtests.sh: #11101: 'TlsPrfTest: ExtendedMsParamErr' - PASSED gtests.sh: #11102: 'Pkcs11RsaPssTest: GenerateAndSignAndVerify' - PASSED gtests.sh: #11103: 'Pkcs11RsaPssVectorTest: VerifyKnownSignature1' - PASSED gtests.sh: #11104: 'Pkcs11RsaPssVectorTest: VerifyKnownSignature2' - PASSED TIMESTAMP gtests END: Fri Mar 31 19:03:11 UTC 2017 Running tests for ssl_gtests TIMESTAMP ssl_gtests BEGIN: Fri Mar 31 19:03:11 UTC 2017 ssl_gtest.sh: SSL Gtests =============================== ssl_gtest.sh: #11105: create ssl_gtest database - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #11106: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #11107: create certificate: sign kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #11108: create certificate: sign kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #11109: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #11110: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #11111: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #11112: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #11113: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #11114: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #11115: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #11116: create certificate: ca - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #11117: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #11118: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #11119: create certificate: sign - PASSED executing ssl_gtest [==========] Running 785 tests from 14 test cases. [----------] Global test environment set-up. [----------] 60 tests from CipherSuiteRC4/TlsCipherSuiteTest [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/0 (374 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/1 (88 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/2 (104 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/3 (138 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/4 (97 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/5 (76 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/6 (89 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/7 (99 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/8 (137 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/9 (96 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/10 (75 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/11 (88 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/12 (98 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/13 (137 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/14 (96 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/0 (174 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/1 (221 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/2 (231 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/3 (296 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/4 (240 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/5 (174 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/6 (221 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/7 (232 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/8 (294 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/9 (239 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/10 (173 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/11 (220 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/12 (231 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/13 (294 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/14 (238 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/0 (78 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/1 (90 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/2 (100 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/3 (139 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/4 (98 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/5 (79 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/6 (90 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/7 (100 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/8 (139 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/9 (98 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/10 (78 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/11 (90 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/12 (100 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/13 (140 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/14 (98 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/0 (77 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/1 (88 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/2 (98 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/3 (137 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/4 (96 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/5 (76 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/6 (88 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/7 (99 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/8 (138 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/9 (97 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/10 (76 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/11 (88 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/12 (98 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/13 (138 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/14 (97 ms) [----------] 60 tests from CipherSuiteRC4/TlsCipherSuiteTest (8305 ms total) [----------] 48 tests from CipherSuiteAEAD12/TlsCipherSuiteTest [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/0 (77 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/1 (77 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/2 (284 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/3 (283 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/4 (100 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/5 (98 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/6 (76 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/7 (77 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/8 (285 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/9 (286 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/10 (101 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/11 (98 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/0 (173 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/1 (175 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/2 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/3 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/4 (234 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/5 (242 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/6 (174 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/7 (175 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/8 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/9 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/10 (236 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/11 (243 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/0 (78 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/1 (79 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/2 (285 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/3 (285 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/4 (101 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/5 (99 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/6 (78 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/7 (79 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/8 (286 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/9 (286 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/10 (102 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/11 (100 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/0 (76 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/1 (77 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/2 (283 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/3 (284 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/4 (99 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/5 (98 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/6 (77 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/7 (78 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/8 (284 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/9 (284 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/10 (100 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/11 (98 ms) [----------] 48 tests from CipherSuiteAEAD12/TlsCipherSuiteTest (7231 ms total) [----------] 48 tests from CipherSuiteAEAD/TlsCipherSuiteTest [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/0 (99 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/1 (99 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/2 (96 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/3 (96 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/4 (175 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/5 (176 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/6 (98 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/7 (99 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/8 (96 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/9 (97 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/10 (176 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/11 (178 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/0 (230 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/1 (231 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/2 (239 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/3 (240 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/4 (349 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/5 (368 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/6 (231 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/7 (233 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/8 (239 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/9 (240 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/10 (319 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/11 (321 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/0 (100 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/1 (100 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/2 (98 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/3 (98 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/4 (177 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/5 (179 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/6 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/6 (100 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/7 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/7 (101 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/8 (97 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/9 (101 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/10 (179 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/11 (179 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/0 (98 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/1 (99 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/2 (97 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/3 (97 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/4 (176 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/5 (177 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/6 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/6 (98 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/7 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/7 (99 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/8 (97 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/9 (97 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/10 (177 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/11 (179 ms) [----------] 48 tests from CipherSuiteAEAD/TlsCipherSuiteTest (7748 ms total) [----------] 64 tests from CipherSuiteCBC12/TlsCipherSuiteTest [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/0 (177 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/1 (77 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/2 (98 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/3 (97 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/4 (177 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/5 (77 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/6 (282 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/7 (283 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/8 (177 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/9 (77 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/10 (99 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/11 (97 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/12 (176 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/13 (76 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/14 (284 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/15 (283 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/0 (319 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/1 (174 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/2 (232 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/3 (240 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/4 (320 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/5 (174 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/6 (5 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/7 (5 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/8 (320 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/9 (175 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/10 (231 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/11 (240 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/12 (317 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/13 (174 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/14 (5 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/15 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/0 (178 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/1 (79 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/2 (101 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/3 (98 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/4 (177 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/5 (78 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/6 (286 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/7 (285 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/8 (180 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/9 (79 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/10 (101 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/11 (99 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/12 (187 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/13 (79 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/14 (286 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/15 (286 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/0 (176 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/1 (75 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/2 (94 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/3 (92 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/4 (171 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/5 (72 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/6 (280 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/7 (284 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/8 (179 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/9 (77 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/10 (99 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/11 (97 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/12 (177 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/13 (77 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/14 (283 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/15 (286 ms) [----------] 64 tests from CipherSuiteCBC12/TlsCipherSuiteTest (10589 ms total) [----------] 192 tests from CipherSuiteCBCStream/TlsCipherSuiteTest [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/0 (87 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/1 (89 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/2 (89 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/3 (89 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/4 (98 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/5 (99 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/6 (99 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/7 (99 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/8 (137 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/9 (138 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/10 (138 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/11 (139 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/12 (96 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/13 (97 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/14 (97 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/15 (97 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/16 (88 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/17 (89 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/18 (89 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/19 (89 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/20 (98 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/21 (99 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/22 (99 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/23 (99 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/24 (138 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/25 (139 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/26 (139 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/27 (138 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/28 (96 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/29 (97 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/30 (97 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/31 (97 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/32 (87 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/33 (88 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/34 (88 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/35 (89 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/36 (98 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/37 (98 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/38 (98 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/39 (98 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/40 (137 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/41 (138 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/42 (137 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/43 (138 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/44 (96 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/45 (96 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/46 (96 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/47 (96 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/0 (219 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/1 (221 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/2 (221 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/3 (222 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/4 (230 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/5 (232 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/6 (233 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/7 (232 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/8 (293 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/9 (296 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/10 (296 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/11 (296 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/12 (238 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/13 (240 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/14 (241 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/15 (241 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/16 (220 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/17 (222 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/18 (220 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/19 (221 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/20 (230 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/21 (232 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/22 (232 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/23 (232 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/24 (294 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/25 (296 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/26 (296 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/27 (296 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/28 (238 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/29 (240 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/30 (240 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/31 (241 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/32 (219 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/33 (221 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/34 (221 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/35 (222 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/36 (230 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/37 (232 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/38 (232 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/39 (232 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/40 (294 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/41 (296 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/42 (296 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/43 (296 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/44 (239 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/45 (241 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/46 (240 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/47 (240 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/0 (89 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/1 (90 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/2 (90 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/3 (90 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/4 (99 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/5 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/6 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/7 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/8 (139 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/9 (140 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/10 (139 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/11 (139 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/12 (98 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/13 (98 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/14 (99 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/15 (98 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/16 (89 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/17 (91 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/18 (90 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/19 (90 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/20 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/21 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/22 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/23 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/24 (139 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/25 (140 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/26 (136 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/27 (140 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/28 (97 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/29 (99 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/30 (99 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/31 (99 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/32 (89 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/33 (90 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/34 (90 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/35 (90 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/36 (99 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/37 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/38 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/39 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/40 (138 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/41 (139 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/42 (139 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/43 (139 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/44 (97 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/45 (99 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/46 (98 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/47 (98 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/0 (88 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/1 (88 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/2 (88 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/3 (89 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/4 (98 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/5 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/6 (99 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/7 (99 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/8 (137 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/9 (138 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/10 (139 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/11 (138 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/12 (96 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/13 (97 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/14 (96 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/15 (97 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/16 (87 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/17 (88 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/18 (88 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/19 (88 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/20 (98 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/21 (99 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/22 (98 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/23 (99 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/24 (137 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/25 (138 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/26 (138 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/27 (138 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/28 (96 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/29 (97 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/30 (97 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/31 (97 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/32 (88 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/33 (89 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/34 (88 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/35 (88 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/36 (98 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/37 (99 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/38 (98 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/39 (99 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/40 (137 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/41 (138 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/42 (138 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/43 (138 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/44 (96 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/45 (97 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/46 (97 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/47 (97 ms) [----------] 192 tests from CipherSuiteCBCStream/TlsCipherSuiteTest (27175 ms total) [----------] 96 tests from CipherSuiteCBCDatagram/TlsCipherSuiteTest [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/0 (89 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/1 (89 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/2 (89 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/3 (99 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/4 (99 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/5 (99 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/6 (140 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/7 (139 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/8 (140 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/9 (98 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/10 (98 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/11 (97 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/12 (88 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/13 (88 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/14 (89 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/15 (99 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/16 (99 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/17 (99 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/18 (138 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/19 (139 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/20 (139 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/21 (97 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/22 (97 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/23 (97 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/0 (221 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/1 (222 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/2 (223 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/3 (233 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/4 (233 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/5 (233 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/6 (297 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/7 (297 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/8 (297 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/9 (241 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/10 (241 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/11 (241 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/12 (222 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/13 (222 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/14 (222 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/15 (232 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/16 (231 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/17 (232 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/18 (296 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/19 (296 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/20 (297 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/21 (240 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/22 (240 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/23 (240 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/0 (91 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/1 (91 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/2 (91 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/3 (101 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/4 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/5 (101 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/6 (141 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/7 (141 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/8 (141 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/9 (99 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/10 (99 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/11 (99 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/12 (90 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/13 (90 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/14 (90 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/15 (100 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/16 (100 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/17 (101 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/18 (141 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/19 (141 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/20 (140 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/21 (98 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/22 (98 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/23 (98 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/0 (89 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/1 (89 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/2 (89 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/3 (99 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/4 (99 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/5 (99 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/6 (139 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/7 (139 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/8 (139 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/9 (97 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/10 (97 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/11 (98 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/12 (89 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/13 (89 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/14 (89 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/15 (99 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/16 (98 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/17 (99 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/18 (139 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/19 (139 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/20 (139 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/21 (97 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/22 (97 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/23 (97 ms) [----------] 96 tests from CipherSuiteCBCDatagram/TlsCipherSuiteTest (13661 ms total) [----------] 7 tests from TestSecurityStatus/SecurityStatusTest [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/0 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/0 (96 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/1 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/1 (77 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/2 (97 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/3 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/3 (77 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/4 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/4 (77 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/5 (76 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/6 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/6 (77 ms) [----------] 7 tests from TestSecurityStatus/SecurityStatusTest (580 ms total) [----------] 72 tests from DamageYStream/TlsDamageDHYTest [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301c6bf5df37245624dc7c5aec46a187fb08149dd9f73c036e75092... record new: [1184] 020000510301c6bf5df37245624dc7c5aec46a187fb08149dd9f73c036e75092... server: Original packet: [1189] 16030104a0020000510301c6bf5df37245624dc7c5aec46a187fb08149dd9f73... server: Filtered packet: [1189] 16030104a0020000510301c6bf5df37245624dc7c5aec46a187fb08149dd9f73... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/0 (110 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/1 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301012b967ecb5644f767b32cfe99d2b4e79df2c8219454af33c008... record new: [1184] 020000510301012b967ecb5644f767b32cfe99d2b4e79df2c8219454af33c008... server: Original packet: [1189] 16030104a0020000510301012b967ecb5644f767b32cfe99d2b4e79df2c82194... server: Filtered packet: [1189] 16030104a0020000510301012b967ecb5644f767b32cfe99d2b4e79df2c82194... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/1 (94 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/2 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301aea005a79266328a04197235abbe2ab0e437f088a3aab96c5ab7... record new: [1184] 020000510301aea005a79266328a04197235abbe2ab0e437f088a3aab96c5ab7... server: Original packet: [1189] 16030104a0020000510301aea005a79266328a04197235abbe2ab0e437f088a3... server: Filtered packet: [1189] 16030104a0020000510301aea005a79266328a04197235abbe2ab0e437f088a3... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/2 (94 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301f504700257a2912891831dd661cfa4134512c3806cda4a5cb0ae... record new: [1184] 020000510301f504700257a2912891831dd661cfa4134512c3806cda4a5cb0ae... server: Original packet: [1189] 16030104a0020000510301f504700257a2912891831dd661cfa4134512c3806c... server: Filtered packet: [1189] 16030104a0020000510301f504700257a2912891831dd661cfa4134512c3806c... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/3 (96 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/4 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103010febdd56d207b7bed0798323d2138a41a05517e418582a537cdc... record new: [1184] 0200005103010febdd56d207b7bed0798323d2138a41a05517e418582a537cdc... server: Original packet: [1189] 16030104a00200005103010febdd56d207b7bed0798323d2138a41a05517e418... server: Filtered packet: [1189] 16030104a00200005103010febdd56d207b7bed0798323d2138a41a05517e418... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/4 (108 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/5 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301063972eb1bbfdae750e7483be4e1370f7d47680e821c8c857053... record new: [1184] 020000510301063972eb1bbfdae750e7483be4e1370f7d47680e821c8c857053... server: Original packet: [1189] 16030104a0020000510301063972eb1bbfdae750e7483be4e1370f7d47680e82... server: Filtered packet: [1189] 16030104a0020000510301063972eb1bbfdae750e7483be4e1370f7d47680e82... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/5 (94 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103018e3c74c31e4c7610316dc2fc6626f347181effbd4ee0b6b1aaf9... record new: [1184] 0200005103018e3c74c31e4c7610316dc2fc6626f347181effbd4ee0b6b1aaf9... server: Original packet: [1189] 16030104a00200005103018e3c74c31e4c7610316dc2fc6626f347181effbd4e... server: Filtered packet: [1189] 16030104a00200005103018e3c74c31e4c7610316dc2fc6626f347181effbd4e... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/6 (93 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103019799ed5db4e834c333d1815ae1f859c995d69b521433a3a7b82f... record new: [1184] 0200005103019799ed5db4e834c333d1815ae1f859c995d69b521433a3a7b82f... server: Original packet: [1189] 16030104a00200005103019799ed5db4e834c333d1815ae1f859c995d69b5214... server: Filtered packet: [1189] 16030104a00200005103019799ed5db4e834c333d1815ae1f859c995d69b5214... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/7 (95 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/8 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301ad75b03d7688a750285caf1d3453862dc129b1e9d1ba5340dd1e... record new: [1185] 020000510301ad75b03d7688a750285caf1d3453862dc129b1e9d1ba5340dd1e... server: Original packet: [1189] 16030104a0020000510301ad75b03d7688a750285caf1d3453862dc129b1e9d1... server: Filtered packet: [1190] 16030104a1020000510301ad75b03d7688a750285caf1d3453862dc129b1e9d1... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/8 (94 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/9 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301f1a1fe64851b352e1683571006087d34208bb7d75085a0deed3f... record new: [1185] 020000510301f1a1fe64851b352e1683571006087d34208bb7d75085a0deed3f... server: Original packet: [1189] 16030104a0020000510301f1a1fe64851b352e1683571006087d34208bb7d750... server: Filtered packet: [1190] 16030104a1020000510301f1a1fe64851b352e1683571006087d34208bb7d750... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/9 (94 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/10 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301857f6fde754f33b5a3e232bfaf32169237e09c0cad799dd0998b... record new: [1185] 020000510301857f6fde754f33b5a3e232bfaf32169237e09c0cad799dd0998b... server: Original packet: [1189] 16030104a0020000510301857f6fde754f33b5a3e232bfaf32169237e09c0cad... server: Filtered packet: [1190] 16030104a1020000510301857f6fde754f33b5a3e232bfaf32169237e09c0cad... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/10 (94 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/11 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 02000051030176b68018b493c15fa6f4aee1656703e2361c16a22221946eab30... record new: [1185] 02000051030176b68018b493c15fa6f4aee1656703e2361c16a22221946eab30... server: Original packet: [1189] 16030104a002000051030176b68018b493c15fa6f4aee1656703e2361c16a222... server: Filtered packet: [1190] 16030104a102000051030176b68018b493c15fa6f4aee1656703e2361c16a222... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/11 (95 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/12 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103021bb09b23adc7f0415f46bdda59efe354446d4d2729437ea50f62... record new: [1184] 0200005103021bb09b23adc7f0415f46bdda59efe354446d4d2729437ea50f62... server: Original packet: [1189] 16030204a00200005103021bb09b23adc7f0415f46bdda59efe354446d4d2729... server: Filtered packet: [1189] 16030204a00200005103021bb09b23adc7f0415f46bdda59efe354446d4d2729... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/12 (94 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/13 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302fc4d7464f1caea1830e29a0209592a7156d3909139e8ff58c43b... record new: [1184] 020000510302fc4d7464f1caea1830e29a0209592a7156d3909139e8ff58c43b... server: Original packet: [1189] 16030204a0020000510302fc4d7464f1caea1830e29a0209592a7156d3909139... server: Filtered packet: [1189] 16030204a0020000510302fc4d7464f1caea1830e29a0209592a7156d3909139... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/13 (94 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/14 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302c72e264ba86afe91c4bc76a1f49d2234d4b5bf941c4c8c08604e... record new: [1184] 020000510302c72e264ba86afe91c4bc76a1f49d2234d4b5bf941c4c8c08604e... server: Original packet: [1189] 16030204a0020000510302c72e264ba86afe91c4bc76a1f49d2234d4b5bf941c... server: Filtered packet: [1189] 16030204a0020000510302c72e264ba86afe91c4bc76a1f49d2234d4b5bf941c... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/14 (94 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/15 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302420a20358ada6499e81e5220bfee8363399153689f18256da29a... record new: [1184] 020000510302420a20358ada6499e81e5220bfee8363399153689f18256da29a... server: Original packet: [1189] 16030204a0020000510302420a20358ada6499e81e5220bfee8363399153689f... server: Filtered packet: [1189] 16030204a0020000510302420a20358ada6499e81e5220bfee8363399153689f... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/15 (94 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/16 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302d97a02ca6a4c13c6e59729a45d0c86a2892066ee834d5669ae56... record new: [1184] 020000510302d97a02ca6a4c13c6e59729a45d0c86a2892066ee834d5669ae56... server: Original packet: [1189] 16030204a0020000510302d97a02ca6a4c13c6e59729a45d0c86a2892066ee83... server: Filtered packet: [1189] 16030204a0020000510302d97a02ca6a4c13c6e59729a45d0c86a2892066ee83... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/16 (95 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/17 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302702514056f6730fac93172e28535973466cbc931d861ea6af3f8... record new: [1184] 020000510302702514056f6730fac93172e28535973466cbc931d861ea6af3f8... server: Original packet: [1189] 16030204a0020000510302702514056f6730fac93172e28535973466cbc931d8... server: Filtered packet: [1189] 16030204a0020000510302702514056f6730fac93172e28535973466cbc931d8... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/17 (94 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/18 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302e01d6fdaa44e2eca48f365212b72350aa9994e645035d702f70a... record new: [1184] 020000510302e01d6fdaa44e2eca48f365212b72350aa9994e645035d702f70a... server: Original packet: [1189] 16030204a0020000510302e01d6fdaa44e2eca48f365212b72350aa9994e6450... server: Filtered packet: [1189] 16030204a0020000510302e01d6fdaa44e2eca48f365212b72350aa9994e6450... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/18 (94 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/19 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 02000051030253a1080186f11ebe6a9bc7ca829de07df00fdd5a9112587738b0... record new: [1184] 02000051030253a1080186f11ebe6a9bc7ca829de07df00fdd5a9112587738b0... server: Original packet: [1189] 16030204a002000051030253a1080186f11ebe6a9bc7ca829de07df00fdd5a91... server: Filtered packet: [1189] 16030204a002000051030253a1080186f11ebe6a9bc7ca829de07df00fdd5a91... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/19 (95 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/20 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302468bed3317fc97d3a65cac1edae7bff5da6cbb6f3cc423bf913f... record new: [1185] 020000510302468bed3317fc97d3a65cac1edae7bff5da6cbb6f3cc423bf913f... server: Original packet: [1189] 16030204a0020000510302468bed3317fc97d3a65cac1edae7bff5da6cbb6f3c... server: Filtered packet: [1190] 16030204a1020000510302468bed3317fc97d3a65cac1edae7bff5da6cbb6f3c... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/20 (94 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/21 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103024dd5aa6b4864142d5ed4b0e5e52109e84772b78dcca15f3be615... record new: [1185] 0200005103024dd5aa6b4864142d5ed4b0e5e52109e84772b78dcca15f3be615... server: Original packet: [1189] 16030204a00200005103024dd5aa6b4864142d5ed4b0e5e52109e84772b78dcc... server: Filtered packet: [1190] 16030204a10200005103024dd5aa6b4864142d5ed4b0e5e52109e84772b78dcc... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/21 (94 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/22 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103023710ddcb8ec0eb4010429640c74a76303c7ed76405b0a0179241... record new: [1185] 0200005103023710ddcb8ec0eb4010429640c74a76303c7ed76405b0a0179241... server: Original packet: [1189] 16030204a00200005103023710ddcb8ec0eb4010429640c74a76303c7ed76405... server: Filtered packet: [1190] 16030204a10200005103023710ddcb8ec0eb4010429640c74a76303c7ed76405... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/22 (97 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/23 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302663759ee8bbbd5cf65d834be1e08e4c227dcbe746d2a5c546db3... record new: [1185] 020000510302663759ee8bbbd5cf65d834be1e08e4c227dcbe746d2a5c546db3... server: Original packet: [1189] 16030204a0020000510302663759ee8bbbd5cf65d834be1e08e4c227dcbe746d... server: Filtered packet: [1190] 16030204a1020000510302663759ee8bbbd5cf65d834be1e08e4c227dcbe746d... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/23 (104 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/24 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 0200005103034818af1f7f80a793f58db5fe4473f8b1800eb01ff2f47108f378... record new: [1186] 0200005103034818af1f7f80a793f58db5fe4473f8b1800eb01ff2f47108f378... server: Original packet: [1191] 16030304a20200005103034818af1f7f80a793f58db5fe4473f8b1800eb01ff2... server: Filtered packet: [1191] 16030304a20200005103034818af1f7f80a793f58db5fe4473f8b1800eb01ff2... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/24 (105 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/25 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303d24fb9c2df43c41badd257e5989b9d62dc71088b3d11ada754ee... record new: [1186] 020000510303d24fb9c2df43c41badd257e5989b9d62dc71088b3d11ada754ee... server: Original packet: [1191] 16030304a2020000510303d24fb9c2df43c41badd257e5989b9d62dc71088b3d... server: Filtered packet: [1191] 16030304a2020000510303d24fb9c2df43c41badd257e5989b9d62dc71088b3d... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/25 (120 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/26 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 0200005103031feaa3b0f0ec0c4d9c572149a795df1cc30819246579823b978a... record new: [1186] 0200005103031feaa3b0f0ec0c4d9c572149a795df1cc30819246579823b978a... server: Original packet: [1191] 16030304a20200005103031feaa3b0f0ec0c4d9c572149a795df1cc308192465... server: Filtered packet: [1191] 16030304a20200005103031feaa3b0f0ec0c4d9c572149a795df1cc308192465... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/26 (132 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/27 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 02000051030323642b721ae8546eefe3b1399df6b33a3290c226bd9033ba9e44... record new: [1186] 02000051030323642b721ae8546eefe3b1399df6b33a3290c226bd9033ba9e44... server: Original packet: [1191] 16030304a202000051030323642b721ae8546eefe3b1399df6b33a3290c226bd... server: Filtered packet: [1191] 16030304a202000051030323642b721ae8546eefe3b1399df6b33a3290c226bd... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/27 (98 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/28 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303b76337ad74ff6b48a3af4f563a463f23dd07c3b85779922433ae... record new: [1186] 020000510303b76337ad74ff6b48a3af4f563a463f23dd07c3b85779922433ae... server: Original packet: [1191] 16030304a2020000510303b76337ad74ff6b48a3af4f563a463f23dd07c3b857... server: Filtered packet: [1191] 16030304a2020000510303b76337ad74ff6b48a3af4f563a463f23dd07c3b857... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/28 (109 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/29 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303e7525d110aa28bc76f6233085675108c2d4dc5b084aa8a62c01c... record new: [1186] 020000510303e7525d110aa28bc76f6233085675108c2d4dc5b084aa8a62c01c... server: Original packet: [1191] 16030304a2020000510303e7525d110aa28bc76f6233085675108c2d4dc5b084... server: Filtered packet: [1191] 16030304a2020000510303e7525d110aa28bc76f6233085675108c2d4dc5b084... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/29 (108 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/30 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 0200005103035aa8a517718ce0cc52502acb3d841fef19da1fc18871f6e8339d... record new: [1186] 0200005103035aa8a517718ce0cc52502acb3d841fef19da1fc18871f6e8339d... server: Original packet: [1191] 16030304a20200005103035aa8a517718ce0cc52502acb3d841fef19da1fc188... server: Filtered packet: [1191] 16030304a20200005103035aa8a517718ce0cc52502acb3d841fef19da1fc188... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/30 (107 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/31 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303a101ddb45203985532a25ce263528666e1ad5126227bf90d5ebc... record new: [1186] 020000510303a101ddb45203985532a25ce263528666e1ad5126227bf90d5ebc... server: Original packet: [1191] 16030304a2020000510303a101ddb45203985532a25ce263528666e1ad512622... server: Filtered packet: [1191] 16030304a2020000510303a101ddb45203985532a25ce263528666e1ad512622... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/31 (109 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/32 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 0200005103033ad567af80b4cc90633c1c8f13828f570b7458a9e42f78d10566... record new: [1187] 0200005103033ad567af80b4cc90633c1c8f13828f570b7458a9e42f78d10566... server: Original packet: [1191] 16030304a20200005103033ad567af80b4cc90633c1c8f13828f570b7458a9e4... server: Filtered packet: [1192] 16030304a30200005103033ad567af80b4cc90633c1c8f13828f570b7458a9e4... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/32 (108 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/33 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303724aa3c1370478ed549c70e099ac28b7f3faa30d712240a36eec... record new: [1187] 020000510303724aa3c1370478ed549c70e099ac28b7f3faa30d712240a36eec... server: Original packet: [1191] 16030304a2020000510303724aa3c1370478ed549c70e099ac28b7f3faa30d71... server: Filtered packet: [1192] 16030304a3020000510303724aa3c1370478ed549c70e099ac28b7f3faa30d71... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/33 (108 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/34 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303326789f20d6c2bd9acd2cc3d7dddeb5e0921105ec4c353af384c... record new: [1187] 020000510303326789f20d6c2bd9acd2cc3d7dddeb5e0921105ec4c353af384c... server: Original packet: [1191] 16030304a2020000510303326789f20d6c2bd9acd2cc3d7dddeb5e0921105ec4... server: Filtered packet: [1192] 16030304a3020000510303326789f20d6c2bd9acd2cc3d7dddeb5e0921105ec4... client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/34 (109 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/35 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303a6f02aaecf5bb6cd8cf15c8816c92a8b9b794ed263f613584c2d... record new: [1187] 020000510303a6f02aaecf5bb6cd8cf15c8816c92a8b9b794ed263f613584c2d... server: Original packet: [1191] 16030304a2020000510303a6f02aaecf5bb6cd8cf15c8816c92a8b9b794ed263... server: Filtered packet: [1192] 16030304a3020000510303a6f02aaecf5bb6cd8cf15c8816c92a8b9b794ed263... client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/35 (109 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100dee4d07c2c023124796cf07a5f419ddaf36bcabf76b9a80c6c12f736b78a... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100dee4d07c2c023124796cf07a5f419ddaf36bcabf76b9a80c6c12... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [326] 1603010106100001020100dee4d07c2c023124796cf07a5f419ddaf36bcabf76... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/0 (146 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/1 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01000645ecdc1ddd2422f31d0284f744111c5eda3e10f421bef11c55d7700ec0... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201000645ecdc1ddd2422f31d0284f744111c5eda3e10f421bef11c55... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [326] 16030101061000010201000645ecdc1ddd2422f31d0284f744111c5eda3e10f4... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/1 (146 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/2 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e88dbc3a4e1365e11197ad62cfee6bb7462fced7aa74b200d561df51f005... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100e88dbc3a4e1365e11197ad62cfee6bb7462fced7aa74b200d561... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [326] 1603010106100001020100e88dbc3a4e1365e11197ad62cfee6bb7462fced7aa... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/2 (147 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100938ddc857e56747dd28a3399c6d013e760b32bd55c55c645ff9361d4fc27... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100938ddc857e56747dd28a3399c6d013e760b32bd55c55c645ff93... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [326] 1603010106100001020100938ddc857e56747dd28a3399c6d013e760b32bd55c... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/3 (147 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/4 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100636d458d6b45192108ebd1d25a9227328a3c0a221279e264c5cd381a07af... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100636d458d6b45192108ebd1d25a9227328a3c0a221279e264c5cd... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [326] 1603010106100001020100636d458d6b45192108ebd1d25a9227328a3c0a2212... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/4 (146 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/5 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01000d6e63b095bd8d29291c7676070da1d26a01135aba84d21d6153e93df210... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 1000010201000d6e63b095bd8d29291c7676070da1d26a01135aba84d21d6153... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [326] 16030101061000010201000d6e63b095bd8d29291c7676070da1d26a01135aba... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/5 (146 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010071837d9956aabeec8d89780f0e8f7e507dba94852f463d9795a670aae484... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 10000102010071837d9956aabeec8d89780f0e8f7e507dba94852f463d9795a6... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [326] 160301010610000102010071837d9956aabeec8d89780f0e8f7e507dba94852f... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/6 (159 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010088c5cb39de4576708616fec80ff1e8c42b9d0c44fda5ba7de9dd53b6a44d... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 10000102010088c5cb39de4576708616fec80ff1e8c42b9d0c44fda5ba7de9dd... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [326] 160301010610000102010088c5cb39de4576708616fec80ff1e8c42b9d0c44fd... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/7 (160 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/8 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010056618450aa4ecd6d0735bae8a361e70dce98ba5dd90b114c9f6b5d61823d... handshake new: [259] 01010156618450aa4ecd6d0735bae8a361e70dce98ba5dd90b114c9f6b5d6182... record old: [262] 10000102010056618450aa4ecd6d0735bae8a361e70dce98ba5dd90b114c9f6b... record new: [263] 1000010301010156618450aa4ecd6d0735bae8a361e70dce98ba5dd90b114c9f... client: Original packet: [326] 160301010610000102010056618450aa4ecd6d0735bae8a361e70dce98ba5dd9... client: Filtered packet: [327] 16030101071000010301010156618450aa4ecd6d0735bae8a361e70dce98ba5d... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/8 (159 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/9 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010095e7f22fd128a7aa809b5c8f35a55d67e171fdb6700536ef4b785793d499... handshake new: [259] 01010195e7f22fd128a7aa809b5c8f35a55d67e171fdb6700536ef4b785793d4... record old: [262] 10000102010095e7f22fd128a7aa809b5c8f35a55d67e171fdb6700536ef4b78... record new: [263] 1000010301010195e7f22fd128a7aa809b5c8f35a55d67e171fdb6700536ef4b... client: Original packet: [326] 160301010610000102010095e7f22fd128a7aa809b5c8f35a55d67e171fdb670... client: Filtered packet: [327] 16030101071000010301010195e7f22fd128a7aa809b5c8f35a55d67e171fdb6... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/9 (160 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/10 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100bc6fb0d1b84f39c9d17d736d85f30b6b4e5bbb669ad253f24ae16e47956d... handshake new: [259] 010100bc6fb0d1b84f39c9d17d736d85f30b6b4e5bbb669ad253f24ae16e4795... record old: [262] 100001020100bc6fb0d1b84f39c9d17d736d85f30b6b4e5bbb669ad253f24ae1... record new: [263] 10000103010100bc6fb0d1b84f39c9d17d736d85f30b6b4e5bbb669ad253f24a... client: Original packet: [326] 1603010106100001020100bc6fb0d1b84f39c9d17d736d85f30b6b4e5bbb669a... client: Filtered packet: [327] 160301010710000103010100bc6fb0d1b84f39c9d17d736d85f30b6b4e5bbb66... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/10 (188 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/11 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d769d40a7e12c571d13f398a5f56162e8e6d3f32c55555a8b23b5e9e5e08... handshake new: [259] 010100d769d40a7e12c571d13f398a5f56162e8e6d3f32c55555a8b23b5e9e5e... record old: [262] 100001020100d769d40a7e12c571d13f398a5f56162e8e6d3f32c55555a8b23b... record new: [263] 10000103010100d769d40a7e12c571d13f398a5f56162e8e6d3f32c55555a8b2... client: Original packet: [326] 1603010106100001020100d769d40a7e12c571d13f398a5f56162e8e6d3f32c5... client: Filtered packet: [327] 160301010710000103010100d769d40a7e12c571d13f398a5f56162e8e6d3f32... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/11 (188 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/12 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010018b924afed7f4bc43919ab346fbeafa89e7a4076074a658cfc0baef0b81a... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 10000102010018b924afed7f4bc43919ab346fbeafa89e7a4076074a658cfc0b... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [342] 160302010610000102010018b924afed7f4bc43919ab346fbeafa89e7a407607... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/12 (159 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/13 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100f33e762028afbe964ce2739236269db0c1510f3e8561839d033850438a66... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100f33e762028afbe964ce2739236269db0c1510f3e8561839d0338... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [342] 1603020106100001020100f33e762028afbe964ce2739236269db0c1510f3e85... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/13 (159 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/14 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e366170f093d9adaa3be9882a71fcef7beb8c0b199deb84dae8240c4af8d... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100e366170f093d9adaa3be9882a71fcef7beb8c0b199deb84dae82... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [342] 1603020106100001020100e366170f093d9adaa3be9882a71fcef7beb8c0b199... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/14 (160 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/15 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b42e17f06089831012a079be216d08a6a7cbe5a282927229e2c80d203bf6... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100b42e17f06089831012a079be216d08a6a7cbe5a282927229e2c8... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [342] 1603020106100001020100b42e17f06089831012a079be216d08a6a7cbe5a282... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/15 (162 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/16 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100ab61d39a259ce270a303f6663f93cf2fe3bd2a1d89dcbe1b6b0b96303ad8... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100ab61d39a259ce270a303f6663f93cf2fe3bd2a1d89dcbe1b6b0b... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [342] 1603020106100001020100ab61d39a259ce270a303f6663f93cf2fe3bd2a1d89... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/16 (160 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/17 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01003a2540efbf3677b178ee37b12351c54ceab362b1bd32d1c755f6d4563de6... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 1000010201003a2540efbf3677b178ee37b12351c54ceab362b1bd32d1c755f6... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [342] 16030201061000010201003a2540efbf3677b178ee37b12351c54ceab362b1bd... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/17 (159 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/18 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100f2b67de41f37fdf1805477d6f0bbe313317911c6d7ecca72ae253cb25c6a... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100f2b67de41f37fdf1805477d6f0bbe313317911c6d7ecca72ae25... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [342] 1603020106100001020100f2b67de41f37fdf1805477d6f0bbe313317911c6d7... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/18 (159 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/19 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01000a5f9dad30432e7df4661a54af86a521d123436789e412f69022a1537907... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 1000010201000a5f9dad30432e7df4661a54af86a521d123436789e412f69022... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [342] 16030201061000010201000a5f9dad30432e7df4661a54af86a521d123436789... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/19 (160 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/20 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01007d27c83035a57ea63ef9e93972c9c6a5c7d91f136b679ee42e08c02d37aa... handshake new: [259] 0101017d27c83035a57ea63ef9e93972c9c6a5c7d91f136b679ee42e08c02d37... record old: [262] 1000010201007d27c83035a57ea63ef9e93972c9c6a5c7d91f136b679ee42e08... record new: [263] 100001030101017d27c83035a57ea63ef9e93972c9c6a5c7d91f136b679ee42e... client: Original packet: [342] 16030201061000010201007d27c83035a57ea63ef9e93972c9c6a5c7d91f136b... client: Filtered packet: [343] 1603020107100001030101017d27c83035a57ea63ef9e93972c9c6a5c7d91f13... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/20 (160 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/21 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100cbb95dd6f39c6643e846140fd3877062e80e55516053ae30ba23cdea0b28... handshake new: [259] 010101cbb95dd6f39c6643e846140fd3877062e80e55516053ae30ba23cdea0b... record old: [262] 100001020100cbb95dd6f39c6643e846140fd3877062e80e55516053ae30ba23... record new: [263] 10000103010101cbb95dd6f39c6643e846140fd3877062e80e55516053ae30ba... client: Original packet: [342] 1603020106100001020100cbb95dd6f39c6643e846140fd3877062e80e555160... client: Filtered packet: [343] 160302010710000103010101cbb95dd6f39c6643e846140fd3877062e80e5551... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/21 (160 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/22 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010022567352c41a604a0681c62ed1b965f13a1b98a45e76171d25b73df7b0ee... handshake new: [259] 01010022567352c41a604a0681c62ed1b965f13a1b98a45e76171d25b73df7b0... record old: [262] 10000102010022567352c41a604a0681c62ed1b965f13a1b98a45e76171d25b7... record new: [263] 1000010301010022567352c41a604a0681c62ed1b965f13a1b98a45e76171d25... client: Original packet: [342] 160302010610000102010022567352c41a604a0681c62ed1b965f13a1b98a45e... client: Filtered packet: [343] 16030201071000010301010022567352c41a604a0681c62ed1b965f13a1b98a4... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/22 (188 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/23 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100eebdebd4699529e29e85a07aad36b39ee40b97fbaa4f2f42158595e26b64... handshake new: [259] 010100eebdebd4699529e29e85a07aad36b39ee40b97fbaa4f2f42158595e26b... record old: [262] 100001020100eebdebd4699529e29e85a07aad36b39ee40b97fbaa4f2f421585... record new: [263] 10000103010100eebdebd4699529e29e85a07aad36b39ee40b97fbaa4f2f4215... client: Original packet: [342] 1603020106100001020100eebdebd4699529e29e85a07aad36b39ee40b97fbaa... client: Filtered packet: [343] 160302010710000103010100eebdebd4699529e29e85a07aad36b39ee40b97fb... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/23 (187 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/24 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100ddcdb7fc7d714324919a10ff1fa3ef48f2bd9c878d9e58333a1074105403... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100ddcdb7fc7d714324919a10ff1fa3ef48f2bd9c878d9e58333a10... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [318] 1603030106100001020100ddcdb7fc7d714324919a10ff1fa3ef48f2bd9c878d... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/24 (147 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/25 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01008eaae3e3ddc7eaf973818a36fe56954b83d0c1fceeeff9a3e1dccb33671c... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201008eaae3e3ddc7eaf973818a36fe56954b83d0c1fceeeff9a3e1dc... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [318] 16030301061000010201008eaae3e3ddc7eaf973818a36fe56954b83d0c1fcee... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/25 (161 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/26 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01008f98b08faf049fa008b46e50967bab4d619f42b39857181f27c74c1d6101... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201008f98b08faf049fa008b46e50967bab4d619f42b39857181f27c7... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [318] 16030301061000010201008f98b08faf049fa008b46e50967bab4d619f42b398... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/26 (145 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/27 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100c5233ef0c951558b88382e515dc517c08f44014f13fa240ed83788ab85be... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100c5233ef0c951558b88382e515dc517c08f44014f13fa240ed837... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [318] 1603030106100001020100c5233ef0c951558b88382e515dc517c08f44014f13... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/27 (145 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/28 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010071a6f2f60ff8ec6f1e24304e34c3eed495f1fb24abd59b81f9d0a6d99cb1... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 10000102010071a6f2f60ff8ec6f1e24304e34c3eed495f1fb24abd59b81f9d0... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [318] 160303010610000102010071a6f2f60ff8ec6f1e24304e34c3eed495f1fb24ab... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/28 (146 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/29 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010009b5aca2014030f4ea6b0fe8116d106d41fb6dab5e04269b7262f22b74b6... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 10000102010009b5aca2014030f4ea6b0fe8116d106d41fb6dab5e04269b7262... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [318] 160303010610000102010009b5aca2014030f4ea6b0fe8116d106d41fb6dab5e... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/29 (145 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/30 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100f1666c811d2a527a013ea8a148bca8cb469ac01aa8b14ce8adc70ea876bf... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100f1666c811d2a527a013ea8a148bca8cb469ac01aa8b14ce8adc7... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [318] 1603030106100001020100f1666c811d2a527a013ea8a148bca8cb469ac01aa8... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/30 (146 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/31 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01001b4b474ba6fc61f294cc3d5b6bb09e6e45d553ca53a63a5485c8458d59cb... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 1000010201001b4b474ba6fc61f294cc3d5b6bb09e6e45d553ca53a63a5485c8... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [318] 16030301061000010201001b4b474ba6fc61f294cc3d5b6bb09e6e45d553ca53... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/31 (145 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/32 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004ff5cfc0d10ad02a798083c3e87d6923286669796707a4dc88d5c1a34dd4... handshake new: [259] 0101014ff5cfc0d10ad02a798083c3e87d6923286669796707a4dc88d5c1a34d... record old: [262] 1000010201004ff5cfc0d10ad02a798083c3e87d6923286669796707a4dc88d5... record new: [263] 100001030101014ff5cfc0d10ad02a798083c3e87d6923286669796707a4dc88... client: Original packet: [318] 16030301061000010201004ff5cfc0d10ad02a798083c3e87d69232866697967... client: Filtered packet: [319] 1603030107100001030101014ff5cfc0d10ad02a798083c3e87d692328666979... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/32 (146 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/33 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01007300d9c1794a55704f4009ad03b26a27acccd86b8dcb0cae1fcb6df2c893... handshake new: [259] 0101017300d9c1794a55704f4009ad03b26a27acccd86b8dcb0cae1fcb6df2c8... record old: [262] 1000010201007300d9c1794a55704f4009ad03b26a27acccd86b8dcb0cae1fcb... record new: [263] 100001030101017300d9c1794a55704f4009ad03b26a27acccd86b8dcb0cae1f... client: Original packet: [318] 16030301061000010201007300d9c1794a55704f4009ad03b26a27acccd86b8d... client: Filtered packet: [319] 1603030107100001030101017300d9c1794a55704f4009ad03b26a27acccd86b... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/33 (146 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/34 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01005e04579a776db6ad7ca8c2608b2cc7cfd20e6c0cb2eed8aa7f3950d39121... handshake new: [259] 0101005e04579a776db6ad7ca8c2608b2cc7cfd20e6c0cb2eed8aa7f3950d391... record old: [262] 1000010201005e04579a776db6ad7ca8c2608b2cc7cfd20e6c0cb2eed8aa7f39... record new: [263] 100001030101005e04579a776db6ad7ca8c2608b2cc7cfd20e6c0cb2eed8aa7f... client: Original packet: [318] 16030301061000010201005e04579a776db6ad7ca8c2608b2cc7cfd20e6c0cb2... client: Filtered packet: [319] 1603030107100001030101005e04579a776db6ad7ca8c2608b2cc7cfd20e6c0c... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/34 (171 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/35 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b1b3dc32acfdb1fd28e30a9e1554119f18f0e2164e516b7af2164c4ab468... handshake new: [259] 010100b1b3dc32acfdb1fd28e30a9e1554119f18f0e2164e516b7af2164c4ab4... record old: [262] 100001020100b1b3dc32acfdb1fd28e30a9e1554119f18f0e2164e516b7af216... record new: [263] 10000103010100b1b3dc32acfdb1fd28e30a9e1554119f18f0e2164e516b7af2... client: Original packet: [318] 1603030106100001020100b1b3dc32acfdb1fd28e30a9e1554119f18f0e2164e... client: Filtered packet: [319] 160303010710000103010100b1b3dc32acfdb1fd28e30a9e1554119f18f0e216... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/35 (170 ms) [----------] 72 tests from DamageYStream/TlsDamageDHYTest (9319 ms total) [----------] 48 tests from DamageYDatagram/TlsDamageDHYTest [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff2dcd66db7c... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff2dcd66db7c... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/0 (94 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/1 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffb4d56c4fd3... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feffb4d56c4fd3... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/1 (95 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff8b5eaf7939... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff8b5eaf7939... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/2 (95 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff4be1ad9c20... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff4be1ad9c20... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/3 (95 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffebeda751de... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feffebeda751de... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/4 (95 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff9229e1ea10... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff9229e1ea10... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/5 (95 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/6 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff8e9ef0e7ed... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff8e9ef0e7ed... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/6 (95 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/7 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff00c9127f9b... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff00c9127f9b... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/7 (95 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/8 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffd0bcd20082... server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feffd0bcd20082... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/8 (96 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/9 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff086ee99fc2... server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feff086ee99fc2... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/9 (94 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/10 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffa199a7fc12... server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feffa199a7fc12... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/10 (96 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/11 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffcb256996c7... server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feffcb256996c7... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/11 (95 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/12 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd95ff0367f7... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd95ff0367f7... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/12 (94 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/13 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdedb66e9459... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdedb66e9459... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/13 (95 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/14 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd1c3fcbdd0c... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd1c3fcbdd0c... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/14 (107 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/15 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd6aa7077217... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd6aa7077217... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/15 (108 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/16 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdc3de44c852... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdc3de44c852... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/16 (108 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/17 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefda1ec3a69c1... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefda1ec3a69c1... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/17 (106 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/18 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefddb170d1d15... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefddb170d1d15... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/18 (107 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/19 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd361022a3d2... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd361022a3d2... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/19 (108 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/20 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefde02aea75ba... server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefde02aea75ba... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/20 (109 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/21 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd17d3d811dd... server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefd17d3d811dd... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/21 (108 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/22 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefde30b4678cd... server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefde30b4678cd... client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/22 (109 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/23 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd4d8993948d... server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefd4d8993948d... client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/23 (109 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01009c6e4390274d812340e1a766e7d021f8f0d74235d963ab3a5bc60337b743... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 10000102000100000000010201009c6e4390274d812340e1a766e7d021f8f0d7... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201009c6e439027... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/0 (159 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/1 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100196751dc126b6e20ed9caee32872b2dd5674ba72701dca03ef68f8cf1471... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100196751dc126b6e20ed9caee32872b2dd5674... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100196751dc12... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/1 (161 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100446af8bf42a2410b40f2da641d6442192087336aba214da419a49ef60b2f... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100446af8bf42a2410b40f2da641d6442192087... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100446af8bf42... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/2 (161 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01008f53f98a4e000bcefed9aedbb90baede1a9f2b6cd06ee37e476587630dee... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 10000102000100000000010201008f53f98a4e000bcefed9aedbb90baede1a9f... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201008f53f98a4e... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/3 (161 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010034421f557c5eee710ec1a11461f3a84f5bb08a37e5e66004b1814ebd5534... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 100001020001000000000102010034421f557c5eee710ec1a11461f3a84f5bb0... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Original packet: [374] 16feff0000000000000001010e100001020001000000000102010034421f557c... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/4 (160 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100ae5ab0ec3946b081bb3b422a41df6903bd44495adefe88b9e188cdaf8777... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 1000010200010000000001020100ae5ab0ec3946b081bb3b422a41df6903bd44... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100ae5ab0ec39... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/5 (150 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/6 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010096b464b30b49b6407b7fc6622403d1d0bf123b169e9417c1476cc9aaac97... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 100001020001000000000102010096b464b30b49b6407b7fc6622403d1d0bf12... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Original packet: [374] 16feff0000000000000001010e100001020001000000000102010096b464b30b... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/6 (162 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/7 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100471cb75fd3ec0079969cf72b8fa6b732ddd8e05d8232637f91732f321b88... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 1000010200010000000001020100471cb75fd3ec0079969cf72b8fa6b732ddd8... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100471cb75fd3... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/7 (160 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100a1d14bb21836b1bd4e95fee179848856cef3592cd0664f7f064845ef780a... handshake new: [259] 010101a1d14bb21836b1bd4e95fee179848856cef3592cd0664f7f064845ef78... record old: [270] 1000010200010000000001020100a1d14bb21836b1bd4e95fee179848856cef3... record new: [271] 100001030001000000000103010101a1d14bb21836b1bd4e95fee179848856ce... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100a1d14bb218... client: Filtered packet: [375] 16feff0000000000000001010f100001030001000000000103010101a1d14bb2... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8 (160 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/9 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004981991d96118e896f7e73b6069a2df3725fc836452d5b35cb4372216122... handshake new: [259] 0101014981991d96118e896f7e73b6069a2df3725fc836452d5b35cb43722161... record old: [270] 10000102000100000000010201004981991d96118e896f7e73b6069a2df3725f... record new: [271] 1000010300010000000001030101014981991d96118e896f7e73b6069a2df372... client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201004981991d96... client: Filtered packet: [375] 16feff0000000000000001010f1000010300010000000001030101014981991d... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/9 (160 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/10 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100c02a7b9353094f9469010db0f5ae84a5a2a43381a5af8c40cb30a29c6dd6... handshake new: [259] 010100c02a7b9353094f9469010db0f5ae84a5a2a43381a5af8c40cb30a29c6d... record old: [270] 1000010200010000000001020100c02a7b9353094f9469010db0f5ae84a5a2a4... record new: [271] 100001030001000000000103010100c02a7b9353094f9469010db0f5ae84a5a2... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100c02a7b9353... client: Filtered packet: [375] 16feff0000000000000001010f100001030001000000000103010100c02a7b93... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/10 (189 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/11 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010029f9472e15837b2302f345f683dde2b3eb8412cdd2ac7a4f5488d2b85283... handshake new: [259] 01010029f9472e15837b2302f345f683dde2b3eb8412cdd2ac7a4f5488d2b852... record old: [270] 100001020001000000000102010029f9472e15837b2302f345f683dde2b3eb84... record new: [271] 10000103000100000000010301010029f9472e15837b2302f345f683dde2b3eb... client: Original packet: [374] 16feff0000000000000001010e100001020001000000000102010029f9472e15... client: Filtered packet: [375] 16feff0000000000000001010f10000103000100000000010301010029f9472e... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/11 (188 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/12 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010065273f1afc2cf50cff149fc217660c7079d9eee990e8173c68e36615dc56... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 100001020001000000000102010065273f1afc2cf50cff149fc217660c7079d9... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [358] 16fefd0000000000000001010e100001020001000000000102010065273f1afc... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/12 (160 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/13 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01007829f407ea8c95b5f998e857e576e3ca2f8b21b99ec304399bd210e8b78d... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 10000102000100000000010201007829f407ea8c95b5f998e857e576e3ca2f8b... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201007829f407ea... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/13 (160 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/14 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100ae261508e83f43c7af5066aab847a2c59b7d5403ca494af205db17f9f19a... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100ae261508e83f43c7af5066aab847a2c59b7d... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ae261508e8... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/14 (160 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/15 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010035856c475bc0e07e23e22f93a5779abbbdb25590377ced92b7b6fdb5f03c... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 100001020001000000000102010035856c475bc0e07e23e22f93a5779abbbdb2... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [358] 16fefd0000000000000001010e100001020001000000000102010035856c475b... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/15 (160 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/16 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100487da48649b4e3d0c228386e0053144e80efa7ba02dc4cad7b1cc504973e... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 1000010200010000000001020100487da48649b4e3d0c228386e0053144e80ef... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100487da48649... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/16 (160 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/17 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010019df8119489ff1ee1b69de4874ce3fdd54e60f7e57f51adc89d6b078590c... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 100001020001000000000102010019df8119489ff1ee1b69de4874ce3fdd54e6... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Original packet: [358] 16fefd0000000000000001010e100001020001000000000102010019df811948... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/17 (159 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/18 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01009bae49f0bae1d4e6f2a3c3ca0515ceb0419548392fb7d37e29c82f421501... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 10000102000100000000010201009bae49f0bae1d4e6f2a3c3ca0515ceb04195... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201009bae49f0ba... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/18 (159 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/19 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01009cc1d38afc831f29410e50ef8f26e229f96b0536f5d8a158314b75e59236... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 10000102000100000000010201009cc1d38afc831f29410e50ef8f26e229f96b... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201009cc1d38afc... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/19 (160 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/20 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100146201a68f46bcee71191214cea7746a927cc358f567a1b6beb3822e4939... handshake new: [259] 010101146201a68f46bcee71191214cea7746a927cc358f567a1b6beb3822e49... record old: [270] 1000010200010000000001020100146201a68f46bcee71191214cea7746a927c... record new: [271] 100001030001000000000103010101146201a68f46bcee71191214cea7746a92... client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100146201a68f... client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010101146201a6... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/20 (160 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/21 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01008f00acfe8b36537e34c2f94db7562d0db10fb9df356c97aa0be53d9c6a97... handshake new: [259] 0101018f00acfe8b36537e34c2f94db7562d0db10fb9df356c97aa0be53d9c6a... record old: [270] 10000102000100000000010201008f00acfe8b36537e34c2f94db7562d0db10f... record new: [271] 1000010300010000000001030101018f00acfe8b36537e34c2f94db7562d0db1... client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201008f00acfe8b... client: Filtered packet: [359] 16fefd0000000000000001010f1000010300010000000001030101018f00acfe... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/21 (160 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/22 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100661980e4dfa25548dc53307f9d929a684745b1ca049ff4ec64a55da7f2d3... handshake new: [259] 010100661980e4dfa25548dc53307f9d929a684745b1ca049ff4ec64a55da7f2... record old: [270] 1000010200010000000001020100661980e4dfa25548dc53307f9d929a684745... record new: [271] 100001030001000000000103010100661980e4dfa25548dc53307f9d929a6847... client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100661980e4df... client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010100661980e4... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/22 (181 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/23 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01005495654c4f2fa6144e3d3fed3ca2d795d61a7f88df5265deb438e48d4739... handshake new: [259] 0101005495654c4f2fa6144e3d3fed3ca2d795d61a7f88df5265deb438e48d47... record old: [270] 10000102000100000000010201005495654c4f2fa6144e3d3fed3ca2d795d61a... record new: [271] 1000010300010000000001030101005495654c4f2fa6144e3d3fed3ca2d795d6... client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201005495654c4f... client: Filtered packet: [359] 16fefd0000000000000001010f1000010300010000000001030101005495654c... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/23 (171 ms) [----------] 48 tests from DamageYDatagram/TlsDamageDHYTest (6335 ms total) [----------] 12 tests from KeyExchangeTest/TlsKeyExchangeTest [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/0 (255 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/1 (208 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/2 (211 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/3 (209 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/0 (208 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/1 (209 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/2 (210 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/3 (210 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/0 (209 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/1 (209 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/2 (209 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/3 (210 ms) [----------] 12 tests from KeyExchangeTest/TlsKeyExchangeTest (2559 ms total) [----------] 88 tests from TlsPadding/TlsPaddingTest [ RUN ] TlsPadding/TlsPaddingTest.Correct/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fefefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.Correct/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0e0e [ OK ] TlsPadding/TlsPaddingTest.Correct/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fcfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.Correct/2 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0c0c [ OK ] TlsPadding/TlsPaddingTest.Correct/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fbfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.Correct/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0b0b [ OK ] TlsPadding/TlsPaddingTest.Correct/5 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f1f1... [ OK ] TlsPadding/TlsPaddingTest.Correct/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410101 [ OK ] TlsPadding/TlsPaddingTest.Correct/7 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f0... [ OK ] TlsPadding/TlsPaddingTest.Correct/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/9 Content length=31 padding length=0 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141414100 [ OK ] TlsPadding/TlsPaddingTest.Correct/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/10 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/13 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/18 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/19 Content length=287 padding length=0 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/21 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/0 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0e10 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/2 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0c20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/3 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/4 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0b20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/6 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410120 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/8 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/9 Content length=31 padding length=0 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141414120 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/10 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/12 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/13 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/14 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/15 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/16 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/17 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/18 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/19 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/21 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/21 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fffefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410f0e0e0e0e0e0e0e0e0e0e0e0e0e0e [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fdfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410d0c0c0c0c0c0c0c0c0c0c0c0c [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/3 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fcfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410c0b0b0b0b0b0b0b0b0b0b0b [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f2f1... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/6 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410201 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f1... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/9 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/10 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/16 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/19 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/19 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/21 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fefefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/0 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0f0e [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fcfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0d0c [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/3 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fbfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0c0b [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f1f1... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410201 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f0... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/8 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/9 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/12 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/14 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/17 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/19 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/21 (1 ms) [----------] 88 tests from TlsPadding/TlsPaddingTest (26 ms total) [----------] 8 tests from SkipTls10/TlsSkipTest [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateRsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [531] 02000051030109965e7872310fe9923b8882d0136ce1d606b4985c5adcadb320... record new: [89] 02000051030109965e7872310fe9923b8882d0136ce1d606b4985c5adcadb320... server: Original packet: [536] 160301021302000051030109965e7872310fe9923b8882d0136ce1d606b4985c... server: Filtered packet: [94] 160301005902000051030109965e7872310fe9923b8882d0136ce1d606b4985c... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateRsa/0 (65 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateDhe/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 020000570301025614c3c35ca0a4ed07c92e6d79c3d39943a692bc2426e07f99... record new: [298] 020000570301025614c3c35ca0a4ed07c92e6d79c3d39943a692bc2426e07f99... server: Original packet: [745] 16030102e4020000570301025614c3c35ca0a4ed07c92e6d79c3d39943a692bc... server: Filtered packet: [303] 160301012a020000570301025614c3c35ca0a4ed07c92e6d79c3d39943a692bc... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateDhe/0 (75 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateEcdhe/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 020000570301f601b9a01a0bb495231d75e74cc00ca2de00d0e06fed152b4020... record new: [298] 020000570301f601b9a01a0bb495231d75e74cc00ca2de00d0e06fed152b4020... server: Original packet: [745] 16030102e4020000570301f601b9a01a0bb495231d75e74cc00ca2de00d0e06f... server: Filtered packet: [303] 160301012a020000570301f601b9a01a0bb495231d75e74cc00ca2de00d0e06f... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateEcdhe/0 (75 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateEcdsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [559] 020000570301471efac7f86c34f67d693ea592121a4f64d9ec89632c356b1fb0... record new: [242] 020000570301471efac7f86c34f67d693ea592121a4f64d9ec89632c356b1fb0... server: Original packet: [564] 160301022f020000570301471efac7f86c34f67d693ea592121a4f64d9ec8963... server: Filtered packet: [247] 16030100f2020000570301471efac7f86c34f67d693ea592121a4f64d9ec8963... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateEcdsa/0 (55 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipServerKeyExchange/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [740] 020000570301d08ca4b8591253afd415604f841ce64555c276d5226fdda63d2c... record new: [537] 020000570301d08ca4b8591253afd415604f841ce64555c276d5226fdda63d2c... server: Original packet: [745] 16030102e4020000570301d08ca4b8591253afd415604f841ce64555c276d522... server: Filtered packet: [542] 1603010219020000570301d08ca4b8591253afd415604f841ce64555c276d522... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipServerKeyExchange/0 (74 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [558] 0200005703010dea91b9613a0b1aafcf55756f7e9d2dd8cb7fdffc3c127f80bf... record new: [412] 0200005703010dea91b9613a0b1aafcf55756f7e9d2dd8cb7fdffc3c127f80bf... server: Original packet: [563] 160301022e0200005703010dea91b9613a0b1aafcf55756f7e9d2dd8cb7fdffc... server: Filtered packet: [417] 160301019c0200005703010dea91b9613a0b1aafcf55756f7e9d2dd8cb7fdffc... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 (56 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertAndKeyExch/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 020000570301a468175deea8ffabbf969d7adb708d824b272534e95560e97ebb... record new: [298] 020000570301a468175deea8ffabbf969d7adb708d824b272534e95560e97ebb... Dropping handshake: 12 record old: [298] 020000570301a468175deea8ffabbf969d7adb708d824b272534e95560e97ebb... record new: [95] 020000570301a468175deea8ffabbf969d7adb708d824b272534e95560e97ebb... server: Original packet: [745] 16030102e4020000570301a468175deea8ffabbf969d7adb708d824b272534e9... server: Filtered packet: [100] 160301005f020000570301a468175deea8ffabbf969d7adb708d824b272534e9... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertAndKeyExch/0 (75 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [558] 020000570301e66993749cf65d1312edd1ee11bd73a339141f1f69e1af6f7ada... record new: [241] 020000570301e66993749cf65d1312edd1ee11bd73a339141f1f69e1af6f7ada... Dropping handshake: 12 record old: [241] 020000570301e66993749cf65d1312edd1ee11bd73a339141f1f69e1af6f7ada... record new: [95] 020000570301e66993749cf65d1312edd1ee11bd73a339141f1f69e1af6f7ada... server: Original packet: [563] 160301022e020000570301e66993749cf65d1312edd1ee11bd73a339141f1f69... server: Filtered packet: [100] 160301005f020000570301e66993749cf65d1312edd1ee11bd73a339141f1f69... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 (54 ms) [----------] 8 tests from SkipTls10/TlsSkipTest (530 ms total) [----------] 32 tests from SkipVariants/TlsSkipTest [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [531] 0200005103025f61ae8e184153f8573067660cf37a193bd084b3ec0fba5300b5... record new: [89] 0200005103025f61ae8e184153f8573067660cf37a193bd084b3ec0fba5300b5... server: Original packet: [536] 16030202130200005103025f61ae8e184153f8573067660cf37a193bd084b3ec... server: Filtered packet: [94] 16030200590200005103025f61ae8e184153f8573067660cf37a193bd084b3ec... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/0 (61 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [531] 0200005103031be120182c39d93199a6ddbd96556f869b7ea9c8a29dbaf8b4ca... record new: [89] 0200005103031be120182c39d93199a6ddbd96556f869b7ea9c8a29dbaf8b4ca... server: Original packet: [536] 16030302130200005103031be120182c39d93199a6ddbd96556f869b7ea9c8a2... server: Filtered packet: [94] 16030300590200005103031be120182c39d93199a6ddbd96556f869b7ea9c8a2... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/1 (60 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [594] 16feff0000000000000000005d020000510000000000000051feff492dbf00ea... server: Filtered packet: [144] 16feff0000000000000000005d020000510000000000000051feff492dbf00ea... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/2 (60 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [594] 16fefd0000000000000000005d020000510000000000000051fefde975afc006... server: Filtered packet: [144] 16fefd0000000000000000005d020000510000000000000051fefde975afc006... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/3 (61 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 02000057030287ed87c896387b9c53f5e788c9aa12a2c1c79d43539ed9def08b... record new: [298] 02000057030287ed87c896387b9c53f5e788c9aa12a2c1c79d43539ed9def08b... server: Original packet: [745] 16030202e402000057030287ed87c896387b9c53f5e788c9aa12a2c1c79d4353... server: Filtered packet: [303] 160302012a02000057030287ed87c896387b9c53f5e788c9aa12a2c1c79d4353... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/0 (83 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [742] 0200005703037da71d9c972dd1247f2abc596be707cbbb7bdf22edee2007c1a6... record new: [300] 0200005703037da71d9c972dd1247f2abc596be707cbbb7bdf22edee2007c1a6... server: Original packet: [747] 16030302e60200005703037da71d9c972dd1247f2abc596be707cbbb7bdf22ed... server: Filtered packet: [305] 160303012c0200005703037da71d9c972dd1247f2abc596be707cbbb7bdf22ed... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/1 (83 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [211] 0c0000c700020000000000c70300174104201afaca49d2eb2483d318fd7196ea... record new: [211] 0c0000c700010000000000c70300174104201afaca49d2eb2483d318fd7196ea... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feff2e99838af0... server: Filtered packet: [374] 16feff00000000000000000063020000570000000000000057feff2e99838af0... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/2 (85 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [213] 0c0000c900020000000000c90300174104201afaca49d2eb2483d318fd7196ea... record new: [213] 0c0000c900010000000000c90300174104201afaca49d2eb2483d318fd7196ea... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefdf387d3440f... server: Filtered packet: [376] 16fefd00000000000000000063020000570000000000000057fefdf387d3440f... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/3 (84 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 0200005703023db3898df12d34a2c0b666e38daf05008cef7c5d76ea1d1b034a... record new: [298] 0200005703023db3898df12d34a2c0b666e38daf05008cef7c5d76ea1d1b034a... server: Original packet: [745] 16030202e40200005703023db3898df12d34a2c0b666e38daf05008cef7c5d76... server: Filtered packet: [303] 160302012a0200005703023db3898df12d34a2c0b666e38daf05008cef7c5d76... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/0 (69 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [742] 020000570303765fba9dfa85053c0f9cb73421cfd3472268c83889e4e9237c5f... record new: [300] 020000570303765fba9dfa85053c0f9cb73421cfd3472268c83889e4e9237c5f... server: Original packet: [747] 16030302e6020000570303765fba9dfa85053c0f9cb73421cfd3472268c83889... server: Filtered packet: [305] 160303012c020000570303765fba9dfa85053c0f9cb73421cfd3472268c83889... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/1 (69 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [211] 0c0000c700020000000000c70300174104201afaca49d2eb2483d318fd7196ea... record new: [211] 0c0000c700010000000000c70300174104201afaca49d2eb2483d318fd7196ea... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [824] 16feff00000000000000000063020000570000000000000057fefff16cf673a2... server: Filtered packet: [374] 16feff00000000000000000063020000570000000000000057fefff16cf673a2... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/2 (70 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [213] 0c0000c900020000000000c90300174104201afaca49d2eb2483d318fd7196ea... record new: [213] 0c0000c900010000000000c90300174104201afaca49d2eb2483d318fd7196ea... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefd61b575a6bc... server: Filtered packet: [376] 16fefd00000000000000000063020000570000000000000057fefd61b575a6bc... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/3 (70 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [557] 020000570302494fcd5d5e5410649aa0a4bf50acdf3dac0c9cecb85b3a6b75ec... record new: [240] 020000570302494fcd5d5e5410649aa0a4bf50acdf3dac0c9cecb85b3a6b75ec... server: Original packet: [562] 160302022d020000570302494fcd5d5e5410649aa0a4bf50acdf3dac0c9cecb8... server: Filtered packet: [245] 16030200f0020000570302494fcd5d5e5410649aa0a4bf50acdf3dac0c9cecb8... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/0 (52 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [560] 02000057030347160edf71b6e296c52922d8104ed3be39e9d0934c9e1cb084a3... record new: [243] 02000057030347160edf71b6e296c52922d8104ed3be39e9d0934c9e1cb084a3... server: Original packet: [565] 160303023002000057030347160edf71b6e296c52922d8104ed3be39e9d0934c... server: Filtered packet: [248] 16030300f302000057030347160edf71b6e296c52922d8104ed3be39e9d0934c... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/1 (51 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [325] 0b00013900010000000001390001360001333082012f3081d5a0030201020201... record new: [0] record old: [154] 0c00008e000200000000008e0300174104201afaca49d2eb2483d318fd7196ea... record new: [154] 0c00008e000100000000008e0300174104201afaca49d2eb2483d318fd7196ea... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [642] 16feff00000000000000000063020000570000000000000057feffce921a0996... server: Filtered packet: [317] 16feff00000000000000000063020000570000000000000057feffce921a0996... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/2 (53 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [325] 0b00013900010000000001390001360001333082012f3081d5a0030201020201... record new: [0] record old: [156] 0c00009000020000000000900300174104201afaca49d2eb2483d318fd7196ea... record new: [156] 0c00009000010000000000900300174104201afaca49d2eb2483d318fd7196ea... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [644] 16fefd00000000000000000063020000570000000000000057fefd6a02bf870f... server: Filtered packet: [319] 16fefd00000000000000000063020000570000000000000057fefd6a02bf870f... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/3 (52 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [740] 020000570302213f5b9643387b9d5b598e877712e0769662d144e07621a8ae22... record new: [537] 020000570302213f5b9643387b9d5b598e877712e0769662d144e07621a8ae22... server: Original packet: [745] 16030202e4020000570302213f5b9643387b9d5b598e877712e0769662d144e0... server: Filtered packet: [542] 1603020219020000570302213f5b9643387b9d5b598e877712e0769662d144e0... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/0 (70 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [742] 0200005703035f301c5555d275cbda240a7ec81ad8ed2fdb4c77c252c26d5592... record new: [537] 0200005703035f301c5555d275cbda240a7ec81ad8ed2fdb4c77c252c26d5592... server: Original packet: [747] 16030302e60200005703035f301c5555d275cbda240a7ec81ad8ed2fdb4c77c2... server: Filtered packet: [542] 16030302190200005703035f301c5555d275cbda240a7ec81ad8ed2fdb4c77c2... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/1 (69 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [211] 0c0000c700020000000000c70300174104201afaca49d2eb2483d318fd7196ea... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feff1465db3122... server: Filtered packet: [613] 16feff00000000000000000063020000570000000000000057feff1465db3122... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/2 (69 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [213] 0c0000c900020000000000c90300174104201afaca49d2eb2483d318fd7196ea... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefd4ff49a5eb3... server: Filtered packet: [613] 16fefd00000000000000000063020000570000000000000057fefd4ff49a5eb3... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/3 (69 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [558] 020000570302b795e208974fbed6c2884b96db909d7a0e755f04c9e58dd1e53d... record new: [412] 020000570302b795e208974fbed6c2884b96db909d7a0e755f04c9e58dd1e53d... server: Original packet: [563] 160302022e020000570302b795e208974fbed6c2884b96db909d7a0e755f04c9... server: Filtered packet: [417] 160302019c020000570302b795e208974fbed6c2884b96db909d7a0e755f04c9... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 (52 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [561] 020000570303a2fd6f4ce7b6b70efbc4a01b46c2e1508ac56ae2cb82276731f5... record new: [412] 020000570303a2fd6f4ce7b6b70efbc4a01b46c2e1508ac56ae2cb82276731f5... server: Original packet: [566] 1603030231020000570303a2fd6f4ce7b6b70efbc4a01b46c2e1508ac56ae2cb... server: Filtered packet: [417] 160303019c020000570303a2fd6f4ce7b6b70efbc4a01b46c2e1508ac56ae2cb... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/1 (51 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [153] 0c00008d000200000000008d0300174104201afaca49d2eb2483d318fd7196ea... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [641] 16feff00000000000000000063020000570000000000000057feffaf977c543d... server: Filtered packet: [488] 16feff00000000000000000063020000570000000000000057feffaf977c543d... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/2 (52 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [155] 0c00008f000200000000008f0300174104201afaca49d2eb2483d318fd7196ea... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [643] 16fefd00000000000000000063020000570000000000000057fefde027c890bb... server: Filtered packet: [488] 16fefd00000000000000000063020000570000000000000057fefde027c890bb... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/3 (51 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 0200005703023b54a7a5df90e14b832758b3c40f1e6c807c5de06b1c7faa04f3... record new: [298] 0200005703023b54a7a5df90e14b832758b3c40f1e6c807c5de06b1c7faa04f3... Dropping handshake: 12 record old: [298] 0200005703023b54a7a5df90e14b832758b3c40f1e6c807c5de06b1c7faa04f3... record new: [95] 0200005703023b54a7a5df90e14b832758b3c40f1e6c807c5de06b1c7faa04f3... server: Original packet: [745] 16030202e40200005703023b54a7a5df90e14b832758b3c40f1e6c807c5de06b... server: Filtered packet: [100] 160302005f0200005703023b54a7a5df90e14b832758b3c40f1e6c807c5de06b... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/0 (71 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [742] 02000057030355966249fdef556e18b78177a838d5bc35df7f6f635e21ba4d5a... record new: [300] 02000057030355966249fdef556e18b78177a838d5bc35df7f6f635e21ba4d5a... Dropping handshake: 12 record old: [300] 02000057030355966249fdef556e18b78177a838d5bc35df7f6f635e21ba4d5a... record new: [95] 02000057030355966249fdef556e18b78177a838d5bc35df7f6f635e21ba4d5a... server: Original packet: [747] 16030302e602000057030355966249fdef556e18b78177a838d5bc35df7f6f63... server: Filtered packet: [100] 160303005f02000057030355966249fdef556e18b78177a838d5bc35df7f6f63... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/1 (70 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [211] 0c0000c700020000000000c70300174104201afaca49d2eb2483d318fd7196ea... record new: [211] 0c0000c700010000000000c70300174104201afaca49d2eb2483d318fd7196ea... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [211] 0c0000c700010000000000c70300174104201afaca49d2eb2483d318fd7196ea... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feffc1024a67a3... server: Filtered packet: [163] 16feff00000000000000000063020000570000000000000057feffc1024a67a3... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/2 (71 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [213] 0c0000c900020000000000c90300174104201afaca49d2eb2483d318fd7196ea... record new: [213] 0c0000c900010000000000c90300174104201afaca49d2eb2483d318fd7196ea... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [213] 0c0000c900010000000000c90300174104201afaca49d2eb2483d318fd7196ea... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefd3082ffad0c... server: Filtered packet: [163] 16fefd00000000000000000063020000570000000000000057fefd3082ffad0c... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/3 (71 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [559] 020000570302f63fe6fa1d76d2cf2904a7e2a72205a26c16f6a111d92c4514ee... record new: [242] 020000570302f63fe6fa1d76d2cf2904a7e2a72205a26c16f6a111d92c4514ee... Dropping handshake: 12 record old: [242] 020000570302f63fe6fa1d76d2cf2904a7e2a72205a26c16f6a111d92c4514ee... record new: [95] 020000570302f63fe6fa1d76d2cf2904a7e2a72205a26c16f6a111d92c4514ee... server: Original packet: [564] 160302022f020000570302f63fe6fa1d76d2cf2904a7e2a72205a26c16f6a111... server: Filtered packet: [100] 160302005f020000570302f63fe6fa1d76d2cf2904a7e2a72205a26c16f6a111... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 (54 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [559] 020000570303165c7c97969d22d81396298d8586cd8da8e8522797d4023aac77... record new: [242] 020000570303165c7c97969d22d81396298d8586cd8da8e8522797d4023aac77... Dropping handshake: 12 record old: [242] 020000570303165c7c97969d22d81396298d8586cd8da8e8522797d4023aac77... record new: [95] 020000570303165c7c97969d22d81396298d8586cd8da8e8522797d4023aac77... server: Original packet: [564] 160303022f020000570303165c7c97969d22d81396298d8586cd8da8e8522797... server: Filtered packet: [100] 160303005f020000570303165c7c97969d22d81396298d8586cd8da8e8522797... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/1 (52 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [325] 0b00013900010000000001390001360001333082012f3081d5a0030201020201... record new: [0] record old: [154] 0c00008e000200000000008e0300174104201afaca49d2eb2483d318fd7196ea... record new: [154] 0c00008e000100000000008e0300174104201afaca49d2eb2483d318fd7196ea... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [154] 0c00008e000100000000008e0300174104201afaca49d2eb2483d318fd7196ea... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [642] 16feff00000000000000000063020000570000000000000057fefffd23fb224d... server: Filtered packet: [163] 16feff00000000000000000063020000570000000000000057fefffd23fb224d... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/2 (53 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [325] 0b00013900010000000001390001360001333082012f3081d5a0030201020201... record new: [0] record old: [155] 0c00008f000200000000008f0300174104201afaca49d2eb2483d318fd7196ea... record new: [155] 0c00008f000100000000008f0300174104201afaca49d2eb2483d318fd7196ea... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [155] 0c00008f000100000000008f0300174104201afaca49d2eb2483d318fd7196ea... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [643] 16fefd00000000000000000063020000570000000000000057fefd7f017c17bd... server: Filtered packet: [163] 16fefd00000000000000000063020000570000000000000057fefd7f017c17bd... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/3 (54 ms) [----------] 32 tests from SkipVariants/TlsSkipTest (2044 ms total) [----------] 10 tests from AllHashFuncs/TlsHkdfTest [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/0 Hash = SHA-256 Output: [32] 33ad0a1c607ec03b09e6cd9893680ce210adf300aa1f2660e1b22e10f170f92a [ OK ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/0 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/1 Hash = SHA-384 Output: [48] 7ee8206f5570023e6dc7519eb1073bc4e791ad37b5c382aa10ba18e2357e7169... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/1 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/0 Hash = SHA-256 Output: [32] 11873828a9197811339124b58a1bb09f7f0d8dbb10f49c54bd1fd885cd153033 [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/1 Hash = SHA-384 Output: [48] 51b1d5b4597979084a15b2db84d3d6bcfc9345d9dc74da1a57c2769f3f83452f... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/0 Hash = SHA-256 Output: [32] 2f5f78d0a4c436ee6c8a4ef9d043810213fd4783633ad2e1406d2d9800fdc187 [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/0 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/1 Hash = SHA-384 Output: [48] 7b40f9ef91ffc9d129245cbff8827668ae4b63e803dd39a8d46af6e5eceaf87d... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/1 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/0 Hash = SHA-256 Output: [32] 7953b8dd6b98ce00b7dce803708ce3ac068b22fd0e3448e6e5e08ad61618e548 [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/1 Hash = SHA-384 Output: [48] 0193c0073f6a830e2e4fb258e400085c689c37320037ffc31c5b980b02923ffd... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/1 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/0 Hash = SHA-256 Output: [32] 347c6780ff0bbad71c283b16eb2f9cf62d24e6cdb613d51776548cb07dcde74c [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/0 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/1 Hash = SHA-384 Output: [48] 4b1e5ec1493078ea35bd3f0104e61aea14cc182ad1c47621c464c04e4b361605... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/1 (0 ms) [----------] 10 tests from AllHashFuncs/TlsHkdfTest (8 ms total) [----------] Global test environment tear-down [==========] 785 tests from 14 test cases ran. (96113 ms total) [ PASSED ] 785 tests. ssl_gtest.sh: #11120: ssl_gtest run successfully - PASSED executing sed to parse the xml report processing the parsed report ssl_gtest.sh: #11121: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/0 ("TLS", 769, 5, 65537, 0)' - PASSED ssl_gtest.sh: #11122: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/1 ("TLS", 769, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #11123: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/2 ("TLS", 769, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #11124: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/3 ("TLS", 769, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #11125: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/4 ("TLS", 769, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #11126: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/5 ("TLS", 770, 5, 65537, 0)' - PASSED ssl_gtest.sh: #11127: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/6 ("TLS", 770, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #11128: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/7 ("TLS", 770, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #11129: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/8 ("TLS", 770, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #11130: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/9 ("TLS", 770, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #11131: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/10 ("TLS", 771, 5, 65537, 0)' - PASSED ssl_gtest.sh: #11132: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/11 ("TLS", 771, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #11133: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/12 ("TLS", 771, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #11134: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/13 ("TLS", 771, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #11135: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/14 ("TLS", 771, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #11136: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/0 ("TLS", 769, 5, 65537, 0)' - PASSED ssl_gtest.sh: #11137: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/1 ("TLS", 769, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #11138: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/2 ("TLS", 769, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #11139: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/3 ("TLS", 769, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #11140: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/4 ("TLS", 769, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #11141: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/5 ("TLS", 770, 5, 65537, 0)' - PASSED ssl_gtest.sh: #11142: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/6 ("TLS", 770, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #11143: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/7 ("TLS", 770, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #11144: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/8 ("TLS", 770, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #11145: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/9 ("TLS", 770, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #11146: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/10 ("TLS", 771, 5, 65537, 0)' - PASSED ssl_gtest.sh: #11147: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/11 ("TLS", 771, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #11148: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/12 ("TLS", 771, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #11149: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/13 ("TLS", 771, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #11150: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/14 ("TLS", 771, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #11151: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/0 ("TLS", 769, 5, 65537, 0)' - PASSED ssl_gtest.sh: #11152: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/1 ("TLS", 769, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #11153: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/2 ("TLS", 769, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #11154: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/3 ("TLS", 769, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #11155: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/4 ("TLS", 769, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #11156: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/5 ("TLS", 770, 5, 65537, 0)' - PASSED ssl_gtest.sh: #11157: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/6 ("TLS", 770, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #11158: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/7 ("TLS", 770, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #11159: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/8 ("TLS", 770, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #11160: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/9 ("TLS", 770, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #11161: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/10 ("TLS", 771, 5, 65537, 0)' - PASSED ssl_gtest.sh: #11162: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/11 ("TLS", 771, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #11163: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/12 ("TLS", 771, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #11164: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/13 ("TLS", 771, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #11165: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/14 ("TLS", 771, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #11166: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/0 ("TLS", 769, 5, 65537, 0)' - PASSED ssl_gtest.sh: #11167: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/1 ("TLS", 769, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #11168: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/2 ("TLS", 769, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #11169: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/3 ("TLS", 769, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #11170: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/4 ("TLS", 769, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #11171: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/5 ("TLS", 770, 5, 65537, 0)' - PASSED ssl_gtest.sh: #11172: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/6 ("TLS", 770, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #11173: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/7 ("TLS", 770, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #11174: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/8 ("TLS", 770, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #11175: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/9 ("TLS", 770, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #11176: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/10 ("TLS", 771, 5, 65537, 0)' - PASSED ssl_gtest.sh: #11177: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/11 ("TLS", 771, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #11178: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/12 ("TLS", 771, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #11179: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/13 ("TLS", 771, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #11180: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/14 ("TLS", 771, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #11181: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/0 ("TLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #11182: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/1 ("TLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #11183: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/2 ("TLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #11184: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/3 ("TLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #11185: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/4 ("TLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #11186: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/5 ("TLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #11187: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/6 ("DTLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #11188: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/7 ("DTLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #11189: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/8 ("DTLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #11190: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/9 ("DTLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #11191: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/10 ("DTLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #11192: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/11 ("DTLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #11193: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/0 ("TLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #11194: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/1 ("TLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #11195: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/2 ("TLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #11196: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/3 ("TLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #11197: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/4 ("TLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #11198: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/5 ("TLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #11199: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/6 ("DTLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #11200: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/7 ("DTLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #11201: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/8 ("DTLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #11202: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/9 ("DTLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #11203: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/10 ("DTLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #11204: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/11 ("DTLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #11205: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/0 ("TLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #11206: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/1 ("TLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #11207: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/2 ("TLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #11208: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/3 ("TLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #11209: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/4 ("TLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #11210: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/5 ("TLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #11211: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/6 ("DTLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #11212: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/7 ("DTLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #11213: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/8 ("DTLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #11214: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/9 ("DTLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #11215: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/10 ("DTLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #11216: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/11 ("DTLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #11217: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/0 ("TLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #11218: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/1 ("TLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #11219: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/2 ("TLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #11220: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/3 ("TLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #11221: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/4 ("TLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #11222: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/5 ("TLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #11223: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/6 ("DTLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #11224: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/7 ("DTLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #11225: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/8 ("DTLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #11226: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/9 ("DTLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #11227: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/10 ("DTLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #11228: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/11 ("DTLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #11229: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/0 ("TLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #11230: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/1 ("TLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #11231: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/2 ("TLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #11232: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/3 ("TLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #11233: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/4 ("TLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #11234: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/5 ("TLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #11235: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/6 ("DTLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #11236: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/7 ("DTLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #11237: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/8 ("DTLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #11238: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/9 ("DTLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #11239: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/10 ("DTLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #11240: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/11 ("DTLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #11241: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/0 ("TLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #11242: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/1 ("TLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #11243: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/2 ("TLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #11244: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/3 ("TLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #11245: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/4 ("TLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #11246: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/5 ("TLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #11247: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/6 ("DTLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #11248: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/7 ("DTLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #11249: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/8 ("DTLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #11250: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/9 ("DTLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #11251: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/10 ("DTLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #11252: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/11 ("DTLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #11253: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/0 ("TLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #11254: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/1 ("TLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #11255: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/2 ("TLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #11256: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/3 ("TLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #11257: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/4 ("TLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #11258: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/5 ("TLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #11259: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/6 ("DTLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #11260: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/7 ("DTLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #11261: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/8 ("DTLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #11262: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/9 ("DTLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #11263: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/10 ("DTLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #11264: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/11 ("DTLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #11265: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/0 ("TLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #11266: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/1 ("TLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #11267: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/2 ("TLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #11268: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/3 ("TLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #11269: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/4 ("TLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #11270: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/5 ("TLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #11271: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/6 ("DTLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #11272: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/7 ("DTLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #11273: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/8 ("DTLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #11274: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/9 ("DTLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #11275: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/10 ("DTLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #11276: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/11 ("DTLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #11277: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/0 ("TLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #11278: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/1 ("TLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #11279: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/2 ("TLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #11280: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/3 ("TLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #11281: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/4 ("TLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #11282: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/5 ("TLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #11283: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/6 ("TLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #11284: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/7 ("TLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #11285: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/8 ("DTLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #11286: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/9 ("DTLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #11287: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/10 ("DTLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #11288: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/11 ("DTLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #11289: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/12 ("DTLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #11290: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/13 ("DTLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #11291: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/14 ("DTLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #11292: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/15 ("DTLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #11293: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/0 ("TLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #11294: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/1 ("TLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #11295: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/2 ("TLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #11296: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/3 ("TLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #11297: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/4 ("TLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #11298: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/5 ("TLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #11299: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/6 ("TLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #11300: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/7 ("TLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #11301: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/8 ("DTLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #11302: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/9 ("DTLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #11303: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/10 ("DTLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #11304: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/11 ("DTLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #11305: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/12 ("DTLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #11306: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/13 ("DTLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #11307: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/14 ("DTLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #11308: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/15 ("DTLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #11309: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/0 ("TLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #11310: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/1 ("TLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #11311: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/2 ("TLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #11312: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/3 ("TLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #11313: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/4 ("TLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #11314: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/5 ("TLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #11315: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/6 ("TLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #11316: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/7 ("TLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #11317: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/8 ("DTLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #11318: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/9 ("DTLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #11319: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/10 ("DTLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #11320: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/11 ("DTLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #11321: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/12 ("DTLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #11322: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/13 ("DTLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #11323: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/14 ("DTLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #11324: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/15 ("DTLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #11325: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/0 ("TLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #11326: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/1 ("TLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #11327: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/2 ("TLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #11328: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/3 ("TLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #11329: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/4 ("TLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #11330: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/5 ("TLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #11331: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/6 ("TLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #11332: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/7 ("TLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #11333: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/8 ("DTLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #11334: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/9 ("DTLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #11335: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/10 ("DTLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #11336: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/11 ("DTLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #11337: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/12 ("DTLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #11338: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/13 ("DTLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #11339: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/14 ("DTLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #11340: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/15 ("DTLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #11341: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/0 ("TLS", 769, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #11342: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/1 ("TLS", 769, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #11343: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/2 ("TLS", 769, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #11344: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/3 ("TLS", 769, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #11345: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/4 ("TLS", 769, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #11346: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/5 ("TLS", 769, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #11347: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/6 ("TLS", 769, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #11348: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/7 ("TLS", 769, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #11349: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/8 ("TLS", 769, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #11350: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/9 ("TLS", 769, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #11351: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/10 ("TLS", 769, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #11352: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/11 ("TLS", 769, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #11353: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/12 ("TLS", 769, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #11354: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/13 ("TLS", 769, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #11355: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/14 ("TLS", 769, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #11356: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/15 ("TLS", 769, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #11357: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/16 ("TLS", 770, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #11358: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/17 ("TLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #11359: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/18 ("TLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #11360: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/19 ("TLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #11361: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/20 ("TLS", 770, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #11362: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/21 ("TLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #11363: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/22 ("TLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #11364: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/23 ("TLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #11365: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/24 ("TLS", 770, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #11366: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/25 ("TLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #11367: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/26 ("TLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #11368: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/27 ("TLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #11369: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/28 ("TLS", 770, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #11370: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/29 ("TLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #11371: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/30 ("TLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #11372: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/31 ("TLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #11373: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/32 ("TLS", 771, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #11374: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/33 ("TLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #11375: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/34 ("TLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #11376: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/35 ("TLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #11377: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/36 ("TLS", 771, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #11378: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/37 ("TLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #11379: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/38 ("TLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #11380: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/39 ("TLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #11381: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/40 ("TLS", 771, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #11382: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/41 ("TLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #11383: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/42 ("TLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #11384: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/43 ("TLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #11385: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/44 ("TLS", 771, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #11386: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/45 ("TLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #11387: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/46 ("TLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #11388: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/47 ("TLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #11389: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/0 ("TLS", 769, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #11390: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/1 ("TLS", 769, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #11391: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/2 ("TLS", 769, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #11392: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/3 ("TLS", 769, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #11393: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/4 ("TLS", 769, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #11394: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/5 ("TLS", 769, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #11395: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/6 ("TLS", 769, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #11396: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/7 ("TLS", 769, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #11397: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/8 ("TLS", 769, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #11398: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/9 ("TLS", 769, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #11399: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/10 ("TLS", 769, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #11400: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/11 ("TLS", 769, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #11401: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/12 ("TLS", 769, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #11402: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/13 ("TLS", 769, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #11403: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/14 ("TLS", 769, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #11404: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/15 ("TLS", 769, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #11405: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/16 ("TLS", 770, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #11406: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/17 ("TLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #11407: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/18 ("TLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #11408: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/19 ("TLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #11409: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/20 ("TLS", 770, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #11410: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/21 ("TLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #11411: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/22 ("TLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #11412: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/23 ("TLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #11413: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/24 ("TLS", 770, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #11414: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/25 ("TLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #11415: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/26 ("TLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #11416: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/27 ("TLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #11417: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/28 ("TLS", 770, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #11418: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/29 ("TLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #11419: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/30 ("TLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #11420: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/31 ("TLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #11421: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/32 ("TLS", 771, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #11422: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/33 ("TLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #11423: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/34 ("TLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #11424: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/35 ("TLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #11425: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/36 ("TLS", 771, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #11426: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/37 ("TLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #11427: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/38 ("TLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #11428: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/39 ("TLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #11429: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/40 ("TLS", 771, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #11430: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/41 ("TLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #11431: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/42 ("TLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #11432: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/43 ("TLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #11433: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/44 ("TLS", 771, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #11434: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/45 ("TLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #11435: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/46 ("TLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #11436: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/47 ("TLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #11437: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/0 ("TLS", 769, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #11438: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/1 ("TLS", 769, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #11439: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/2 ("TLS", 769, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #11440: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/3 ("TLS", 769, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #11441: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/4 ("TLS", 769, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #11442: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/5 ("TLS", 769, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #11443: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/6 ("TLS", 769, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #11444: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/7 ("TLS", 769, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #11445: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/8 ("TLS", 769, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #11446: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/9 ("TLS", 769, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #11447: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/10 ("TLS", 769, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #11448: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/11 ("TLS", 769, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #11449: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/12 ("TLS", 769, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #11450: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/13 ("TLS", 769, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #11451: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/14 ("TLS", 769, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #11452: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/15 ("TLS", 769, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #11453: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/16 ("TLS", 770, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #11454: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/17 ("TLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #11455: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/18 ("TLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #11456: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/19 ("TLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #11457: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/20 ("TLS", 770, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #11458: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/21 ("TLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #11459: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/22 ("TLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #11460: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/23 ("TLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #11461: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/24 ("TLS", 770, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #11462: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/25 ("TLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #11463: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/26 ("TLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #11464: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/27 ("TLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #11465: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/28 ("TLS", 770, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #11466: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/29 ("TLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #11467: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/30 ("TLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #11468: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/31 ("TLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #11469: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/32 ("TLS", 771, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #11470: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/33 ("TLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #11471: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/34 ("TLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #11472: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/35 ("TLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #11473: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/36 ("TLS", 771, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #11474: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/37 ("TLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #11475: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/38 ("TLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #11476: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/39 ("TLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #11477: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/40 ("TLS", 771, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #11478: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/41 ("TLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #11479: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/42 ("TLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #11480: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/43 ("TLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #11481: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/44 ("TLS", 771, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #11482: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/45 ("TLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #11483: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/46 ("TLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #11484: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/47 ("TLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #11485: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/0 ("TLS", 769, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #11486: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/1 ("TLS", 769, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #11487: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/2 ("TLS", 769, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #11488: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/3 ("TLS", 769, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #11489: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/4 ("TLS", 769, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #11490: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/5 ("TLS", 769, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #11491: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/6 ("TLS", 769, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #11492: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/7 ("TLS", 769, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #11493: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/8 ("TLS", 769, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #11494: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/9 ("TLS", 769, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #11495: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/10 ("TLS", 769, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #11496: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/11 ("TLS", 769, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #11497: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/12 ("TLS", 769, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #11498: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/13 ("TLS", 769, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #11499: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/14 ("TLS", 769, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #11500: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/15 ("TLS", 769, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #11501: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/16 ("TLS", 770, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #11502: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/17 ("TLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #11503: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/18 ("TLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #11504: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/19 ("TLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #11505: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/20 ("TLS", 770, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #11506: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/21 ("TLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #11507: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/22 ("TLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #11508: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/23 ("TLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #11509: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/24 ("TLS", 770, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #11510: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/25 ("TLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #11511: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/26 ("TLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #11512: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/27 ("TLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #11513: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/28 ("TLS", 770, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #11514: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/29 ("TLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #11515: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/30 ("TLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #11516: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/31 ("TLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #11517: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/32 ("TLS", 771, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #11518: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/33 ("TLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #11519: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/34 ("TLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #11520: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/35 ("TLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #11521: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/36 ("TLS", 771, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #11522: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/37 ("TLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #11523: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/38 ("TLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #11524: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/39 ("TLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #11525: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/40 ("TLS", 771, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #11526: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/41 ("TLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #11527: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/42 ("TLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #11528: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/43 ("TLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #11529: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/44 ("TLS", 771, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #11530: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/45 ("TLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #11531: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/46 ("TLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #11532: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/47 ("TLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #11533: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/0 ("DTLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #11534: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/1 ("DTLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #11535: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/2 ("DTLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #11536: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/3 ("DTLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #11537: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/4 ("DTLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #11538: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/5 ("DTLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #11539: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/6 ("DTLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #11540: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/7 ("DTLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #11541: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/8 ("DTLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #11542: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/9 ("DTLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #11543: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/10 ("DTLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #11544: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/11 ("DTLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #11545: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/12 ("DTLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #11546: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/13 ("DTLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #11547: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/14 ("DTLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #11548: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/15 ("DTLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #11549: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/16 ("DTLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #11550: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/17 ("DTLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #11551: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/18 ("DTLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #11552: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/19 ("DTLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #11553: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/20 ("DTLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #11554: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/21 ("DTLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #11555: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/22 ("DTLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #11556: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/23 ("DTLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #11557: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/0 ("DTLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #11558: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/1 ("DTLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #11559: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/2 ("DTLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #11560: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/3 ("DTLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #11561: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/4 ("DTLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #11562: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/5 ("DTLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #11563: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/6 ("DTLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #11564: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/7 ("DTLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #11565: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/8 ("DTLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #11566: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/9 ("DTLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #11567: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/10 ("DTLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #11568: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/11 ("DTLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #11569: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/12 ("DTLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #11570: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/13 ("DTLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #11571: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/14 ("DTLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #11572: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/15 ("DTLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #11573: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/16 ("DTLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #11574: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/17 ("DTLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #11575: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/18 ("DTLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #11576: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/19 ("DTLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #11577: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/20 ("DTLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #11578: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/21 ("DTLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #11579: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/22 ("DTLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #11580: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/23 ("DTLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #11581: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/0 ("DTLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #11582: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/1 ("DTLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #11583: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/2 ("DTLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #11584: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/3 ("DTLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #11585: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/4 ("DTLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #11586: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/5 ("DTLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #11587: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/6 ("DTLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #11588: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/7 ("DTLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #11589: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/8 ("DTLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #11590: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/9 ("DTLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #11591: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/10 ("DTLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #11592: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/11 ("DTLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #11593: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/12 ("DTLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #11594: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/13 ("DTLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #11595: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/14 ("DTLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #11596: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/15 ("DTLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #11597: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/16 ("DTLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #11598: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/17 ("DTLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #11599: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/18 ("DTLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #11600: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/19 ("DTLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #11601: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/20 ("DTLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #11602: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/21 ("DTLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #11603: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/22 ("DTLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #11604: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/23 ("DTLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #11605: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/0 ("DTLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #11606: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/1 ("DTLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #11607: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/2 ("DTLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #11608: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/3 ("DTLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #11609: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/4 ("DTLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #11610: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/5 ("DTLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #11611: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/6 ("DTLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #11612: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/7 ("DTLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #11613: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/8 ("DTLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #11614: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/9 ("DTLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #11615: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/10 ("DTLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #11616: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/11 ("DTLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #11617: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/12 ("DTLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #11618: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/13 ("DTLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #11619: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/14 ("DTLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #11620: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/15 ("DTLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #11621: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/16 ("DTLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #11622: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/17 ("DTLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #11623: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/18 ("DTLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #11624: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/19 ("DTLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #11625: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/20 ("DTLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #11626: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/21 ("DTLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #11627: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/22 ("DTLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #11628: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/23 ("DTLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #11629: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/0 TLS 1.0, TLS_ECDHE_RSA_WITH_NULL_SHA, name = "NULL", key size = 0' - PASSED ssl_gtest.sh: #11630: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/1 TLS 1.0, TLS_RSA_WITH_RC4_128_SHA, name = "RC4", key size = 128' - PASSED ssl_gtest.sh: #11631: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/2 TLS 1.0, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, name = "3DES-EDE-CBC", key size = 168' - PASSED ssl_gtest.sh: #11632: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/3 TLS 1.0, TLS_RSA_WITH_AES_128_CBC_SHA, name = "AES-128", key size = 128' - PASSED ssl_gtest.sh: #11633: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/4 TLS 1.2, TLS_RSA_WITH_AES_256_CBC_SHA256, name = "AES-256", key size = 256' - PASSED ssl_gtest.sh: #11634: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/5 TLS 1.2, TLS_RSA_WITH_AES_128_GCM_SHA256, name = "AES-128-GCM", key size = 128' - PASSED ssl_gtest.sh: #11635: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/6 TLS 1.2, TLS_RSA_WITH_AES_256_GCM_SHA384, name = "AES-256-GCM", key size = 256' - PASSED ssl_gtest.sh: #11636: 'DamageYStream/TlsDamageDHYTest: DamageServerY/0 ("TLS", 769, 0, true)' - PASSED ssl_gtest.sh: #11637: 'DamageYStream/TlsDamageDHYTest: DamageServerY/1 ("TLS", 769, 0, false)' - PASSED ssl_gtest.sh: #11638: 'DamageYStream/TlsDamageDHYTest: DamageServerY/2 ("TLS", 769, 1, true)' - PASSED ssl_gtest.sh: #11639: 'DamageYStream/TlsDamageDHYTest: DamageServerY/3 ("TLS", 769, 1, false)' - PASSED ssl_gtest.sh: #11640: 'DamageYStream/TlsDamageDHYTest: DamageServerY/4 ("TLS", 769, 2, true)' - PASSED ssl_gtest.sh: #11641: 'DamageYStream/TlsDamageDHYTest: DamageServerY/5 ("TLS", 769, 2, false)' - PASSED ssl_gtest.sh: #11642: 'DamageYStream/TlsDamageDHYTest: DamageServerY/6 ("TLS", 769, 3, true)' - PASSED ssl_gtest.sh: #11643: 'DamageYStream/TlsDamageDHYTest: DamageServerY/7 ("TLS", 769, 3, false)' - PASSED ssl_gtest.sh: #11644: 'DamageYStream/TlsDamageDHYTest: DamageServerY/8 ("TLS", 769, 4, true)' - PASSED ssl_gtest.sh: #11645: 'DamageYStream/TlsDamageDHYTest: DamageServerY/9 ("TLS", 769, 4, false)' - PASSED ssl_gtest.sh: #11646: 'DamageYStream/TlsDamageDHYTest: DamageServerY/10 ("TLS", 769, 5, true)' - PASSED ssl_gtest.sh: #11647: 'DamageYStream/TlsDamageDHYTest: DamageServerY/11 ("TLS", 769, 5, false)' - PASSED ssl_gtest.sh: #11648: 'DamageYStream/TlsDamageDHYTest: DamageServerY/12 ("TLS", 770, 0, true)' - PASSED ssl_gtest.sh: #11649: 'DamageYStream/TlsDamageDHYTest: DamageServerY/13 ("TLS", 770, 0, false)' - PASSED ssl_gtest.sh: #11650: 'DamageYStream/TlsDamageDHYTest: DamageServerY/14 ("TLS", 770, 1, true)' - PASSED ssl_gtest.sh: #11651: 'DamageYStream/TlsDamageDHYTest: DamageServerY/15 ("TLS", 770, 1, false)' - PASSED ssl_gtest.sh: #11652: 'DamageYStream/TlsDamageDHYTest: DamageServerY/16 ("TLS", 770, 2, true)' - PASSED ssl_gtest.sh: #11653: 'DamageYStream/TlsDamageDHYTest: DamageServerY/17 ("TLS", 770, 2, false)' - PASSED ssl_gtest.sh: #11654: 'DamageYStream/TlsDamageDHYTest: DamageServerY/18 ("TLS", 770, 3, true)' - PASSED ssl_gtest.sh: #11655: 'DamageYStream/TlsDamageDHYTest: DamageServerY/19 ("TLS", 770, 3, false)' - PASSED ssl_gtest.sh: #11656: 'DamageYStream/TlsDamageDHYTest: DamageServerY/20 ("TLS", 770, 4, true)' - PASSED ssl_gtest.sh: #11657: 'DamageYStream/TlsDamageDHYTest: DamageServerY/21 ("TLS", 770, 4, false)' - PASSED ssl_gtest.sh: #11658: 'DamageYStream/TlsDamageDHYTest: DamageServerY/22 ("TLS", 770, 5, true)' - PASSED ssl_gtest.sh: #11659: 'DamageYStream/TlsDamageDHYTest: DamageServerY/23 ("TLS", 770, 5, false)' - PASSED ssl_gtest.sh: #11660: 'DamageYStream/TlsDamageDHYTest: DamageServerY/24 ("TLS", 771, 0, true)' - PASSED ssl_gtest.sh: #11661: 'DamageYStream/TlsDamageDHYTest: DamageServerY/25 ("TLS", 771, 0, false)' - PASSED ssl_gtest.sh: #11662: 'DamageYStream/TlsDamageDHYTest: DamageServerY/26 ("TLS", 771, 1, true)' - PASSED ssl_gtest.sh: #11663: 'DamageYStream/TlsDamageDHYTest: DamageServerY/27 ("TLS", 771, 1, false)' - PASSED ssl_gtest.sh: #11664: 'DamageYStream/TlsDamageDHYTest: DamageServerY/28 ("TLS", 771, 2, true)' - PASSED ssl_gtest.sh: #11665: 'DamageYStream/TlsDamageDHYTest: DamageServerY/29 ("TLS", 771, 2, false)' - PASSED ssl_gtest.sh: #11666: 'DamageYStream/TlsDamageDHYTest: DamageServerY/30 ("TLS", 771, 3, true)' - PASSED ssl_gtest.sh: #11667: 'DamageYStream/TlsDamageDHYTest: DamageServerY/31 ("TLS", 771, 3, false)' - PASSED ssl_gtest.sh: #11668: 'DamageYStream/TlsDamageDHYTest: DamageServerY/32 ("TLS", 771, 4, true)' - PASSED ssl_gtest.sh: #11669: 'DamageYStream/TlsDamageDHYTest: DamageServerY/33 ("TLS", 771, 4, false)' - PASSED ssl_gtest.sh: #11670: 'DamageYStream/TlsDamageDHYTest: DamageServerY/34 ("TLS", 771, 5, true)' - PASSED ssl_gtest.sh: #11671: 'DamageYStream/TlsDamageDHYTest: DamageServerY/35 ("TLS", 771, 5, false)' - PASSED ssl_gtest.sh: #11672: 'DamageYStream/TlsDamageDHYTest: DamageClientY/0 ("TLS", 769, 0, true)' - PASSED ssl_gtest.sh: #11673: 'DamageYStream/TlsDamageDHYTest: DamageClientY/1 ("TLS", 769, 0, false)' - PASSED ssl_gtest.sh: #11674: 'DamageYStream/TlsDamageDHYTest: DamageClientY/2 ("TLS", 769, 1, true)' - PASSED ssl_gtest.sh: #11675: 'DamageYStream/TlsDamageDHYTest: DamageClientY/3 ("TLS", 769, 1, false)' - PASSED ssl_gtest.sh: #11676: 'DamageYStream/TlsDamageDHYTest: DamageClientY/4 ("TLS", 769, 2, true)' - PASSED ssl_gtest.sh: #11677: 'DamageYStream/TlsDamageDHYTest: DamageClientY/5 ("TLS", 769, 2, false)' - PASSED ssl_gtest.sh: #11678: 'DamageYStream/TlsDamageDHYTest: DamageClientY/6 ("TLS", 769, 3, true)' - PASSED ssl_gtest.sh: #11679: 'DamageYStream/TlsDamageDHYTest: DamageClientY/7 ("TLS", 769, 3, false)' - PASSED ssl_gtest.sh: #11680: 'DamageYStream/TlsDamageDHYTest: DamageClientY/8 ("TLS", 769, 4, true)' - PASSED ssl_gtest.sh: #11681: 'DamageYStream/TlsDamageDHYTest: DamageClientY/9 ("TLS", 769, 4, false)' - PASSED ssl_gtest.sh: #11682: 'DamageYStream/TlsDamageDHYTest: DamageClientY/10 ("TLS", 769, 5, true)' - PASSED ssl_gtest.sh: #11683: 'DamageYStream/TlsDamageDHYTest: DamageClientY/11 ("TLS", 769, 5, false)' - PASSED ssl_gtest.sh: #11684: 'DamageYStream/TlsDamageDHYTest: DamageClientY/12 ("TLS", 770, 0, true)' - PASSED ssl_gtest.sh: #11685: 'DamageYStream/TlsDamageDHYTest: DamageClientY/13 ("TLS", 770, 0, false)' - PASSED ssl_gtest.sh: #11686: 'DamageYStream/TlsDamageDHYTest: DamageClientY/14 ("TLS", 770, 1, true)' - PASSED ssl_gtest.sh: #11687: 'DamageYStream/TlsDamageDHYTest: DamageClientY/15 ("TLS", 770, 1, false)' - PASSED ssl_gtest.sh: #11688: 'DamageYStream/TlsDamageDHYTest: DamageClientY/16 ("TLS", 770, 2, true)' - PASSED ssl_gtest.sh: #11689: 'DamageYStream/TlsDamageDHYTest: DamageClientY/17 ("TLS", 770, 2, false)' - PASSED ssl_gtest.sh: #11690: 'DamageYStream/TlsDamageDHYTest: DamageClientY/18 ("TLS", 770, 3, true)' - PASSED ssl_gtest.sh: #11691: 'DamageYStream/TlsDamageDHYTest: DamageClientY/19 ("TLS", 770, 3, false)' - PASSED ssl_gtest.sh: #11692: 'DamageYStream/TlsDamageDHYTest: DamageClientY/20 ("TLS", 770, 4, true)' - PASSED ssl_gtest.sh: #11693: 'DamageYStream/TlsDamageDHYTest: DamageClientY/21 ("TLS", 770, 4, false)' - PASSED ssl_gtest.sh: #11694: 'DamageYStream/TlsDamageDHYTest: DamageClientY/22 ("TLS", 770, 5, true)' - PASSED ssl_gtest.sh: #11695: 'DamageYStream/TlsDamageDHYTest: DamageClientY/23 ("TLS", 770, 5, false)' - PASSED ssl_gtest.sh: #11696: 'DamageYStream/TlsDamageDHYTest: DamageClientY/24 ("TLS", 771, 0, true)' - PASSED ssl_gtest.sh: #11697: 'DamageYStream/TlsDamageDHYTest: DamageClientY/25 ("TLS", 771, 0, false)' - PASSED ssl_gtest.sh: #11698: 'DamageYStream/TlsDamageDHYTest: DamageClientY/26 ("TLS", 771, 1, true)' - PASSED ssl_gtest.sh: #11699: 'DamageYStream/TlsDamageDHYTest: DamageClientY/27 ("TLS", 771, 1, false)' - PASSED ssl_gtest.sh: #11700: 'DamageYStream/TlsDamageDHYTest: DamageClientY/28 ("TLS", 771, 2, true)' - PASSED ssl_gtest.sh: #11701: 'DamageYStream/TlsDamageDHYTest: DamageClientY/29 ("TLS", 771, 2, false)' - PASSED ssl_gtest.sh: #11702: 'DamageYStream/TlsDamageDHYTest: DamageClientY/30 ("TLS", 771, 3, true)' - PASSED ssl_gtest.sh: #11703: 'DamageYStream/TlsDamageDHYTest: DamageClientY/31 ("TLS", 771, 3, false)' - PASSED ssl_gtest.sh: #11704: 'DamageYStream/TlsDamageDHYTest: DamageClientY/32 ("TLS", 771, 4, true)' - PASSED ssl_gtest.sh: #11705: 'DamageYStream/TlsDamageDHYTest: DamageClientY/33 ("TLS", 771, 4, false)' - PASSED ssl_gtest.sh: #11706: 'DamageYStream/TlsDamageDHYTest: DamageClientY/34 ("TLS", 771, 5, true)' - PASSED ssl_gtest.sh: #11707: 'DamageYStream/TlsDamageDHYTest: DamageClientY/35 ("TLS", 771, 5, false)' - PASSED ssl_gtest.sh: #11708: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/0 ("DTLS", 770, 0, true)' - PASSED ssl_gtest.sh: #11709: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/1 ("DTLS", 770, 0, false)' - PASSED ssl_gtest.sh: #11710: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/2 ("DTLS", 770, 1, true)' - PASSED ssl_gtest.sh: #11711: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/3 ("DTLS", 770, 1, false)' - PASSED ssl_gtest.sh: #11712: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/4 ("DTLS", 770, 2, true)' - PASSED ssl_gtest.sh: #11713: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/5 ("DTLS", 770, 2, false)' - PASSED ssl_gtest.sh: #11714: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/6 ("DTLS", 770, 3, true)' - PASSED ssl_gtest.sh: #11715: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/7 ("DTLS", 770, 3, false)' - PASSED ssl_gtest.sh: #11716: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/8 ("DTLS", 770, 4, true)' - PASSED ssl_gtest.sh: #11717: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/9 ("DTLS", 770, 4, false)' - PASSED ssl_gtest.sh: #11718: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/10 ("DTLS", 770, 5, true)' - PASSED ssl_gtest.sh: #11719: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/11 ("DTLS", 770, 5, false)' - PASSED ssl_gtest.sh: #11720: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/12 ("DTLS", 771, 0, true)' - PASSED ssl_gtest.sh: #11721: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/13 ("DTLS", 771, 0, false)' - PASSED ssl_gtest.sh: #11722: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/14 ("DTLS", 771, 1, true)' - PASSED ssl_gtest.sh: #11723: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/15 ("DTLS", 771, 1, false)' - PASSED ssl_gtest.sh: #11724: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/16 ("DTLS", 771, 2, true)' - PASSED ssl_gtest.sh: #11725: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/17 ("DTLS", 771, 2, false)' - PASSED ssl_gtest.sh: #11726: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/18 ("DTLS", 771, 3, true)' - PASSED ssl_gtest.sh: #11727: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/19 ("DTLS", 771, 3, false)' - PASSED ssl_gtest.sh: #11728: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/20 ("DTLS", 771, 4, true)' - PASSED ssl_gtest.sh: #11729: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/21 ("DTLS", 771, 4, false)' - PASSED ssl_gtest.sh: #11730: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/22 ("DTLS", 771, 5, true)' - PASSED ssl_gtest.sh: #11731: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/23 ("DTLS", 771, 5, false)' - PASSED ssl_gtest.sh: #11732: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/0 ("DTLS", 770, 0, true)' - PASSED ssl_gtest.sh: #11733: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/1 ("DTLS", 770, 0, false)' - PASSED ssl_gtest.sh: #11734: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/2 ("DTLS", 770, 1, true)' - PASSED ssl_gtest.sh: #11735: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/3 ("DTLS", 770, 1, false)' - PASSED ssl_gtest.sh: #11736: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/4 ("DTLS", 770, 2, true)' - PASSED ssl_gtest.sh: #11737: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/5 ("DTLS", 770, 2, false)' - PASSED ssl_gtest.sh: #11738: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/6 ("DTLS", 770, 3, true)' - PASSED ssl_gtest.sh: #11739: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/7 ("DTLS", 770, 3, false)' - PASSED ssl_gtest.sh: #11740: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/8 ("DTLS", 770, 4, true)' - PASSED ssl_gtest.sh: #11741: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/9 ("DTLS", 770, 4, false)' - PASSED ssl_gtest.sh: #11742: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/10 ("DTLS", 770, 5, true)' - PASSED ssl_gtest.sh: #11743: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/11 ("DTLS", 770, 5, false)' - PASSED ssl_gtest.sh: #11744: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/12 ("DTLS", 771, 0, true)' - PASSED ssl_gtest.sh: #11745: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/13 ("DTLS", 771, 0, false)' - PASSED ssl_gtest.sh: #11746: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/14 ("DTLS", 771, 1, true)' - PASSED ssl_gtest.sh: #11747: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/15 ("DTLS", 771, 1, false)' - PASSED ssl_gtest.sh: #11748: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/16 ("DTLS", 771, 2, true)' - PASSED ssl_gtest.sh: #11749: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/17 ("DTLS", 771, 2, false)' - PASSED ssl_gtest.sh: #11750: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/18 ("DTLS", 771, 3, true)' - PASSED ssl_gtest.sh: #11751: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/19 ("DTLS", 771, 3, false)' - PASSED ssl_gtest.sh: #11752: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/20 ("DTLS", 771, 4, true)' - PASSED ssl_gtest.sh: #11753: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/21 ("DTLS", 771, 4, false)' - PASSED ssl_gtest.sh: #11754: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/22 ("DTLS", 771, 5, true)' - PASSED ssl_gtest.sh: #11755: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/23 ("DTLS", 771, 5, false)' - PASSED ssl_gtest.sh: #11756: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/0 ("TLS", 771)' - PASSED ssl_gtest.sh: #11757: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/1 ("TLS", 770)' - PASSED ssl_gtest.sh: #11758: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/2 ("DTLS", 771)' - PASSED ssl_gtest.sh: #11759: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/3 ("DTLS", 770)' - PASSED ssl_gtest.sh: #11760: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/0 ("TLS", 771)' - PASSED ssl_gtest.sh: #11761: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/1 ("TLS", 770)' - PASSED ssl_gtest.sh: #11762: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/2 ("DTLS", 771)' - PASSED ssl_gtest.sh: #11763: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/3 ("DTLS", 770)' - PASSED ssl_gtest.sh: #11764: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/0 ("TLS", 771)' - PASSED ssl_gtest.sh: #11765: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/1 ("TLS", 770)' - PASSED ssl_gtest.sh: #11766: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/2 ("DTLS", 771)' - PASSED ssl_gtest.sh: #11767: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/3 ("DTLS", 770)' - PASSED ssl_gtest.sh: #11768: 'TlsPadding/TlsPaddingTest: Correct/0 (1, true)' - PASSED ssl_gtest.sh: #11769: 'TlsPadding/TlsPaddingTest: Correct/1 (1, false)' - PASSED ssl_gtest.sh: #11770: 'TlsPadding/TlsPaddingTest: Correct/2 (19, true)' - PASSED ssl_gtest.sh: #11771: 'TlsPadding/TlsPaddingTest: Correct/3 (19, false)' - PASSED ssl_gtest.sh: #11772: 'TlsPadding/TlsPaddingTest: Correct/4 (20, true)' - PASSED ssl_gtest.sh: #11773: 'TlsPadding/TlsPaddingTest: Correct/5 (20, false)' - PASSED ssl_gtest.sh: #11774: 'TlsPadding/TlsPaddingTest: Correct/6 (30, true)' - PASSED ssl_gtest.sh: #11775: 'TlsPadding/TlsPaddingTest: Correct/7 (30, false)' - PASSED ssl_gtest.sh: #11776: 'TlsPadding/TlsPaddingTest: Correct/8 (31, true)' - PASSED ssl_gtest.sh: #11777: 'TlsPadding/TlsPaddingTest: Correct/9 (31, false)' - PASSED ssl_gtest.sh: #11778: 'TlsPadding/TlsPaddingTest: Correct/10 (32, true)' - PASSED ssl_gtest.sh: #11779: 'TlsPadding/TlsPaddingTest: Correct/11 (32, false)' - PASSED ssl_gtest.sh: #11780: 'TlsPadding/TlsPaddingTest: Correct/12 (36, true)' - PASSED ssl_gtest.sh: #11781: 'TlsPadding/TlsPaddingTest: Correct/13 (36, false)' - PASSED ssl_gtest.sh: #11782: 'TlsPadding/TlsPaddingTest: Correct/14 (256, true)' - PASSED ssl_gtest.sh: #11783: 'TlsPadding/TlsPaddingTest: Correct/15 (256, false)' - PASSED ssl_gtest.sh: #11784: 'TlsPadding/TlsPaddingTest: Correct/16 (257, true)' - PASSED ssl_gtest.sh: #11785: 'TlsPadding/TlsPaddingTest: Correct/17 (257, false)' - PASSED ssl_gtest.sh: #11786: 'TlsPadding/TlsPaddingTest: Correct/18 (287, true)' - PASSED ssl_gtest.sh: #11787: 'TlsPadding/TlsPaddingTest: Correct/19 (287, false)' - PASSED ssl_gtest.sh: #11788: 'TlsPadding/TlsPaddingTest: Correct/20 (288, true)' - PASSED ssl_gtest.sh: #11789: 'TlsPadding/TlsPaddingTest: Correct/21 (288, false)' - PASSED ssl_gtest.sh: #11790: 'TlsPadding/TlsPaddingTest: PadTooLong/0 (1, true)' - PASSED ssl_gtest.sh: #11791: 'TlsPadding/TlsPaddingTest: PadTooLong/1 (1, false)' - PASSED ssl_gtest.sh: #11792: 'TlsPadding/TlsPaddingTest: PadTooLong/2 (19, true)' - PASSED ssl_gtest.sh: #11793: 'TlsPadding/TlsPaddingTest: PadTooLong/3 (19, false)' - PASSED ssl_gtest.sh: #11794: 'TlsPadding/TlsPaddingTest: PadTooLong/4 (20, true)' - PASSED ssl_gtest.sh: #11795: 'TlsPadding/TlsPaddingTest: PadTooLong/5 (20, false)' - PASSED ssl_gtest.sh: #11796: 'TlsPadding/TlsPaddingTest: PadTooLong/6 (30, true)' - PASSED ssl_gtest.sh: #11797: 'TlsPadding/TlsPaddingTest: PadTooLong/7 (30, false)' - PASSED ssl_gtest.sh: #11798: 'TlsPadding/TlsPaddingTest: PadTooLong/8 (31, true)' - PASSED ssl_gtest.sh: #11799: 'TlsPadding/TlsPaddingTest: PadTooLong/9 (31, false)' - PASSED ssl_gtest.sh: #11800: 'TlsPadding/TlsPaddingTest: PadTooLong/10 (32, true)' - PASSED ssl_gtest.sh: #11801: 'TlsPadding/TlsPaddingTest: PadTooLong/11 (32, false)' - PASSED ssl_gtest.sh: #11802: 'TlsPadding/TlsPaddingTest: PadTooLong/12 (36, true)' - PASSED ssl_gtest.sh: #11803: 'TlsPadding/TlsPaddingTest: PadTooLong/13 (36, false)' - PASSED ssl_gtest.sh: #11804: 'TlsPadding/TlsPaddingTest: PadTooLong/14 (256, true)' - PASSED ssl_gtest.sh: #11805: 'TlsPadding/TlsPaddingTest: PadTooLong/15 (256, false)' - PASSED ssl_gtest.sh: #11806: 'TlsPadding/TlsPaddingTest: PadTooLong/16 (257, true)' - PASSED ssl_gtest.sh: #11807: 'TlsPadding/TlsPaddingTest: PadTooLong/17 (257, false)' - PASSED ssl_gtest.sh: #11808: 'TlsPadding/TlsPaddingTest: PadTooLong/18 (287, true)' - PASSED ssl_gtest.sh: #11809: 'TlsPadding/TlsPaddingTest: PadTooLong/19 (287, false)' - PASSED ssl_gtest.sh: #11810: 'TlsPadding/TlsPaddingTest: PadTooLong/20 (288, true)' - PASSED ssl_gtest.sh: #11811: 'TlsPadding/TlsPaddingTest: PadTooLong/21 (288, false)' - PASSED ssl_gtest.sh: #11812: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/0 (1, true)' - PASSED ssl_gtest.sh: #11813: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/1 (1, false)' - PASSED ssl_gtest.sh: #11814: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/2 (19, true)' - PASSED ssl_gtest.sh: #11815: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/3 (19, false)' - PASSED ssl_gtest.sh: #11816: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/4 (20, true)' - PASSED ssl_gtest.sh: #11817: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/5 (20, false)' - PASSED ssl_gtest.sh: #11818: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/6 (30, true)' - PASSED ssl_gtest.sh: #11819: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/7 (30, false)' - PASSED ssl_gtest.sh: #11820: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/8 (31, true)' - PASSED ssl_gtest.sh: #11821: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/9 (31, false)' - PASSED ssl_gtest.sh: #11822: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/10 (32, true)' - PASSED ssl_gtest.sh: #11823: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/11 (32, false)' - PASSED ssl_gtest.sh: #11824: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/12 (36, true)' - PASSED ssl_gtest.sh: #11825: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/13 (36, false)' - PASSED ssl_gtest.sh: #11826: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/14 (256, true)' - PASSED ssl_gtest.sh: #11827: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/15 (256, false)' - PASSED ssl_gtest.sh: #11828: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/16 (257, true)' - PASSED ssl_gtest.sh: #11829: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/17 (257, false)' - PASSED ssl_gtest.sh: #11830: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/18 (287, true)' - PASSED ssl_gtest.sh: #11831: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/19 (287, false)' - PASSED ssl_gtest.sh: #11832: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/20 (288, true)' - PASSED ssl_gtest.sh: #11833: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/21 (288, false)' - PASSED ssl_gtest.sh: #11834: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/0 (1, true)' - PASSED ssl_gtest.sh: #11835: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/1 (1, false)' - PASSED ssl_gtest.sh: #11836: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/2 (19, true)' - PASSED ssl_gtest.sh: #11837: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/3 (19, false)' - PASSED ssl_gtest.sh: #11838: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/4 (20, true)' - PASSED ssl_gtest.sh: #11839: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/5 (20, false)' - PASSED ssl_gtest.sh: #11840: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/6 (30, true)' - PASSED ssl_gtest.sh: #11841: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/7 (30, false)' - PASSED ssl_gtest.sh: #11842: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/8 (31, true)' - PASSED ssl_gtest.sh: #11843: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/9 (31, false)' - PASSED ssl_gtest.sh: #11844: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/10 (32, true)' - PASSED ssl_gtest.sh: #11845: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/11 (32, false)' - PASSED ssl_gtest.sh: #11846: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/12 (36, true)' - PASSED ssl_gtest.sh: #11847: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/13 (36, false)' - PASSED ssl_gtest.sh: #11848: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/14 (256, true)' - PASSED ssl_gtest.sh: #11849: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/15 (256, false)' - PASSED ssl_gtest.sh: #11850: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/16 (257, true)' - PASSED ssl_gtest.sh: #11851: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/17 (257, false)' - PASSED ssl_gtest.sh: #11852: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/18 (287, true)' - PASSED ssl_gtest.sh: #11853: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/19 (287, false)' - PASSED ssl_gtest.sh: #11854: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/20 (288, true)' - PASSED ssl_gtest.sh: #11855: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/21 (288, false)' - PASSED ssl_gtest.sh: #11856: 'SkipTls10/TlsSkipTest: SkipCertificateRsa/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #11857: 'SkipTls10/TlsSkipTest: SkipCertificateDhe/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #11858: 'SkipTls10/TlsSkipTest: SkipCertificateEcdhe/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #11859: 'SkipTls10/TlsSkipTest: SkipCertificateEcdsa/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #11860: 'SkipTls10/TlsSkipTest: SkipServerKeyExchange/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #11861: 'SkipTls10/TlsSkipTest: SkipServerKeyExchangeEcdsa/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #11862: 'SkipTls10/TlsSkipTest: SkipCertAndKeyExch/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #11863: 'SkipTls10/TlsSkipTest: SkipCertAndKeyExchEcdsa/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #11864: 'SkipVariants/TlsSkipTest: SkipCertificateRsa/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #11865: 'SkipVariants/TlsSkipTest: SkipCertificateRsa/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #11866: 'SkipVariants/TlsSkipTest: SkipCertificateRsa/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #11867: 'SkipVariants/TlsSkipTest: SkipCertificateRsa/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #11868: 'SkipVariants/TlsSkipTest: SkipCertificateDhe/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #11869: 'SkipVariants/TlsSkipTest: SkipCertificateDhe/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #11870: 'SkipVariants/TlsSkipTest: SkipCertificateDhe/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #11871: 'SkipVariants/TlsSkipTest: SkipCertificateDhe/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #11872: 'SkipVariants/TlsSkipTest: SkipCertificateEcdhe/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #11873: 'SkipVariants/TlsSkipTest: SkipCertificateEcdhe/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #11874: 'SkipVariants/TlsSkipTest: SkipCertificateEcdhe/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #11875: 'SkipVariants/TlsSkipTest: SkipCertificateEcdhe/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #11876: 'SkipVariants/TlsSkipTest: SkipCertificateEcdsa/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #11877: 'SkipVariants/TlsSkipTest: SkipCertificateEcdsa/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #11878: 'SkipVariants/TlsSkipTest: SkipCertificateEcdsa/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #11879: 'SkipVariants/TlsSkipTest: SkipCertificateEcdsa/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #11880: 'SkipVariants/TlsSkipTest: SkipServerKeyExchange/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #11881: 'SkipVariants/TlsSkipTest: SkipServerKeyExchange/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #11882: 'SkipVariants/TlsSkipTest: SkipServerKeyExchange/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #11883: 'SkipVariants/TlsSkipTest: SkipServerKeyExchange/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #11884: 'SkipVariants/TlsSkipTest: SkipServerKeyExchangeEcdsa/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #11885: 'SkipVariants/TlsSkipTest: SkipServerKeyExchangeEcdsa/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #11886: 'SkipVariants/TlsSkipTest: SkipServerKeyExchangeEcdsa/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #11887: 'SkipVariants/TlsSkipTest: SkipServerKeyExchangeEcdsa/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #11888: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExch/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #11889: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExch/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #11890: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExch/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #11891: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExch/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #11892: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExchEcdsa/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #11893: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExchEcdsa/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #11894: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExchEcdsa/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #11895: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExchEcdsa/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #11896: 'AllHashFuncs/TlsHkdfTest: HkdfNullNull/0 4' - PASSED ssl_gtest.sh: #11897: 'AllHashFuncs/TlsHkdfTest: HkdfNullNull/1 5' - PASSED ssl_gtest.sh: #11898: 'AllHashFuncs/TlsHkdfTest: HkdfKey1Only/0 4' - PASSED ssl_gtest.sh: #11899: 'AllHashFuncs/TlsHkdfTest: HkdfKey1Only/1 5' - PASSED ssl_gtest.sh: #11900: 'AllHashFuncs/TlsHkdfTest: HkdfKey2Only/0 4' - PASSED ssl_gtest.sh: #11901: 'AllHashFuncs/TlsHkdfTest: HkdfKey2Only/1 5' - PASSED ssl_gtest.sh: #11902: 'AllHashFuncs/TlsHkdfTest: HkdfKey1Key2/0 4' - PASSED ssl_gtest.sh: #11903: 'AllHashFuncs/TlsHkdfTest: HkdfKey1Key2/1 5' - PASSED ssl_gtest.sh: #11904: 'AllHashFuncs/TlsHkdfTest: HkdfExpandLabel/0 4' - PASSED ssl_gtest.sh: #11905: 'AllHashFuncs/TlsHkdfTest: HkdfExpandLabel/1 5' - PASSED TIMESTAMP ssl_gtests END: Fri Mar 31 19:05:41 UTC 2017 ssl_gtests.sh: Testing with shared library =============================== Running tests for cert TIMESTAMP cert BEGIN: Fri Mar 31 19:05:41 UTC 2017 cert.sh: Certutil and Crlutil Tests with ECC =============================== cert.sh: #11906: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA -f ../tests.pw cert.sh: #11907: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11908: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11909: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #11910: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA -f ../tests.pw cert.sh: #11911: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11912: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11913: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #11914: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11915: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #11916: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11917: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #11918: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA -f ../tests.pw cert.sh: #11919: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11920: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11921: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #11922: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11923: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #11924: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11925: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #11926: Exporting Root Cert - PASSED cert.sh: Creating an DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11927: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #11928: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11929: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #11930: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11931: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #11932: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11933: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #11934: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11935: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #11936: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11937: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #11938: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11939: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #11940: Exporting DSA Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11941: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #11942: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11943: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #11944: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11945: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #11946: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11947: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #11948: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11949: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #11950: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11951: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #11952: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #11953: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #11954: Exporting EC Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw cert.sh: #11955: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11956: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11957: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #11958: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11959: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #11960: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11961: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #11962: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11963: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA/clientCA-dsa.ca.cert cert.sh: #11964: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11965: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #11966: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11967: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11968: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #11969: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11970: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA/clientCA-ec.ca.cert cert.sh: #11971: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11972: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #11973: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11974: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11975: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11976: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11977: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA/serverCA-ec.ca.cert cert.sh: #11978: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11979: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11980: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #11981: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA/serverCA-dsa.ca.cert cert.sh: #11982: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11983: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw cert.sh: #11984: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #11985: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11986: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #11987: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11988: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #11989: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11990: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #11991: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11992: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA/serverCA-dsa.ca.cert cert.sh: #11993: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11994: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #11995: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11996: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #11997: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #11998: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #11999: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA/serverCA-ec.ca.cert cert.sh: #12000: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12001: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #12002: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12003: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12004: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA/clientCA-dsa.ca.cert cert.sh: #12005: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA/clientCA-ec.ca.cert cert.sh: #12006: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12007: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12008: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12009: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12010: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12011: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #12012: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw cert.sh: #12013: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #12014: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA.ca.cert cert.sh: #12015: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #12016: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA-ec.ca.cert cert.sh: #12017: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12018: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #12019: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12020: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12021: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #12022: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12023: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12024: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #12025: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12026: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12027: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #12028: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12029: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12030: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #12031: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12032: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #12033: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #12034: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA.ca.cert cert.sh: #12035: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #12036: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA-ec.ca.cert cert.sh: #12037: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12038: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #12039: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12040: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12041: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #12042: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12043: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12044: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #12045: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12046: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12047: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #12048: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12049: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12050: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #12051: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12052: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12053: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #12054: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12055: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12056: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #12057: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12058: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12059: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #12060: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12061: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12062: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #12063: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12064: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12065: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #12066: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12067: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #12068: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #12069: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #12070: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw cert.sh: #12071: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #12072: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA.ca.cert cert.sh: #12073: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #12074: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #12075: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12076: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #12077: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12078: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12079: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #12080: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12081: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12082: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #12083: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12084: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12085: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #12086: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12087: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12088: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #12089: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12090: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw cert.sh: #12091: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #12092: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA.ca.cert cert.sh: #12093: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #12094: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #12095: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12096: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #12097: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12098: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12099: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #12100: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12101: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12102: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #12103: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12104: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12105: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #12106: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12107: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12108: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #12109: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12110: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw cert.sh: #12111: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #12112: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA.ca.cert cert.sh: #12113: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #12114: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #12115: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12116: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #12117: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12118: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12119: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #12120: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12121: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12122: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #12123: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12124: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12125: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #12126: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12127: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12128: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #12129: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12130: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw cert.sh: #12131: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #12132: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA.ca.cert cert.sh: #12133: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #12134: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #12135: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12136: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #12137: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12138: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12139: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #12140: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12141: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12142: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #12143: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12144: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12145: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #12146: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12147: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12148: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #12149: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12150: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #12151: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #12152: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #12153: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #12154: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #12155: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #12156: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #12157: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #12158: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw cert.sh: #12159: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #12160: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #12161: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12162: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw cert.sh: #12163: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #12164: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #12165: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12166: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #12167: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12168: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12169: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #12170: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12171: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12172: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #12173: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12174: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw cert.sh: #12175: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #12176: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #12177: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #12178: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #12179: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12180: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #12181: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12182: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12183: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #12184: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12185: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12186: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #12187: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12188: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12189: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #12190: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12191: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12192: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #12193: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12194: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:73:1b Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 19:13:03 2017 Not After : Sat Jul 01 19:13:03 2017 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:bd:e2:61:f4:86:a1:fa:7f:25:39:10:2c:53:ee:35: 31:e0:c1:60:18:2b:3e:62:4c:35:bb:af:c0:47:e8:7a: 7b:77:7a:4b:13:cc:c3:ce:4b:ee:1d:98:ec:40:f5:d1: 3a:34:fa:c9:02:e6:ff:dc:c5:1e:8c:83:f0:bd:f2:49: 61:9f:14:5d:15:8c:2f:6c:92:03:3d:96:ae:61:45:4a: d5:97:f6:c2:37:7e:45:17:2a:df:a9:8c:7b:a3:ac:40: e0:e6:d2:9d:04:c7:d8:7b:71:7e:ca:1a:20:75:35:34: d5:d7:37:50:4c:71:2f:07:bf:f4:2e:a1:34:3d:37:4a: b3:a0:04:c1:40:cf:c2:d9:32:4f:55:f6:83:23:6f:f7: 92:55:b1:6e:e0:30:57:81:01:fc:54:d3:ce:d4:24:65: 14:0f:61:d5:d4:70:5c:2a:96:29:50:d7:c5:6e:b2:be: 0a:21:85:b6:f5:1e:b9:12:d3:90:fa:ed:78:87:e1:9a: 3f:08:b3:9e:15:04:37:09:8a:01:a8:5a:4c:07:27:ad: 7c:a7:0f:05:c7:9f:e4:66:26:1b:ab:e6:20:7f:65:3e: 05:e5:d6:d5:ea:47:76:09:6f:19:5f:2c:ca:8c:ec:bb: 7f:f0:db:b0:c4:db:c9:48:38:b9:51:e2:09:c1:7f:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:ef:70:d4:98:1b:b0:10:3a:31:41:43:3c:23:06:1a: bf:5d:c3:76:08:2f:33:9d:7c:00:6a:36:00:3a:3c:2d: ed:5a:17:76:04:fd:6e:a6:27:07:e6:35:90:10:1f:f1: 5f:7a:cd:b4:4e:23:bb:b3:e5:cf:0a:61:58:5b:88:2c: 99:b8:fc:21:37:ec:f9:cb:fe:b0:96:c0:e0:b1:32:51: e2:cd:ba:9a:58:e5:10:da:44:c3:24:70:c9:22:77:22: 4d:c9:0a:5d:36:c8:84:14:36:26:15:47:36:98:b5:9e: 43:e0:06:8a:15:88:46:36:cd:fc:55:95:db:6a:ed:bc: ea:27:ff:7c:8a:70:d6:ae:7e:2f:bf:a2:e8:07:d1:cc: a7:22:88:0d:34:f8:93:58:48:18:04:8e:df:62:5a:fb: 73:23:11:47:1a:b8:02:bb:c1:87:1a:d5:1a:a1:4b:2b: 0c:1b:87:60:5d:a1:54:09:8a:f8:da:e5:8d:b0:fe:8b: 62:84:c4:20:6a:08:3b:0b:17:e3:17:0a:19:50:d4:ae: 7c:5a:97:86:4b:2c:74:10:bf:63:26:9d:36:ca:8f:c1: 6b:cc:0e:95:fa:8e:7e:08:ac:91:b9:96:70:a0:fe:ac: 5a:54:99:0b:a6:ec:ac:41:23:65:b9:bc:be:c6:46:7d Fingerprint (SHA-256): DA:34:2D:D4:49:AD:53:00:53:82:34:11:B0:1D:7D:BE:90:A1:1B:1F:B2:DA:B5:C7:36:66:53:5B:DC:DA:2B:81 Fingerprint (SHA1): 8A:E0:41:62:6F:8F:BD:76:E9:DA:77:8D:3B:D5:CE:50:6A:1A:DC:33 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #12195: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:73:2b Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 19:13:34 2017 Not After : Sat Jul 01 19:13:34 2017 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:9c:db:2d:82:ac:7d:a5:4f:1a:60:85:82:ea:40:7b: 08:95:d5:dd:ff:28:19:ef:c2:9a:4f:66:28:92:0a:dd: 62:bf:28:86:30:a1:08:27:77:9e:10:47:09:eb:93:e8: 8c:e9:7b:ab:85:d5:34:f3:43:b8:bf:39:1d:d6:ca:28: 18:7e:73:d3:83:f5:bd:18:1f:a2:42:85:72:77:1d:b6: ac:4b:bd:7a:b9:ad:5f:2c:d6:40:02:f7:7b:ac:b2:ae: a8:e1:7e:49:ca:b8:e3:f5:8f:53:74:79:26:a2:5a:da: 41:8f:51:3e:a6:aa:fe:89:a4:36:ba:6c:b2:26:4f:5b: 39:c4:03:46:bd:ff:fb:80:24:f7:70:8e:1b:83:ab:d2: 2f:51:e3:7d:87:96:4e:21:f0:59:c2:5a:f9:92:99:d2: 15:1d:c7:dc:3c:bb:fe:ff:56:ec:11:eb:b2:be:a5:bf: 36:eb:0a:dd:b4:e5:41:00:b5:cf:1a:79:d5:8c:05:22: b8:d4:53:58:94:16:5a:32:c0:01:ce:2b:13:6a:98:c6: b8:cf:58:36:9e:d9:de:46:d8:ff:a3:6d:20:9a:48:d5: 7a:ee:0e:3f:05:82:00:c4:d3:c9:7a:79:6f:17:1d:af: f7:05:2e:89:97:52:73:df:e8:80:03:36:80:2b:36:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:c8:e2:fb:19:26:32:a1:1f:fc:cc:ac:34:50:f0:c4: 15:4e:a4:2b:86:4a:8f:8c:97:69:ea:b9:18:43:94:20: dc:bc:a6:fa:22:51:7b:62:e0:e7:27:7c:4f:a4:33:3f: d1:64:22:ba:65:b6:bc:ed:40:a2:bf:1f:dd:ce:28:3a: ad:db:9b:03:6f:cd:7d:ee:5b:a6:47:20:4c:e5:1a:74: a3:61:ea:53:7a:19:ae:7d:93:64:a1:9c:54:b3:15:06: 72:44:e1:59:f6:24:19:a6:ba:d5:33:37:63:dd:3c:76: 7d:1e:c0:1b:15:43:b8:b5:11:77:f7:6e:90:83:29:92: ca:2f:31:9b:a5:33:f8:a5:aa:cf:f1:01:0f:e3:1d:62: a7:0d:15:6d:58:da:95:9a:a1:fc:cf:60:4e:1f:7b:88: 1a:45:25:ab:92:11:b7:59:bc:0e:7a:0d:32:df:c3:7d: 28:67:f3:a9:a6:d7:f1:92:16:95:4d:ca:3b:46:15:f2: 6a:95:49:d6:a1:05:79:60:af:f4:d9:84:47:8e:92:b6: 19:66:2b:59:05:8c:a2:d6:a7:ff:4c:5c:14:2a:67:a7: 00:08:76:80:0b:a7:f2:5f:c7:0d:a7:ae:f5:5c:58:ee: 79:7b:91:c4:07:64:c1:f2:d0:94:88:39:61:bc:40:67 Fingerprint (SHA-256): FC:2D:65:F1:26:43:58:D2:21:BD:26:36:82:CC:B6:01:AD:A0:66:F1:EA:9D:B0:C8:A1:42:93:7A:FC:6C:34:07 Fingerprint (SHA1): 69:ED:3F:D2:9C:CD:98:2F:F1:09:50:0F:D0:6C:6C:39:01:CE:7B:A3 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #12196: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:73:66 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 19:13:50 2017 Not After : Sat Jul 01 19:13:50 2017 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:4b:62:65:16:49:a4:a6:3c:bd:63:e9:56:ee:df:78: 1a:40:2a:df:2c:9c:f3:5f:f7:1f:1a:75:65:94:af:9e: b5:73:ab:9f:b8:29:65:26:33:f6:fa:2b:0f:55:9a:0c: 03:83:ee:57:a2:68:60:5f:a0:d0:96:d7:47:9c:50:8e: c8:19:7b:0f:3f:fd:ef:e3:4e:b1:47:94:29:a6:a8:af: 64:da:d2:60:d3:a3:da:29:9c:94:9b:27:c4:ae:17:af: 1f:a0:3e:ec:07:a3:1a:90:2c:7b:7f:ac:6f:bf:49:5d: 2f:d3:a5:a5:a8:61:5e:e7:69:80:2c:68:4c:72:be:36: a6:05:dc:f4:63:20:ac:a5:af:8b:21:be:2a:4b:9d:1b: cb:a7:f4:2a:81:b6:bc:4b:7f:a7:cb:40:7d:c0:4c:0a: 01:8d:be:3e:5d:ba:bc:2e:1e:48:eb:8c:c1:2c:f5:b8: 3d:ee:c4:dd:28:ca:6b:4f:a5:33:58:eb:b7:04:7b:94: 80:e1:95:cf:87:02:91:66:b2:57:e4:9b:6e:24:be:65: 57:6b:e6:b4:37:1b:cd:b9:77:0e:ae:a7:1e:b7:8d:b4: 4d:14:88:a8:31:b0:a8:ad:82:5e:bb:bd:5e:11:73:62: 78:44:93:ce:03:cf:bc:dc:c8:69:5f:9b:55:40:ad:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:b9:f4:8b:7b:62:8c:71:b0:0e:99:46:a9:0d:a7:ea: 12:99:4d:c8:df:9b:4e:c9:bb:7b:18:8d:9d:2f:e9:a7: df:53:6f:84:f9:93:4e:5b:dd:86:5e:6d:60:72:61:f2: 11:f4:35:6b:48:09:ae:78:ee:b4:20:3e:69:b4:19:89: bf:0e:89:47:54:ad:13:48:04:d7:60:e3:54:49:77:c4: bb:b1:5e:e5:94:ed:1d:a3:c6:33:bf:64:97:86:00:1c: 89:f1:99:17:88:2c:ce:33:c0:1b:8a:25:06:e1:a2:47: 90:dd:c9:84:ba:82:75:7d:9e:0c:03:94:0b:70:7e:c8: c8:86:cf:72:e0:ae:1c:0a:b9:a9:26:37:35:c4:15:1c: 64:84:8d:d6:38:b4:20:82:9a:1c:91:7e:d4:9b:1f:f6: a7:9c:6c:9b:fe:a1:18:60:a1:5f:f1:62:01:97:6a:a3: 89:24:60:f7:2a:a9:ac:5c:17:df:f6:0c:ff:bc:98:1f: e3:32:51:d1:36:90:6c:70:b4:f2:19:60:62:b5:96:cf: b5:e6:e0:26:53:27:32:5d:99:e7:81:af:d1:fc:4e:cd: 38:1f:80:10:45:c7:f4:a2:a0:48:61:e2:f2:62:44:89: e5:70:a3:84:69:d9:69:6a:2f:17:cb:32:58:c8:2c:eb Fingerprint (SHA-256): E2:61:1F:A6:49:62:1C:CA:C0:06:11:5B:A5:05:EA:42:DC:21:DE:08:48:FC:01:B9:02:B0:3D:DF:41:F0:56:68 Fingerprint (SHA1): 08:B1:AC:39:2F:AC:FD:CF:86:83:76:B9:C4:90:06:E2:52:1A:C5:76 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #12197: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:73:84 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 19:14:04 2017 Not After : Sat Jul 01 19:14:04 2017 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:3b:b2:79:41:5e:7a:98:24:0d:40:e6:5a:8e:df:c0: a7:99:40:ec:d9:64:a6:fe:22:68:ba:e3:8a:7d:99:9c: 2b:d9:13:c9:4e:90:94:4e:fe:1e:a2:1f:90:16:9c:9e: 68:65:62:95:a7:06:97:db:46:b2:43:42:01:0f:04:e2: f2:c7:4c:7e:9a:1e:cc:e6:24:37:7f:d6:06:85:ce:f8: 62:2f:a3:4b:12:f6:d2:b0:ec:77:dd:04:02:ca:85:42: 96:62:93:57:7a:0d:43:89:39:f0:b1:8f:d4:ef:18:ee: cb:a0:57:d2:f8:2c:e5:72:23:57:2a:01:3b:00:f0:6e: c6:17:6b:5e:64:4a:62:93:cd:84:93:a4:d0:77:20:a8: 00:cc:32:20:b7:f3:b4:c5:ce:cc:7a:ad:2d:d1:06:d4: c9:2e:f6:8e:fc:34:e5:0e:91:08:57:d4:9b:a7:6f:86: 76:42:37:d2:a8:6a:89:80:3a:44:d9:3e:8a:51:b9:57: 6f:71:e9:52:0f:37:8b:08:b2:cb:3a:d5:d9:1f:ea:50: 6c:56:84:9f:02:99:70:f8:f1:a5:f1:ee:2d:e2:e1:58: 45:76:5b:94:68:ce:c1:65:12:6c:13:f0:26:fd:4f:ab: 37:ad:04:0d:3a:d6:67:25:00:3b:e5:86:71:f2:c1:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:af:fc:dd:87:8f:60:e8:58:c3:ed:51:8f:6b:c0:ec: 9a:25:4f:32:80:16:53:ce:dd:52:94:58:34:44:f2:5c: 3f:12:ea:9e:76:22:8d:cf:9c:f9:c4:aa:16:1c:b5:98: 54:95:8d:2c:46:89:bb:e3:4d:85:aa:95:85:38:22:13: 4b:fa:03:46:81:c3:ec:eb:12:b7:69:46:4c:39:58:d6: 70:cd:1a:c4:9f:6f:46:7c:3d:fe:dd:81:cf:dc:a3:10: 7c:80:a7:03:be:9c:01:1c:26:11:9d:f0:87:36:6b:90: af:c3:ed:7c:35:f4:b7:82:b8:64:46:5f:9b:a1:88:8f: fe:84:1c:6b:20:c2:83:0c:05:f8:cc:5b:b3:a2:83:15: 56:d1:49:99:e1:8f:14:3d:80:00:05:ac:cc:2a:58:97: 70:a0:bb:75:53:8d:af:46:82:5e:a4:5e:76:30:de:78: 13:5e:31:8a:d1:24:a5:25:03:49:84:9f:29:b6:cb:67: 57:ef:dd:42:42:df:ab:49:ff:a3:0e:be:23:e7:fe:b4: 92:12:17:e5:9f:61:54:e6:7f:dd:e3:58:26:77:51:9f: 13:8f:cf:f2:35:88:cf:a3:2a:35:7b:1c:98:ef:a2:ed: b1:1d:86:4f:99:67:75:a0:8b:e6:71:ec:0a:0b:d0:7b Fingerprint (SHA-256): DE:13:3A:93:F1:81:82:46:D2:FF:4E:B9:EE:BC:26:DD:D6:AE:C5:F2:13:97:40:45:25:E8:0D:83:4A:0F:8E:08 Fingerprint (SHA1): E7:43:41:01:E9:00:12:24:57:47:5D:14:7D:75:39:A4:B6:76:31:64 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #12198: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:73:a0 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 19:14:09 2017 Not After : Sat Jul 01 19:14:09 2017 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:d2:b5:39:b6:a2:2f:21:7a:44:92:9a:f0:f1:5c:07: e8:6a:d7:33:11:d9:bb:30:42:b4:d7:96:75:01:f8:ae: ee:d5:44:83:e1:77:4a:a8:50:19:ab:e0:51:fc:07:75: 1a:83:55:1f:f4:4f:08:70:75:f7:ed:e5:ad:5d:bc:af: 02:2d:43:15:64:ff:fd:94:23:60:c1:54:af:ff:23:68: ef:ba:c4:92:ec:1d:b5:79:28:2b:b7:57:e1:2f:f5:99: cd:4a:3f:86:0b:18:9a:1e:2f:35:a0:2c:71:26:83:aa: d3:27:32:b6:15:2c:0d:72:c4:c6:6f:f3:6b:c4:8e:07: e8:eb:5b:36:c9:81:a0:7a:b6:fc:c4:96:f5:9d:fe:c4: ec:35:05:1d:f4:13:6c:48:2a:00:85:d0:e2:ec:9c:31: 7b:8f:73:25:d5:90:14:66:22:e3:2c:dd:b8:23:90:70: cf:34:1b:48:b6:8a:89:94:19:af:ee:49:61:37:d6:3e: 14:52:08:70:31:bc:bf:35:46:2a:e1:6b:2b:cb:9a:bf: d7:a1:77:a4:ae:d8:2e:9f:28:76:d7:41:e5:b6:ab:14: bd:f5:53:e0:66:be:91:76:f8:e2:69:9d:af:2a:a6:92: f7:09:60:bf:40:01:f2:67:8e:fc:50:6a:2a:2e:03:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:f7:6e:6b:6d:f0:c7:c9:c6:ff:38:82:21:e3:70:31: 4c:d0:f3:fc:74:0d:7f:17:fe:09:e7:04:aa:06:09:d9: 1f:3b:aa:e4:bb:89:15:72:d5:fd:4b:23:a9:d9:43:9b: 24:f4:f9:2e:5a:a6:63:72:c9:71:5c:b3:03:eb:cc:17: 73:8a:21:a3:00:0a:8e:e9:a8:53:e2:ad:bc:4f:68:a2: 35:7f:3f:10:12:7a:11:fc:b4:73:6f:a3:81:5d:c6:0f: 3e:0e:36:ce:26:9a:cc:96:36:9f:ae:6a:a2:d5:3b:57: f5:a9:16:96:4f:12:a7:c2:42:6a:ca:b1:03:f8:e6:72: c5:53:85:bb:58:6b:5c:a0:bb:c8:6c:03:e1:43:50:68: 56:bd:bb:1c:61:1f:aa:1c:55:c8:48:d8:15:6b:16:52: 1b:ad:e0:d3:73:7e:42:8f:16:cd:a5:68:7c:6e:6d:ab: 33:6e:a3:99:17:74:bc:46:66:59:b6:a8:a5:db:7f:e5: 54:e3:8c:2d:ca:5d:cf:de:fe:be:fe:5c:1f:98:70:a4: a6:54:d8:13:3d:90:ae:6a:37:ae:cb:21:7f:e6:f7:8a: cb:27:a7:8c:e3:e2:4a:11:97:7b:96:9b:b9:fd:07:56: e3:05:26:c2:80:4d:9a:6b:f9:e1:b4:92:0b:09:cc:5f Fingerprint (SHA-256): DB:63:62:B7:06:77:AA:F6:73:59:A6:FC:FF:66:21:46:35:29:5D:11:F2:90:F8:11:74:EE:FD:66:9F:6B:61:91 Fingerprint (SHA1): B6:3D:17:76:98:8F:E6:7E:A9:DE:CA:4D:2D:31:2F:89:9F:61:8A:F7 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #12199: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:73:ab Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 19:14:21 2017 Not After : Sat Jul 01 19:14:21 2017 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:0c:4a:a8:6e:0e:70:80:9c:80:59:51:a2:5c:f8:57: 8a:6d:5f:ee:54:d1:00:f8:33:62:3d:7d:92:6e:12:b3: 1c:61:5a:e8:b9:fd:a7:14:b6:05:c1:b4:f6:e6:fc:4b: 30:52:c4:42:0c:a3:28:4c:bf:a3:fe:85:e1:37:3e:44: 18:58:10:3f:df:f7:62:f8:cd:9d:f7:19:c7:e1:63:a9: 5f:15:22:00:f3:79:d7:32:ac:97:91:cc:aa:a1:d9:44: f2:4c:73:8c:7c:95:53:c7:19:8c:a9:c6:10:0b:aa:24: cc:d9:05:52:67:62:9a:c3:17:ad:0d:84:9b:6a:64:5b: 2b:09:f7:8f:1f:19:05:55:b1:45:90:19:71:52:90:79: 97:c8:96:e5:31:9f:8d:87:e2:73:cf:12:4c:92:f7:02: 54:23:8a:05:58:2d:4c:30:2e:02:b0:7b:d9:54:2b:75: 61:b9:dd:18:e4:ca:24:56:46:6a:49:de:32:39:ff:73: 52:9f:a6:04:6d:f6:12:84:01:7b:2e:c8:3c:b6:bf:57: 23:19:53:f6:a0:e2:76:94:d6:a5:5c:7d:ec:a0:be:e5: 6f:3d:5e:38:bb:5d:a0:ac:7b:ec:62:14:f9:11:b1:4a: 72:ff:22:f1:18:2b:fe:9f:9f:1d:68:b4:0e:4d:7d:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:17:4d:08:3f:33:9e:d4:39:f5:f2:4d:41:69:83:f5: 8f:8b:2e:06:07:7b:55:d6:95:48:5f:f0:1a:51:13:07: 97:d4:1a:c2:f3:bd:ef:6a:76:c2:76:4c:d7:9d:e4:ea: d0:25:10:6e:06:8d:83:80:b0:cd:16:02:f6:5d:01:a6: 84:a9:41:dc:dc:a8:b8:13:82:79:54:c8:07:4c:4b:44: e4:79:ae:cb:ee:f5:8c:e4:d0:70:e4:19:4f:b3:df:59: 7c:fd:29:96:81:20:ea:be:a9:37:63:02:0e:90:7a:55: 23:66:d1:45:4d:8c:41:c1:1c:17:58:cc:34:71:ca:df: bb:96:27:ee:d1:eb:77:04:17:21:6e:51:3b:c4:21:32: 94:77:a5:14:47:74:b1:64:a7:92:e5:b0:09:29:b2:bb: ed:63:df:85:ec:cf:be:61:47:83:f6:a3:15:87:c8:bd: ca:51:fc:88:7c:1d:cd:7c:4f:e3:a9:8b:b3:ff:ee:44: 34:59:33:d5:8b:a2:e0:be:e1:58:3f:bb:0a:ce:35:6f: 59:a4:84:cb:be:e0:f1:f2:9f:2e:87:68:c3:15:ff:ad: 08:14:00:43:57:dd:f9:73:af:b1:6f:b7:cc:5a:b4:7c: 51:04:78:e3:4f:08:85:af:fc:01:f5:66:2c:9e:2e:46 Fingerprint (SHA-256): A0:D5:B4:91:CF:41:8F:C5:A1:9A:5E:DB:2C:81:11:14:5B:D9:4E:DA:59:56:40:E7:47:54:DA:9F:81:77:C8:D0 Fingerprint (SHA1): BF:B3:8E:87:B5:B9:D9:99:CA:09:60:D9:81:13:E4:75:A9:F3:08:B2 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #12200: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:73:c1 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 19:14:27 2017 Not After : Sat Jul 01 19:14:27 2017 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:97:1c:a8:bc:a2:90:c2:c8:d9:61:8a:2e:06:66:62: 7e:a1:fc:a9:57:93:64:1b:f8:72:36:f5:57:35:ac:43: e9:66:73:f1:9c:35:5b:0c:08:97:46:81:d8:37:e9:99: 3c:f0:28:f5:d9:4c:5a:fb:7f:99:1c:2c:68:3b:ee:13: 06:a8:89:64:42:8f:a7:3a:d2:5c:7b:56:54:54:53:a7: 7f:c9:a4:69:da:1b:45:d4:fc:fd:c6:1b:34:38:a8:1f: 62:45:0a:c3:7c:7a:6e:df:a7:63:a5:9a:53:8e:e6:82: 7b:35:cc:d9:e5:fa:36:d5:6f:40:6a:2a:8e:16:2d:2a: 1c:cd:43:01:00:0a:92:8c:03:d0:7a:5b:59:c4:43:62: 08:db:fe:97:77:4f:a1:5e:3a:4e:a7:d8:b4:d6:6d:c7: 61:16:03:1e:1a:6a:f0:f4:17:60:ac:1b:c7:59:71:a4: c9:a9:52:ed:a2:f7:24:e5:66:a8:11:0d:10:dc:bb:81: a6:dd:99:2c:6f:94:59:2a:92:63:ae:4e:0f:d5:cb:57: 3c:1a:08:d7:44:a7:11:72:93:80:99:32:b6:2a:2a:5e: bc:16:01:11:a3:5f:18:77:84:96:e6:70:b9:32:f2:b8: 70:e9:16:c7:a3:0b:f6:72:d0:af:ba:5b:03:95:8d:cf Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:cf:95:d7:e9:96:a6:d6:fc:9c:1b:9a:21:5d:dd:d8: e1:d5:a0:54:61:18:5f:a1:c3:98:95:f9:78:48:0d:77: 89:e2:87:37:48:8e:45:9f:6a:1f:c0:57:6d:02:64:21: a0:92:2c:62:e3:23:0b:8c:bf:ca:ba:ee:78:5d:26:c6: 85:a9:5d:b6:79:55:12:57:29:9b:74:79:16:a3:b5:d9: dd:a3:a4:02:7a:21:c8:bf:21:f2:cf:52:12:af:7c:8f: 8f:17:ef:57:40:92:dd:56:58:35:1a:bc:b1:eb:37:4b: 0d:be:c0:bd:88:90:52:74:20:6e:ae:35:82:d2:3c:4a: 69:a0:09:82:97:91:4f:ed:24:64:8c:b3:13:05:19:35: d2:b1:62:db:dd:ad:8a:8c:5b:87:d6:c5:19:7f:0e:27: 3c:2f:b1:94:c9:6e:b9:ab:0d:71:b3:46:e4:56:f5:6f: 8b:c8:b6:7e:10:85:1b:ef:5c:d6:3d:6f:c3:05:0c:61: 92:a3:bb:83:a7:3b:02:78:5f:ea:96:d5:62:dc:3a:1c: be:27:e6:2a:ad:5f:25:6d:9a:ca:34:01:b2:ba:52:9c: 94:f1:4d:c1:da:97:bf:1b:2a:fb:3e:95:0e:eb:81:66: 51:93:84:33:4a:9a:8a:a4:99:d2:c5:8d:f5:2b:44:47 Fingerprint (SHA-256): 7E:DB:CE:5F:BA:36:06:8D:FA:36:02:DE:71:E7:E2:FF:3E:8B:CD:C2:65:DA:9B:28:9A:3A:E2:2C:6B:CE:1B:27 Fingerprint (SHA1): 5A:00:D0:75:3E:72:64:E6:B0:36:63:55:EA:82:94:4D:0A:6A:19:0E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #12201: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:73:cd Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 19:14:42 2017 Not After : Sat Jul 01 19:14:42 2017 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:3f:4a:1d:99:0c:57:82:6f:e4:5b:62:9a:55:fe:9d: 86:f0:cf:99:7d:ae:7a:c1:cc:c1:04:1b:5c:49:f3:8f: 1d:0d:d7:ad:e0:f3:45:c5:e4:74:fb:67:e7:c3:c4:5a: b1:71:0b:f3:c3:ba:87:41:e8:b8:39:6a:38:11:12:93: c8:1b:6c:96:32:95:55:a5:07:cc:d2:04:58:7f:e4:d3: 49:0a:fd:1f:17:d3:56:7c:2b:fa:13:6e:d8:62:8c:cb: 4e:e6:b0:c0:7f:eb:81:ed:d1:92:60:3a:25:28:d4:84: de:dc:94:01:49:cd:e0:1f:1b:b6:80:5c:25:a0:8a:bf: c6:69:7f:4b:91:1b:de:ac:7e:8b:cf:19:4e:e2:58:f6: 35:14:41:32:48:a5:99:cf:2f:0d:30:30:2f:bb:f3:86: 9b:54:23:1b:63:9b:28:a8:b7:2c:ef:60:ad:3d:06:f3: b8:6e:3b:60:29:d0:83:48:87:df:a4:6e:56:d9:19:f6: f0:16:5b:19:0e:00:42:d2:af:3d:23:01:f3:9d:a7:fb: 4c:70:18:1f:9b:96:7a:9c:43:d5:50:32:c5:44:e7:9d: 4f:b3:0d:04:10:b7:9c:32:f2:5b:aa:52:b6:be:3f:d5: 94:05:5d:cf:a7:11:c7:76:6f:e3:a3:fd:c3:fe:d0:8b Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:5b:d9:c5:c8:da:6a:e2:95:65:b5:31:32:ba:f4:81: b7:e3:2b:b9:b5:6d:16:42:d7:b4:7d:3b:2c:f3:2e:ac: f7:20:e8:98:71:1e:cd:6d:9c:41:06:c4:11:05:dd:25: 91:da:bb:e8:43:02:94:f0:ad:f3:39:31:fa:fc:81:5f: eb:74:f0:bf:16:48:f3:62:40:dc:74:2a:58:a4:8c:ec: 6f:5f:0c:4b:a9:93:a3:2c:7b:6e:e5:56:f2:c1:a0:93: 52:bc:9b:80:6a:74:7e:88:f5:cc:3d:5a:33:f2:11:52: 40:29:78:46:a4:5a:e0:91:0d:82:04:e2:a4:df:b9:ce: 1c:7b:5d:32:3d:2c:d3:15:65:ff:26:75:34:be:0f:18: 0b:a2:e8:0c:a8:d8:ae:1f:43:a7:6e:40:da:d0:8a:da: 2c:ab:d4:7d:02:c7:08:96:8a:16:41:3f:01:af:6d:8c: 90:ab:c7:e5:7c:76:8f:75:d2:03:41:3e:dc:e3:63:b8: b3:67:53:ac:d6:5a:2f:21:67:f1:b7:a4:38:aa:17:59: 59:04:85:9e:68:27:53:17:6d:5d:df:22:53:1f:48:d0: 7d:b3:4a:97:e8:14:01:ec:12:9a:63:1d:98:c1:17:74: a8:61:2f:98:d8:b6:60:1e:e9:07:37:87:46:72:af:7f Fingerprint (SHA-256): 28:FC:84:C9:7B:F3:79:7E:BA:14:56:6B:21:8C:02:F6:FC:A7:FF:55:B6:4E:E7:74:D1:4E:19:39:64:18:99:ED Fingerprint (SHA1): 58:E6:98:E7:65:93:48:86:B4:42:13:C2:64:76:0C:6A:68:B1:15:5C Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #12202: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:73:e8 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Fri Mar 31 19:14:57 2017 Not After : Sat Jul 01 19:14:57 2017 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:39:ec:9d:82:6c:29:4a:31:4b:5e:db:32:d9:fe:37: c3:a2:c5:74:51:21:74:77:c9:74:9f:4a:93:c2:05:b3: cc:a8:e7:28:21:b8:6a:58:bc:e8:66:2e:bb:c1:71:9b: bf:4e:f4:86:04:b8:09:20:51:bc:c7:c4:a7:4e:d0:da: 14:1d:09:8c:58:88:87:41:ab:62:e1:e0:94:9a:ca:0c: b8:92:19:72:71:25:8e:48:99:ae:47:40:7d:a9:47:23: 25:f1:78:e4:fa:2a:64:b7:19:af:6a:d1:78:63:a0:a8: 82:23:82:4f:d4:e4:7b:27:dd:74:07:16:74:71:d6:57: 95:d0:8b:47:03:5b:cf:b3:bb:bd:e2:4a:73:09:05:73: e3:47:eb:6b:ae:3e:b7:ba:13:f5:9e:cb:ed:c7:43:ad: 65:19:df:6a:7a:16:c8:ad:50:55:63:c8:c3:8e:59:c1: 40:cb:a6:db:52:a6:39:28:e6:4a:d5:60:31:23:58:11: e7:43:53:72:d8:a4:e6:6e:9a:a4:6f:c1:1a:4c:d6:54: b6:51:7a:2f:ad:c7:45:19:07:45:e7:cc:96:e5:8b:1f: cb:86:fd:f8:16:dc:9f:b1:e0:e6:c7:7a:6b:a4:ba:6e: 91:2f:b2:0f:9b:88:48:fd:d7:0b:bd:d5:3c:2d:43:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3b:78:a0:bc:7b:9b:85:77:22:c6:28:a7:f5:a3:32:1a: a6:5e:d5:67:c4:05:d0:89:3f:1b:3e:38:6d:f8:46:18: 92:9e:76:a8:79:39:23:90:5e:43:36:92:15:86:4e:de: 76:3e:63:2f:ef:34:74:7e:5b:ec:79:97:3a:88:8d:05: 1f:f7:21:18:00:a1:ee:5d:2e:38:f1:ff:c0:52:b5:e9: 32:84:7b:d6:91:78:70:05:2b:3a:5a:5b:df:6d:bd:1f: 6a:0b:75:33:36:d4:2a:e4:8d:c1:bb:9a:c8:e8:d0:37: 6b:b1:86:7e:1b:ce:a4:ec:eb:bd:ce:47:bb:10:72:24: 69:4e:1e:4e:fe:26:b9:63:a7:a8:b2:6d:95:ce:56:d5: 7c:a7:7f:b9:5d:e6:68:34:83:cc:c8:d2:e7:1c:cb:d4: 60:9d:eb:73:63:9e:10:ab:43:a7:2b:3f:1d:9c:44:8e: 15:a9:6a:44:7a:9e:91:99:cd:2b:b8:10:a7:2a:03:1d: 29:cd:77:cb:09:bd:46:64:9d:ca:bc:74:12:18:52:33: 1a:83:31:1a:a5:f9:59:b1:c6:e9:8a:e7:bd:53:b7:4f: 12:a8:e5:69:b2:aa:1e:6f:5d:81:64:54:05:48:18:08: 27:e2:e9:47:b9:51:68:21:8f:23:0d:40:b7:0c:7d:5f Fingerprint (SHA-256): 16:C4:71:5F:E2:65:D4:04:44:01:A2:08:95:70:12:AE:99:3D:3E:5E:F4:21:E0:C5:D9:05:0C:56:7E:1E:63:9B Fingerprint (SHA1): 72:35:11:B9:17:23:63:73:E1:B7:3A:1D:E5:EF:CE:9B:55:7E:23:74 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #12203: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:74:05 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Mar 31 19:15:18 2017 Not After : Sat Jul 01 19:15:18 2017 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:a8:8a:81:05:9b:d3:2d:53:fb:3a:3d:19:44:f7:63: da:a5:16:0f:e5:f9:47:ae:12:25:2a:17:15:b4:b6:f1: db:2a:6c:c3:2f:f4:73:8a:a3:d0:6a:a3:73:f0:48:59: 8c:8a:8b:b9:ff:a5:90:36:11:c7:99:22:04:7e:95:1c: 27:4d:45:36:43:5f:56:cb:3d:f9:fb:d9:bf:6f:dd:94: c0:80:7f:06:4c:7c:79:9a:86:ab:f9:db:64:ec:c6:41: ba:b6:3a:33:30:ec:b4:61:17:ab:1f:96:ac:a7:c6:cf: 56:80:4f:56:d3:31:be:0a:fb:65:e2:6a:d4:e8:6a:40: 64:19:fa:2e:ca:b9:c3:16:3c:77:7c:dc:f4:17:90:d4: d2:09:9b:f2:38:51:cf:19:c6:f8:8d:0a:0c:2e:78:f0: 88:c0:44:ae:ee:97:8c:34:cc:dd:6a:4a:97:a7:ab:8a: b3:6d:55:09:58:f5:60:6d:ea:49:f7:d9:a3:52:5c:3c: c9:7d:9d:e5:91:57:49:5b:93:ab:b6:bb:c6:cf:1d:54: 8c:25:3b:85:f4:ed:4a:f2:48:d9:67:0a:3d:5a:0a:b8: 19:90:7e:c7:b7:0e:ab:69:60:3f:f1:de:9d:41:62:fb: 7f:d1:39:b9:86:df:1c:9c:93:c1:1a:d4:59:62:d6:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:b4:90:0d:0d:bb:41:b3:97:ec:7b:2c:63:91:97:15: ff:29:00:6b:dd:34:09:48:3b:67:16:b6:48:4c:3e:ee: 69:0e:dc:fb:7d:6a:0a:75:3b:40:7c:7f:12:a9:09:d6: 8a:55:4c:d8:37:d9:8e:f7:2d:32:f3:7c:1d:44:b4:42: f6:c7:55:46:b4:a8:57:1e:4d:ad:18:ec:fc:aa:40:03: 44:13:c2:19:02:c9:ec:86:24:8e:92:16:6e:92:87:a3: 95:10:8e:a1:b5:29:55:ad:0d:52:14:f5:97:75:e1:d3: 94:87:95:23:2e:7c:dc:6c:63:56:d6:18:eb:48:b3:f2: d2:01:18:46:8d:36:2e:15:6b:0d:b9:cc:b6:95:3d:bf: 3e:d5:69:1b:ff:ee:ba:22:4c:af:c1:2e:94:4a:4e:b0: a4:76:35:ab:89:6f:3a:9f:f9:97:f5:43:79:cc:ae:c6: 39:29:7f:fd:e7:51:81:37:85:3b:ed:b7:f0:c6:03:fd: 04:d3:8c:97:d6:c5:5a:30:a1:36:70:a8:89:41:f1:cd: b3:a7:4f:ea:09:2f:f7:45:b3:37:6a:05:c8:d6:81:aa: 07:f3:62:eb:7e:bb:96:97:96:25:03:9d:29:f9:f1:d8: 40:7a:cd:43:f2:a6:fa:fd:2c:52:0e:a9:7f:c0:3f:25 Fingerprint (SHA-256): 00:D8:E2:73:1C:A8:0A:6A:89:9F:73:15:66:B9:71:6B:E7:16:6D:B5:12:C4:2F:31:0C:28:76:84:95:02:BF:38 Fingerprint (SHA1): 54:D0:CF:7C:F9:A2:21:18:53:C6:9C:D3:A9:68:B9:CD:C3:DB:3B:16 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #12204: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:74:2d Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Mar 31 19:15:36 2017 Not After : Sat Jul 01 19:15:36 2017 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:1c:d9:83:d9:f2:69:ac:c5:c6:19:20:87:69:05:7c: 1b:8c:b7:5b:a4:9e:ce:ba:67:0a:0d:bb:7a:80:8c:ed: 8b:e9:6b:d2:09:e0:55:8a:83:98:46:0b:59:0c:6b:70: eb:1f:a1:b9:1f:64:81:84:fd:db:e1:08:91:2e:52:27: d6:91:f3:e9:d5:3d:cf:f8:4a:1e:a7:76:95:ee:9b:73: c0:f2:79:28:ab:75:bc:a7:72:0b:eb:e3:d9:78:41:d6: f7:d0:02:50:25:5e:c4:95:db:57:45:57:bd:e7:b1:50: 73:92:51:38:73:ad:ad:04:be:5f:e9:8d:e2:eb:5c:9e: 71:be:9d:61:2f:f0:71:66:76:1d:c5:6d:d1:d0:d4:1b: 08:12:4f:83:5d:ef:c7:67:67:49:8e:08:11:d1:e9:fd: e9:b6:8f:f8:ab:74:fd:24:c5:49:fe:15:9b:43:9b:41: d7:5e:4a:8a:fc:33:d2:2a:ae:cd:71:af:15:b9:13:8c: 71:da:5f:a0:17:d2:89:bc:46:0f:a6:99:18:35:4d:3d: b7:b5:ab:88:cb:02:34:f6:93:b6:bf:5e:d0:a7:a4:4c: f8:58:c1:80:ea:8a:0b:40:0a:dd:c3:79:66:79:18:ab: 5c:1c:61:9e:2f:d5:0a:64:d6:4a:ba:0b:53:55:f7:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:13:60:e2:9e:d3:24:ec:7c:e9:d8:6b:18:22:74:d1: 5b:0e:28:c2:da:dc:2d:d6:ad:eb:da:72:02:13:83:37: d5:8e:d8:d2:73:cc:1c:ff:df:d7:9b:41:ab:f4:93:6f: 29:0c:75:89:58:aa:a2:3f:2f:a3:a1:33:93:fb:ac:8d: 98:e9:70:fe:24:b9:a1:da:10:38:f8:a1:d7:5f:30:f9: 22:dd:05:87:0c:69:4d:ad:7b:fd:26:f6:8b:ec:9c:52: 13:92:3a:7e:41:dd:46:da:79:e8:6e:a7:36:eb:cf:5a: 5e:1f:14:b8:f0:74:4a:3f:61:73:6c:71:75:f3:8d:ea: 64:82:c4:97:7a:f8:10:30:cc:8d:e7:77:3e:22:40:29: ae:64:10:2f:13:21:9a:b6:eb:df:67:a2:98:ba:83:5c: 50:b2:b1:1d:8d:b7:26:62:0d:f5:c9:8d:8a:cb:11:a8: 9c:3d:35:5c:1b:23:49:50:c5:0e:b2:62:e7:f2:c5:ce: 3f:de:f2:8c:73:ed:05:97:0a:9c:66:99:fa:41:45:3c: 1d:b0:25:00:08:71:99:9b:75:2e:3c:aa:e9:84:23:9c: 0a:4e:e1:1e:5e:25:ae:f7:f9:4b:73:27:bd:1b:69:51: 93:61:ca:46:3a:e9:92:31:d5:af:09:07:d7:38:20:60 Fingerprint (SHA-256): 13:41:00:02:3B:BF:96:57:D2:32:73:5F:A4:9D:97:DC:D7:67:A5:23:B8:AD:A4:E8:DE:B4:D8:8A:32:AE:0D:B0 Fingerprint (SHA1): 50:06:C3:3B:DC:52:91:71:58:E0:86:A6:AB:63:67:FD:32:59:FC:63 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #12205: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #12206: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #12207: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #12208: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:74:7c Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Mar 31 19:16:14 2017 Not After : Sat Jul 01 19:16:14 2017 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:9c:53:e2:8a:b7:20:2c:27:ca:ec:cb:9a:b0:93:fa: df:d2:db:0e:2e:46:30:b2:b8:e2:f7:0c:7b:56:83:bc: b8:8f:1d:5d:db:97:22:7c:a0:1e:88:58:88:7e:ea:b7: f9:f4:c2:3b:4b:fb:22:32:4a:30:9d:fe:a8:c3:e0:3a: bb:d6:f1:54:16:a5:18:f1:80:7d:3d:cc:d3:76:44:e9: e4:42:32:3e:3d:83:e0:f7:ef:c5:32:a1:0c:ae:01:1d: 22:ed:0e:56:f0:53:4a:17:53:75:7e:fc:d4:c1:a4:2c: 90:dc:f6:19:3d:1e:00:72:e4:9c:92:47:f2:b4:2b:a4: 3c:ab:1a:46:bb:fa:79:48:6d:20:32:32:bf:cd:05:90: 73:67:83:b5:7a:c0:41:97:6c:42:d7:c4:c9:9a:43:0d: 9d:ee:50:bd:f1:b1:30:bc:f2:08:72:ff:8e:c8:c3:3a: 07:38:c7:61:08:5c:b2:be:d7:57:41:55:42:f1:53:54: 1b:36:8f:1b:cc:29:01:fb:6f:40:a3:e9:b2:43:bf:ef: 63:b4:16:8b:71:f1:1e:df:00:4a:fa:09:ca:53:81:3f: a7:13:e9:8e:f3:d4:34:99:6d:cd:d5:8d:5d:8f:54:0a: 25:3d:1a:55:6a:e4:20:5b:dc:73:66:3d:ba:79:b0:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:fa:4f:dc:61:37:21:40:d2:75:bc:cb:89:59:1c:bc: cc:22:53:16:47:c3:7e:2c:2a:44:40:62:39:5f:2d:31: de:6e:39:92:3a:40:e4:29:03:b6:75:83:0e:bc:ec:05: ef:8d:98:58:b9:1b:44:ce:df:46:4a:cb:3c:54:70:c6: a3:2e:4b:d6:0e:9e:4d:ce:b7:82:86:14:1c:32:48:b7: 21:55:62:72:1d:d0:ec:66:37:5b:ee:1d:58:48:72:99: f2:8f:53:e2:92:cb:4c:b0:db:21:2c:83:72:45:63:bf: ba:18:16:96:ee:f3:60:30:1c:2b:e2:37:f1:81:7a:fe: 28:2b:6a:b5:50:dd:97:3b:3e:32:b5:19:c9:3a:ef:a0: 18:16:4d:3b:b6:07:d0:26:1b:24:ca:ba:cf:7a:a1:0c: 97:bb:76:f0:e9:94:97:30:c6:32:fc:a6:35:e6:1e:18: d9:4e:d0:c8:9c:47:72:a0:11:b1:07:f2:aa:67:b2:0d: 9a:3b:58:1d:91:fd:2d:11:85:7c:f0:a6:d0:58:36:84: 61:eb:0c:25:c4:24:ab:c3:2f:8f:a3:79:87:da:e3:c9: 71:59:7b:ae:9a:a6:63:42:d8:ef:4b:59:36:6b:a4:dc: 69:17:6a:f5:5b:0c:19:4a:2d:21:88:a6:4c:a9:45:42 Fingerprint (SHA-256): 2C:A7:85:5B:67:F8:57:C4:0F:C1:52:CC:75:7A:2B:2B:F6:9F:5D:F8:0F:B7:7C:A8:91:0C:04:1D:D7:1F:F4:D9 Fingerprint (SHA1): 3F:10:25:88:95:8A:57:34:EF:C4:A8:28:3E:9C:D4:2B:99:95:47:16 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #12209: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der cert.sh: #12210: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #12211: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #12212: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #12213: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #12214: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #12215: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #12216: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:81:74:be Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Mar 31 19:16:45 2017 Not After : Sat Jul 01 19:16:45 2017 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:48:4d:c5:1e:89:c3:7d:b3:f7:51:e0:6a:4e:87:29: 45:18:fc:37:2c:ae:26:9c:22:92:7e:fb:02:12:be:c7: ed:11:f1:57:0f:e3:10:a5:d2:a1:e4:44:57:28:77:77: b9:cc:f7:82:20:ef:f0:05:c9:c8:df:bd:d3:91:f0:d8: ef:0b:ab:7b:31:a3:93:82:50:95:0e:d9:18:77:ef:96: 6f:bb:89:33:81:45:6a:e2:06:87:06:7b:52:a0:cd:c2: d0:51:47:e2:df:75:16:8b:98:38:05:78:c1:83:84:f5: 41:75:8a:7c:81:d1:57:57:1a:66:b3:50:70:93:af:00: 14:d9:6b:10:ed:8e:b3:8d:06:3e:43:96:52:5e:81:16: dd:a1:6c:de:fa:85:27:c7:58:61:1f:5e:e7:06:62:99: 26:3e:a4:fc:55:43:5b:fb:43:82:eb:1e:81:1f:74:76: 64:3c:f9:90:57:b5:bc:95:86:2f:0a:e6:75:58:6b:02: a3:c0:dd:da:89:4b:2e:40:19:44:2c:f4:64:e3:c4:46: 35:b3:56:4e:89:0d:aa:60:0d:dc:59:a7:99:6e:e4:47: 6a:27:16:36:c9:5f:52:8a:62:47:db:e6:f8:82:99:78: 4d:9f:21:32:16:67:d3:46:16:e0:a4:cf:83:ce:91:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:3b:5e:4c:ea:8f:3f:9b:da:64:92:12:61:70:14:fd: 36:e0:bc:88:e2:43:31:d3:ad:3e:7e:65:ef:d4:de:df: db:f9:ef:ec:2d:48:02:ef:e3:1d:6c:36:16:f8:1d:d1: 82:29:db:7d:e1:37:57:4c:ed:26:11:85:e3:5d:0c:bd: f1:d5:34:a6:b1:64:a2:7c:70:ee:a1:1b:49:fe:ed:c0: d7:ab:cd:c5:4d:4b:d9:9f:c7:1b:84:07:5a:b3:fe:b1: fa:8f:e9:24:3b:52:0f:4a:e0:4e:af:47:ab:24:a7:5a: d1:28:d2:0a:c1:bb:d5:87:37:7c:2d:f0:00:31:10:33: de:b6:f6:6a:dc:98:9f:48:fa:20:78:08:c9:6f:d3:c3: 22:23:fb:2c:d6:26:0c:5a:b1:93:17:98:b5:d7:fc:02: 45:c7:29:4b:3f:a2:dc:91:0c:61:5b:d4:17:c5:0e:9d: 75:7d:49:8d:97:62:31:fa:89:c9:68:96:20:d3:fd:89: 44:df:2a:12:2b:39:4b:79:2e:db:27:42:7a:82:61:9d: 56:db:30:d7:b6:9d:2b:8c:aa:4b:49:4d:81:30:27:2b: 11:a3:e1:d5:44:b3:ee:21:db:c4:d1:02:bb:37:df:c7: 54:29:a1:a2:9c:e4:48:3a:ce:95:43:6c:38:85:92:b3 Fingerprint (SHA-256): 1C:0A:95:8B:96:C4:9F:BD:29:BB:5B:05:50:F1:4B:3A:79:49:1A:89:B6:6A:34:C1:72:C7:1D:60:9A:C9:04:9F Fingerprint (SHA1): C9:9B:DE:92:F7:3B:21:17:FF:05:D0:5C:1E:B2:C1:BD:D2:32:D1:C0 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #12217: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #12218: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #12219: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw cert.sh: #12220: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #12221: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12222: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dbpass -o root.cert cert.sh: #12223: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #12224: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12225: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #12226: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #12227: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #12228: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA.ca.cert cert.sh: #12229: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #12230: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #12231: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12232: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #12233: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12234: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12235: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #12236: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12237: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12238: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #12239: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12240: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12241: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #12242: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12243: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12244: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #12245: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12246: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #12247: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #12248: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #12249: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #12250: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12251: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #12252: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12253: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #12254: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #12255: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #12256: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #12257: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #12258: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #12259: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #12260: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #12261: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #12262: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #12263: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #12264: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #12265: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #12266: perform selftest - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12267: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #12268: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12269: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12270: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #12271: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12272: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12273: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #12274: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12275: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12276: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #12277: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12278: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12279: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #12280: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12281: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12282: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #12283: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12284: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12285: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #12286: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12287: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12288: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #12289: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12290: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12291: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #12292: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12293: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12294: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #12295: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12296: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12297: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #12298: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12299: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12300: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #12301: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12302: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12303: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #12304: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12305: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12306: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #12307: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12308: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12309: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #12310: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12311: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12312: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #12313: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12314: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12315: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #12316: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12317: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12318: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #12319: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12320: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12321: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #12322: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12323: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12324: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #12325: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12326: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12327: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #12328: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12329: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12330: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #12331: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12332: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12333: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #12334: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12335: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12336: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #12337: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12338: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12339: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #12340: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12341: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12342: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #12343: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12344: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12345: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #12346: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12347: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12348: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #12349: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12350: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12351: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #12352: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12353: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12354: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #12355: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12356: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12357: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #12358: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12359: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12360: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #12361: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12362: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12363: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #12364: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12365: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12366: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #12367: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12368: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12369: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #12370: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12371: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12372: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #12373: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12374: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12375: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #12376: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12377: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12378: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #12379: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12380: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12381: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #12382: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12383: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12384: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #12385: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12386: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12387: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #12388: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12389: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12390: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #12391: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12392: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12393: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #12394: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12395: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12396: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #12397: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12398: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12399: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #12400: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12401: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12402: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #12403: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12404: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12405: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #12406: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12407: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12408: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #12409: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12410: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12411: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #12412: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12413: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12414: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #12415: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12416: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12417: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #12418: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12419: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12420: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #12421: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12422: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12423: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #12424: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12425: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12426: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #12427: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12428: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12429: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #12430: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12431: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12432: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #12433: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12434: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12435: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #12436: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12437: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12438: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #12439: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12440: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12441: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #12442: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12443: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12444: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #12445: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12446: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12447: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #12448: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12449: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12450: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #12451: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12452: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12453: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #12454: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12455: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12456: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #12457: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12458: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #12459: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #12460: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #12461: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #12462: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #12463: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #12464: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #12465: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #12466: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #12467: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #12468: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #12469: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #12470: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #12471: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #12472: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #12473: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #12474: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #12475: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #12476: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #12477: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #12478: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Fri Mar 31 19:23:34 UTC 2017 Running tests for dbtests TIMESTAMP dbtests BEGIN: Fri Mar 31 19:23:34 UTC 2017 dbtests.sh: CERT and Key DB Tests =============================== --------------------------------------------------------------- | test opening the database read/write in a nonexisting directory --------------------------------------------------------------- certutil: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #12479: Certutil didn't work in a nonexisting dir 255 - PASSED dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #12480: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED --------------------------------------------------------------- | test force opening the database in a nonexisting directory --------------------------------------------------------------- dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtests.sh: #12481: Dbtest force succeeded in a nonexisting dir 0 - PASSED --------------------------------------------------------------- | test opening the database readonly in an empty directory --------------------------------------------------------------- tstclnt: unable to open cert database: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #12482: Tstclnt didn't work in an empty dir 1 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/emptydir database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/emptydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #12483: Dbtest readonly didn't work in an empty dir 46 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/emptydir dbtests.sh: #12484: Dbtest logout after empty DB Init has key - PASSED dbdir selected is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/emptydir dbtests.sh: #12485: Dbtest password DB Init maintains needlogin state - PASSED certutil: could not find certificate named "xxxx": SEC_ERROR_UNRECOGNIZED_OID: Unrecognized Object Identifier. dbtests.sh: #12486: Certutil didn't work in an empty dir 255 - PASSED --------------------------------------------------------------- | test force opening the database readonly in a empty directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/emptydir database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/emptydir/key3.db" does not exist. dbtests.sh: #12487: Dbtest force readonly succeeded in an empty dir 0 - PASSED --------------------------------------------------------------- | test opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_READ_ONLY: security library: read-only database. dbtests.sh: #12488: Dbtest r/w didn't work in an readonly dir 46 - PASSED certutil: could not find certificate named "TestUser": SEC_ERROR_UNRECOGNIZED_OID: Unrecognized Object Identifier. dbtests.sh: #12489: Certutil didn't work in an readonly dir 255 - PASSED --------------------------------------------------------------- | test opening the database ronly in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtests.sh: #12490: Dbtest readonly succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | test force opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtests.sh: #12491: Dbtest force succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | ls -l /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir --------------------------------------------------------------- dr-xr-xr-x. 2 mockbuild mockbuild 4096 Mar 31 19:23 /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir -r--r-----. 1 mockbuild mockbuild 1220 Mar 31 19:23 /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-dsa.cert -r--r-----. 1 mockbuild mockbuild 1424 Mar 31 19:23 /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-dsamixed.cert -r--r-----. 1 mockbuild mockbuild 579 Mar 31 19:23 /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-ec.cert -r--r-----. 1 mockbuild mockbuild 705 Mar 31 19:23 /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-ecmixed.cert -r--r-----. 1 mockbuild mockbuild 870 Mar 31 19:23 /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/TestUser.cert -r--------. 1 mockbuild mockbuild 206848 Mar 31 19:23 /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/cert9.db -r--------. 1 mockbuild mockbuild 102400 Mar 31 19:23 /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/key4.db -r--------. 1 mockbuild mockbuild 622 Mar 31 19:23 /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/pkcs11.txt -r--r-----. 1 mockbuild mockbuild 393 Mar 31 19:23 /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/ronlydir/req --------------------------------------------------------------- | test creating a new cert with a conflicting nickname --------------------------------------------------------------- /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/conflictdir certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database. dbtests.sh: #12492: Nicknane conflict test, could not import conflict nickname 255 - PASSED --------------------------------------------------------------- | test importing an old cert to a conflicting nickname --------------------------------------------------------------- Certificate: Data: Version: 3 (0x2) Serial Number: 40 (0x28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:38 2017 Not After : Thu Mar 31 19:10:38 2022 Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:5f:c4:bd:96:ae:a1:c1:72:0d:cb:89:e1:96:d6:25: 30:29:94:39:25:dd:48:df:0f:37:88:d3:ba:ab:ae:fa: f9:44:e8:3f:0a:80:04:f6:ba:f8:1f:07:a3:f3:95:4d: 56:c0:fc:b6:4c:50:8d:93:00:40:04:fb:e3:0a:4a:3c: 28:5c:7c:ec:4f:83:ef:fd:ae:6c:d7:a1:16:04:65:21: 46:b3:c1:40:c5:c8:22:c2:88:88:6a:4c:ef:1e:46:cf: d5:7b:23:a0:05:16:5c:e0:e9:56:44:c2:c0:8f:b3:e2: be:ea:e0:14:a3:ed:7a:c4:bf:8d:46:43:55:64:d5:df: 66:d7:a5:a2:a5:16:5a:fd:ab:1d:bd:9c:d3:e9:18:ac: 94:85:39:80:dd:1f:13:f4:b7:f9:3a:b7:78:f0:e0:ff: 8f:18:08:d6:e4:47:d6:56:34:ee:73:2b:c3:c9:ee:3c: 87:a4:36:fe:4a:9d:c1:f2:64:dd:ef:0f:81:45:f9:dd: f4:ea:ea:1a:33:52:68:cf:a8:fe:99:15:7c:f5:e9:88: 0f:b0:c0:80:58:1d:ad:04:8e:1c:eb:55:05:64:a6:e0: 5e:2b:9a:02:78:f4:c9:66:ce:85:de:73:fc:b3:56:dc: 4d:63:19:20:0e:e2:18:8b:42:d7:2f:31:8f:e4:12:7d Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:2c:10:c0:98:35:ee:d2:d4:e7:3c:a4:8f:ed:90:12: ca:e7:af:64:9f:f1:5e:1d:10:9c:9f:a8:23:b0:9a:28: d3:6f:ec:55:cd:32:f2:b7:64:de:be:14:ef:cb:ad:d3: 1c:61:62:fa:19:9f:54:00:1b:8e:7e:ff:ac:e3:63:22: c1:c0:2a:f9:f7:3b:88:ca:76:38:19:6f:0a:8e:08:6e: cb:ac:67:04:15:7d:9b:63:df:32:f0:bd:2f:f5:9a:e0: c5:40:e6:18:4a:85:f7:20:c6:ee:7a:07:57:44:96:72: e9:4b:e5:1b:15:38:a4:85:c6:66:7c:16:59:95:20:cf: be:40:9a:7d:45:9a:3e:c7:76:0c:ea:67:78:71:27:67: f4:c5:01:ae:4e:97:53:6a:3f:57:91:b5:d3:1d:87:8e: 77:ea:8d:5d:51:fa:ef:8c:ea:ec:de:6f:1d:68:19:8b: 0c:63:94:27:2c:b9:70:9c:85:dc:1f:e0:2f:6f:77:2b: 96:ee:61:2a:fa:a2:79:ac:75:c3:c6:d4:82:bc:e6:a1: ce:92:4b:e8:49:d4:c3:ff:b7:cf:c1:8c:ba:b8:98:b0: 2c:e8:c5:6c:a9:03:f4:82:7f:7b:28:38:5f:56:66:77: 10:ad:c7:8d:c8:99:f7:66:db:3f:f8:38:5c:23:6a:1b Fingerprint (SHA-256): 0D:46:29:A0:40:8E:2A:70:98:7E:90:9A:67:7A:D7:0C:99:15:4D:6B:4B:BA:53:39:A4:36:D1:1F:00:50:81:2B Fingerprint (SHA1): 46:5F:6C:BA:ED:D2:3B:F3:55:9A:20:3E:2C:59:59:5B:4A:46:73:9D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: dbtests.sh: #12493: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED TIMESTAMP dbtests END: Fri Mar 31 19:23:45 UTC 2017 Running tests for tools TIMESTAMP tools BEGIN: Fri Mar 31 19:23:45 UTC 2017 tools.sh: Tools Tests with ECC =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12494: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ea:d3:24:2e:14:a1:97:4c:b8:6a:12:3b:aa:d9:97:10 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12495: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12496: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12497: Exporting Alice's email EC cert & key (pk12util -o) - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12498: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 84:ff:03:fd:80:a6:09:af:cc:9f:8f:fc:81:d3:2b:07 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Mar 31 19:07:09 2017 Not After : Thu Mar 31 19:07:09 2067 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:a1:74:4d:74:20:9d:33:ec:10:53:7b:9d:00:a9: 88:44:9d:a8:69:be:a1:56:f0:32:4f:d4:2f:24:78:5e: f6:0c:ea:55:ae:aa:96:3e:b5:6c:33:90:59:bc:95:68: 49:c6:76:99:09:ee:62:dd:4c:7a:af:2c:07:fa:76:45: 41:ae:4f:00:4c:4b:3d:34:da:a4:36:f4:bc:db:1c:a6: a2:5c:7b:cb:cc:4a:7c:fb:cf:aa:cb:67:ae:29:2b:c4: aa:d6:6e:6c:90:86:96:7b:6e:8d:3f:54:bf:37:06:83: f0:b0:58:c6:67:51:cc:85:e7:2e:58:03:8d:9a:fe:79: 00:a7:c6:48:e4 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:00:fc:7f:4d:84:01:5a:bb:76:a4:79: 71:61:be:d0:35:a7:0f:d3:47:ba:4c:c2:72:28:ee:4b: 9b:23:c1:58:59:a2:19:00:01:d7:37:10:22:de:f8:51: b7:79:d9:3e:c5:16:64:19:14:c6:b0:9a:65:c3:4c:b1: e8:8c:b6:ce:79:af:bf:02:42:01:a9:72:26:61:b6:e5: f7:42:e4:fb:6e:b3:75:0a:eb:28:d7:c8:2e:11:a3:4f: dc:c3:96:a5:93:9f:1d:ea:7e:30:dd:18:2e:0f:55:59: d9:46:bb:48:d6:7e:9d:00:96:3a:11:ec:e3:26:57:56: 9a:14:a9:fe:93:67:de:0b:3d:db:48 Fingerprint (SHA-256): 92:53:9D:A3:C0:9F:24:E2:BA:EE:AE:F1:7F:03:73:80:4E:E4:80:BD:C2:4E:F1:EF:8A:DF:3F:A7:40:A5:35:90 Fingerprint (SHA1): 67:B8:4E:69:44:EE:24:12:FB:8B:80:6D:1C:BE:C3:AD:40:E8:03:56 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Mar 31 19:10:27 2017 Not After : Thu Mar 31 19:10:27 2022 Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:ed:84:63:d2:b8:d3:e1:36:ee:68:bb:d0:8e:d4:e0: 4e:1b:32:1c:36:df:e3:e6:57:0b:7b:e5:d9:a8:a2:ec: 4f:2d:2b:1a:65:04:a4:2e:8e:7c:d9:3e:03:9c:ac:c1: 6f:54:4d:df:8e:60:ba:56:0d:d5:90:c4:ff:a8:b9:b3: 2a:0a:96:64:0b:1e:f8:31:68:73:93:9f:3d:13:5b:ae: 34:af:f3:62:87:c4:b4:7e:06:3c:4f:e4:95:2f:ca:9e: 12 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:01:9e:c6:c7:01:a8:0e:0a:ac:2f:85: fd:e7:28:04:a2:70:bb:51:3c:c4:83:19:bf:48:19:e7: e1:89:a9:64:8d:c2:99:1c:06:90:9b:76:f8:6a:34:a2: c0:4a:55:49:4f:57:1f:f8:4e:a6:b3:a8:b1:05:8a:5e: 46:c6:29:fa:1c:a4:7b:02:42:01:ad:86:73:96:83:f9: 2f:21:37:3f:e4:12:e3:f8:c1:9b:db:d4:e5:7f:ea:d9: 64:29:e7:ee:d0:81:5a:22:af:99:35:4a:1b:23:6f:5c: aa:f4:a9:71:68:fc:2f:e8:71:c4:e0:cb:c8:17:17:14: ae:95:7c:1d:d1:b2:b0:f5:0f:e7:87 Fingerprint (SHA-256): 58:27:DE:AB:77:61:6C:16:5A:DC:F1:B0:BE:16:49:BF:AD:54:8F:25:06:A5:1B:4E:5E:86:91:EE:24:84:1A:4B Fingerprint (SHA1): 3A:67:23:05:DA:44:83:77:A7:31:27:4D:4E:03:CF:5C:4F:7A:76:6E Friendly Name: Alice-ec tools.sh: #12499: Listing Alice's pk12 EC file (pk12util -l) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12500: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: f9:e9:45:7a:46:80:b5:ec:58:c2:e1:dd:0c:17:25:7a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12501: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12502: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12503: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: d5:e7:1a:30:02:22:42:72:ad:dc:36:e3:73:7b:e8:7c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12504: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12505: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12506: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 70:f8:40:0d:e4:7c:74:ae:54:03:df:ed:c3:81:f2:7b Iteration Count: 2000 (0x7d0) tools.sh: #12507: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12508: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12509: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c0:fb:dd:49:ac:93:3e:ce:ee:72:3b:32:af:0f:0c:95 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12510: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12511: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12512: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 84:7c:cc:18:40:a7:e5:35:7c:59:f7:60:01:e3:d9:7c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12513: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12514: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12515: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 54:be:ed:4a:6b:8e:5c:09:53:3e:8c:28:c5:5e:03:68 Iteration Count: 2000 (0x7d0) tools.sh: #12516: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12517: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12518: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e6:19:53:78:a4:71:af:c5:b1:e0:24:d9:3c:b7:b8:ea Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:9e:db:c0:1d:5e:16:47:0f:4f:2e:31:e1:55:6f: ee:04 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12519: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12520: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12521: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7d:e8:9f:f2:8d:60:8e:70:97:52:34:d9:d6:a9:a6:9f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:38:a2:57:41:de:04:d1:03:f9:0c:9d:16:a2:f5: 48:fc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12522: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12523: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12524: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 49:5f:c0:8a:90:da:9e:1c:d3:84:fb:f7:83:92:17:c0 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:68:3e:6d:4f:dd:0f:aa:e8:ab:8e:88:79:fe:e4: ee:26 tools.sh: #12525: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12526: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12527: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3d:aa:5b:92:f5:cd:c2:13:f1:f8:fe:b2:a7:a5:3c:37 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:0e:18:28:fe:a9:e8:2d:6e:48:e2:94:c6:d5:82: e7:7d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12528: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12529: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12530: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 30:7b:d9:f8:10:3f:4a:b0:8c:e9:ac:09:61:f4:2e:79 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:3a:58:a8:c5:cd:b7:f3:1f:e7:51:2f:3c:09:08: 74:3f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12531: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12532: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12533: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a7:58:5e:b5:b1:54:28:9b:16:fc:97:f1:45:90:6d:e6 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:f7:5d:85:38:78:a5:90:f1:f6:ee:72:81:f9:4d: ad:b2 tools.sh: #12534: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12535: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12536: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f4:80:cf:e3:ce:61:41:11:09:f0:e7:b6:6b:79:4b:e5 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ec:ce:17:f4:44:8a:14:24:46:f5:35:b3:6e:85: e3:3c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12537: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12538: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12539: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4b:90:a5:58:d7:d7:25:c1:e3:1d:6f:a4:b2:41:6d:a5 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f4:5a:59:22:3b:52:b3:66:71:ca:ba:96:a2:7b: c7:8e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12540: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12541: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12542: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 73:64:ef:33:2a:fd:5b:5b:44:d3:5c:a2:67:2f:f2:a8 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:dc:36:fb:49:4d:bb:2b:8c:02:41:c6:3e:0c:ce: 17:aa tools.sh: #12543: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12544: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12545: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b4:c9:ca:d9:70:86:e9:f3:12:ef:f2:1f:a2:e0:15:cf Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:6b:8d:69:f9:f6:c4:43:74:82:c9:df:98:34:ca: 8d:d1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12546: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12547: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12548: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ad:39:99:94:58:d1:1d:78:b8:a5:c8:f7:67:42:70:c6 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:33:7c:cc:ea:57:4a:d2:70:ef:bf:34:4c:dc:97: b1:1d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12549: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12550: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12551: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: eb:f4:2a:d6:7b:34:4c:55:0a:1b:6e:f9:1d:bb:cb:25 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:5a:c8:0e:96:ee:bd:31:60:01:de:ed:26:85:05: fa:6f tools.sh: #12552: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12553: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12554: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c0:e1:79:bf:c7:13:55:2c:5c:14:cc:21:90:8a:ae:34 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:84:0f:8b:ec:f1:3a:bd:e4:68:cf:46:d5:86:c7: 5f:4b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12555: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12556: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12557: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b5:82:49:c5:f4:a4:6d:79:f8:19:3a:13:ad:51:d1:be Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:2a:3d:2c:cb:31:61:62:f1:e5:50:c1:f0:6a:35: e1:02 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12558: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12559: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12560: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 37:da:a7:68:db:fa:b4:33:87:d8:14:04:ca:e6:bb:b1 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:d9:93:a0:fc:9b:01:dd:19:f8:7d:4e:9f:54:d9: a9:0a tools.sh: #12561: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12562: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12563: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 87:9d:9b:1f:c5:b3:a4:d8:de:93:d0:40:94:99:1f:d7 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:a8:f5:1d:52:56:84:b0:ae:e1:5c:75:ac:ef:5a: 91:43 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12564: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12565: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12566: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f1:c9:80:ee:7e:37:7b:8e:56:3a:3e:fb:eb:32:12:1b Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:4e:35:d6:30:c6:e0:d1:65:08:b2:07:89:f2:7c: 84:b8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12567: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12568: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12569: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f0:d9:d9:e9:db:25:91:e5:3e:1c:c9:f1:f6:c3:96:55 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:9b:e4:0d:e0:8b:e8:41:08:fa:c2:5c:a5:8a:56: f5:87 tools.sh: #12570: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12571: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12572: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 7e:17:f5:d0:19:0e:92:d1:c7:bb:82:9a:4a:1d:d6:76 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12573: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12574: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12575: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: b7:5d:55:a1:cd:37:97:8e:a4:6a:31:27:ce:fb:45:ca Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12576: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12577: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12578: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 3a:98:69:c8:bd:50:39:a7:fa:71:6c:ac:8b:e3:e3:76 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12579: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12580: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12581: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 67:3d:2f:09:5e:2f:53:cb:3d:8e:61:84:34:f7:b5:94 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12582: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12583: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12584: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: b1:b9:b3:35:6b:91:8d:ef:d5:56:eb:b9:0e:0d:b5:13 Iteration Count: 2000 (0x7d0) tools.sh: #12585: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12586: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12587: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 6b:66:99:b2:01:14:e8:1e:d0:62:16:0f:ed:47:ff:15 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12588: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12589: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12590: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: f4:3a:53:d1:6e:a9:1e:14:b4:38:b3:c7:99:3c:74:c6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12591: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12592: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12593: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 06:3c:10:bf:b6:02:aa:d2:95:5a:16:a3:55:30:6d:b9 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12594: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12595: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12596: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 70:c1:b5:a5:45:f5:ef:d3:ff:c2:80:61:5d:18:fc:65 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12597: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12598: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12599: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 4d:dc:ef:2e:2e:35:41:4e:f2:f5:90:4c:50:bc:12:ce Iteration Count: 2000 (0x7d0) tools.sh: #12600: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12601: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12602: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 8e:e2:25:ca:95:89:4b:32:d7:b3:4a:2d:c3:6e:ce:6e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12603: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12604: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12605: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 64:62:36:88:91:d9:c4:81:ca:1a:96:95:05:76:a5:7a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12606: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12607: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12608: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 8a:69:e5:25:cc:81:94:a6:e6:c5:1d:58:75:12:c2:4e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12609: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12610: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12611: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 57:4d:c6:8f:41:3d:cf:30:95:be:29:47:44:68:94:ae Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12612: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12613: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12614: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d8:33:0e:03:57:6a:01:d9:20:a9:30:9e:58:b2:fb:ac Iteration Count: 2000 (0x7d0) tools.sh: #12615: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12616: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12617: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2a:df:71:a9:7c:6c:aa:87:bc:27:36:19:93:71:74:87 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12618: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12619: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12620: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 23:ef:80:34:07:45:27:c4:ee:f3:ae:ca:27:6a:a9:70 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12621: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12622: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12623: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 78:7a:fa:8a:75:9e:08:28:cc:da:ec:31:58:f8:b5:cf Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12624: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12625: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12626: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 64:3c:5f:1b:d1:80:a1:d1:6a:3e:db:a0:ba:f5:de:fc Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12627: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12628: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12629: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 03:4e:4c:f7:1f:eb:0e:d9:3d:2f:3f:33:85:16:46:44 Iteration Count: 2000 (0x7d0) tools.sh: #12630: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12631: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12632: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6d:88:3e:cf:b4:f4:5c:1b:2d:5c:16:3d:b1:dd:dd:b6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12633: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12634: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12635: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b2:2e:f4:64:47:e9:e1:02:bf:e0:a5:e3:21:95:ac:91 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12636: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12637: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12638: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9f:1b:57:e3:27:c4:70:c6:98:af:95:94:59:2e:e4:89 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12639: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12640: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12641: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d9:83:57:d7:4f:96:5f:e6:a3:0e:68:2b:27:50:ed:f0 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12642: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12643: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12644: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 64:71:16:97:69:2b:e7:a8:8f:d2:4a:c5:bd:53:3b:d3 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12645: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12646: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12647: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 55:7b:ff:e4:2e:9c:3b:0c:2d:c8:69:0d:85:3a:33:95 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12648: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12649: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12650: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 90:aa:dc:22:09:c1:6a:11:01:c0:31:f5:02:95:17:87 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12651: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12652: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12653: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 24:96:2e:00:04:00:f1:68:65:11:4d:8d:6b:57:a4:e4 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12654: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12655: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12656: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a3:ba:1e:55:39:7f:d4:4e:62:ef:0f:08:9a:b1:88:ea Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12657: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12658: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12659: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0c:8f:26:f4:c6:f9:74:3a:e1:ab:a8:1d:fb:22:fe:3c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:05:50 2017 Not After : Thu Mar 31 19:05:50 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:09:ca:c9:37:7b:f4:49:2f:e7:72:c3:87:8c:a2:e0: ab:b9:be:a4:e7:75:97:61:0f:9d:6b:72:fb:97:de:69: 8b:66:cf:16:57:49:bc:5b:0a:59:41:80:87:cb:b6:90: 1c:d3:e4:c5:6e:5c:a7:44:be:45:86:48:6b:f7:f6:00: 39:81:77:14:68:39:a6:04:ae:76:67:3d:d1:0b:ba:7f: 85:cb:3e:b5:6c:c0:e2:01:f8:59:62:bb:41:d5:fe:70: 4a:67:28:4e:4f:e5:26:b7:35:52:af:3b:aa:32:0a:fc: 83:b1:3c:07:a6:3f:9f:f0:2d:1b:89:a1:ba:49:7d:a6: 1c:97:02:09:5a:06:36:d1:5f:79:7d:9e:55:da:96:8f: f0:d0:2e:82:98:b6:01:b6:42:1c:d3:d3:29:b8:ee:87: 92:6f:93:aa:48:f4:46:d1:bd:8d:b7:78:7f:b8:c9:e9: 92:95:c7:61:61:35:60:e7:3a:82:a0:be:50:14:58:9a: cb:3e:76:71:19:6d:b6:e7:c9:fd:75:3b:e6:50:85:5d: 8a:cb:91:7a:b2:98:35:b3:d3:7f:13:7c:a3:14:cd:03: d1:64:19:e6:e5:68:0a:37:2f:66:e4:50:5f:90:b5:1f: 6b:41:af:1d:e0:6a:ed:eb:a0:00:3e:4b:16:8d:00:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:46:44:73:df:1c:0c:e3:0e:81:a7:b1:8e:d2:56:c2: 6e:2b:4b:68:1d:74:0a:19:5b:9c:48:6d:f3:47:4e:1e: 29:b1:47:26:63:92:1f:a9:67:d0:e4:9d:12:26:a1:bf: 18:7d:0e:ec:d4:14:72:f4:9d:87:11:fb:28:b5:60:92: ff:67:0e:a1:cc:d3:ff:de:e2:56:75:69:96:14:07:97: 16:a3:dc:d3:f6:cb:d6:4b:8d:bb:f5:dc:3e:e3:e2:c8: 2c:74:ba:28:2c:a1:59:35:4f:e2:2b:ae:06:eb:b4:88: 4c:d0:fa:cb:bf:81:5a:28:6c:cb:78:c0:2b:dc:59:a2: 7d:14:18:8a:6f:f0:bc:93:dc:48:26:80:b3:c4:8c:c9: 02:82:76:77:5c:76:7d:ef:48:9d:2c:b4:a3:de:61:18: 8b:6b:df:23:3b:b3:7b:14:0f:96:90:b9:b4:66:15:37: c7:20:00:6b:e3:ae:52:d9:8c:9d:6b:e9:30:d7:9a:79: 8a:15:39:aa:53:aa:3a:88:c0:27:ae:8a:35:a1:4e:66: 6c:d1:08:58:7e:be:08:1b:66:66:5b:b0:0f:8a:4b:fd: 4f:03:22:43:83:67:9a:d1:78:d1:af:3a:77:0d:4f:ed: ec:7a:ba:3b:fa:be:27:bd:7e:8d:9e:04:bf:6f:ca:09 Fingerprint (SHA-256): 15:07:1B:32:77:75:18:F2:4A:BA:D6:FD:1B:C6:18:42:5E:E4:45:BA:C4:42:89:98:1B:5F:D4:94:B5:28:C8:54 Fingerprint (SHA1): AB:82:56:37:C1:16:9E:F1:84:47:35:C1:B9:AD:41:20:95:14:25:C2 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:10:19 2017 Not After : Thu Mar 31 19:10:19 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:88:74:3f:11:cc:a9:34:0f:ed:2d:c8:41:e7:96:c8: b9:00:b1:1d:97:fe:1a:7f:7d:b6:74:3d:29:19:68:b3: 04:ec:4d:9f:17:ba:8a:a0:a0:42:0e:b3:bb:4c:d0:bc: 19:dd:a1:fa:48:1c:b2:95:4d:28:ff:88:0a:0b:53:57: b5:fb:b0:07:9b:1c:55:6b:fe:57:3a:0d:a9:c4:7f:9c: 79:b0:11:86:ef:e5:ec:e9:9d:6b:67:c8:27:5c:19:64: 1c:7e:6f:ba:78:e4:e3:35:58:59:3e:3b:6e:a5:63:da: a1:cf:9c:be:81:ac:5a:b0:14:a8:8b:a5:af:f6:64:eb: e8:4b:31:20:7d:f5:3d:aa:82:b6:87:55:74:1c:0f:f3: 40:d7:e3:f5:eb:e2:9a:e1:12:f9:33:e6:07:1f:76:e4: dc:4f:94:f6:5e:15:56:34:38:52:50:c6:8f:6c:68:af: 65:93:62:8a:4a:5d:28:3e:30:3c:92:78:34:1a:99:be: f6:8e:24:c5:92:9a:cd:30:7f:05:8a:69:7b:d8:bc:30: f5:85:b3:47:95:88:25:04:28:7e:e1:39:26:47:ef:2a: 34:32:1d:ff:8a:29:b1:7b:f6:cb:8a:c9:31:f5:50:90: 55:71:a4:77:aa:09:d1:91:47:e7:f1:01:f6:1e:50:31 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:ff:39:d1:e1:d2:39:7e:65:4e:ac:d2:1f:f9:6e:16: 28:75:9b:fd:29:a3:fe:31:a0:7b:53:ef:8e:d5:d9:7d: 5c:2d:49:7e:a2:92:13:80:25:9b:6e:9b:5e:15:fa:d0: 0d:26:c9:dd:91:8d:eb:19:c8:43:34:70:ca:50:2c:38: cf:0c:ac:ff:a6:14:4a:fe:92:93:5c:5a:64:c2:f9:09: 5a:ec:fe:f8:db:22:fa:47:37:85:ac:c7:e5:80:a2:e3: 66:a1:c8:13:cf:fe:4a:50:36:a6:7a:89:b1:1e:63:a2: 9e:c7:a3:60:d9:07:ad:9a:bc:05:c9:85:1d:3e:81:61: 76:8e:9c:5c:f2:0e:c0:00:96:c2:34:3f:73:7a:35:f5: 80:ad:50:a5:f4:fa:1d:9b:f3:04:ce:b9:5c:ab:ea:4b: 59:ae:b5:d2:d5:a0:97:df:b8:31:14:a0:fb:41:c3:a9: c9:1a:8d:6c:d6:db:37:74:4a:fa:dc:a3:ea:00:16:83: fe:c4:5a:b8:63:0d:7f:fc:f7:69:ea:d1:7e:6d:12:73: 55:d2:18:ca:c2:cb:66:3a:7d:4c:16:41:a9:9a:4a:2c: 9a:63:4d:4f:ce:63:80:cd:f8:87:db:41:4d:b5:d1:c6: 25:4a:63:cc:56:7a:89:ef:ed:b5:ee:3a:7d:56:d5:66 Fingerprint (SHA-256): C7:D2:BB:CF:31:0D:56:4F:D6:38:96:A8:F6:46:F5:57:91:D6:AE:D0:3B:71:00:42:A6:4C:CA:B7:F6:C0:67:AB Fingerprint (SHA1): 12:6B:3E:F7:36:CE:90:0F:A1:BF:52:AC:08:B9:26:0E:25:0E:6E:E0 Friendly Name: Alice tools.sh: #12660: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #12661: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #12662: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #12663: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #12664: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #12665: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #12666: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #12667: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #12668: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #12669: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #12670: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Fri Mar 31 19:26:02 UTC 2017 Running tests for fips TIMESTAMP fips BEGIN: Fri Mar 31 19:26:02 UTC 2017 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #12671: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #12672: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 2b053d62626253e28e92ac1a68afbe9c6937cc04 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #12673: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #12674: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #12675: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #12676: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #12677: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #12678: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #12679: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #12680: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #12681: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12682: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #12683: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 2b053d62626253e28e92ac1a68afbe9c6937cc04 FIPS_PUB_140_Test_Certificate fips.sh: #12684: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #12685: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #12686: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12687: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #12688: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 2b053d62626253e28e92ac1a68afbe9c6937cc04 FIPS_PUB_140_Test_Certificate fips.sh: #12689: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #12690: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #12691: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest1.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle Changing byte 0x00033964 (211300): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/fips/mangle dbtest -r -d ../fips fips.sh: #12692: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Fri Mar 31 19:27:15 UTC 2017 Running tests for crmf TIMESTAMP crmf BEGIN: Fri Mar 31 19:27:15 UTC 2017 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #12693: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #12694: CMMF test . - PASSED TIMESTAMP crmf END: Fri Mar 31 19:27:16 UTC 2017 Running tests for smime TIMESTAMP smime BEGIN: Fri Mar 31 19:27:16 UTC 2017 smime.sh: S/MIME Tests with ECC =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #12695: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12696: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #12697: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #12698: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #12699: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #12700: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12701: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #12702: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1 smime.sh: #12703: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED diff alice.txt alice-ec.data.SHA1 smime.sh: #12704: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #12705: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12706: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #12707: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #12708: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #12709: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #12710: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12711: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #12712: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256 smime.sh: #12713: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED diff alice.txt alice-ec.data.SHA256 smime.sh: #12714: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #12715: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12716: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #12717: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #12718: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #12719: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #12720: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12721: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #12722: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384 smime.sh: #12723: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED diff alice.txt alice-ec.data.SHA384 smime.sh: #12724: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #12725: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12726: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #12727: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #12728: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #12729: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #12730: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #12731: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #12732: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512 smime.sh: #12733: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED diff alice.txt alice-ec.data.SHA512 smime.sh: #12734: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #12735: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #12736: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #12737: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #12738: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #12739: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #12740: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #12741: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #12742: Decrypt with a Multiple Email cert . - PASSED smime.sh: #12743: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #12744: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #12745: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #12746: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #12747: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #12748: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #12749: Decode Encrypted-Data . - PASSED smime.sh: #12750: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #12751: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #12752: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #12753: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #12754: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #12755: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Fri Mar 31 19:27:54 UTC 2017 Running tests for ssl TIMESTAMP ssl BEGIN: Fri Mar 31 19:27:54 UTC 2017 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:27:54 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:27:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:27:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12756: Server never started - PASSED kill -0 23053 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23053 found at Fri Mar 31 19:28:00 UTC 2017 selfserv_9626 with PID 23053 started at Fri Mar 31 19:28:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12757: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 23053 at Fri Mar 31 19:28:00 UTC 2017 kill -USR1 23053 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23053 killed at Fri Mar 31 19:28:01 UTC 2017 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:28:01 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:28:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:28:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12758: Server never started - PASSED kill -0 23121 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23121 found at Fri Mar 31 19:28:07 UTC 2017 selfserv_9626 with PID 23121 started at Fri Mar 31 19:28:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12759: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 23121 at Fri Mar 31 19:28:08 UTC 2017 kill -USR1 23121 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23121 killed at Fri Mar 31 19:28:08 UTC 2017 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:28:08 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:28:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:28:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12760: Server never started - PASSED kill -0 23202 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23202 found at Fri Mar 31 19:28:14 UTC 2017 selfserv_9626 with PID 23202 started at Fri Mar 31 19:28:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12761: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 23202 at Fri Mar 31 19:28:15 UTC 2017 kill -USR1 23202 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23202 killed at Fri Mar 31 19:28:15 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:28:15 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:28:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:28:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12762: Server never started - PASSED kill -0 23283 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23283 found at Fri Mar 31 19:28:21 UTC 2017 selfserv_9626 with PID 23283 started at Fri Mar 31 19:28:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12763: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 23283 at Fri Mar 31 19:28:22 UTC 2017 kill -USR1 23283 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23283 killed at Fri Mar 31 19:28:22 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:28:22 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:28:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:28:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12764: Server never started - PASSED kill -0 23354 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23354 found at Fri Mar 31 19:28:28 UTC 2017 selfserv_9626 with PID 23354 started at Fri Mar 31 19:28:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12765: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 23354 at Fri Mar 31 19:28:29 UTC 2017 kill -USR1 23354 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23354 killed at Fri Mar 31 19:28:29 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:28:29 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:28:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:28:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12766: Server never started - PASSED kill -0 23424 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23424 found at Fri Mar 31 19:28:35 UTC 2017 selfserv_9626 with PID 23424 started at Fri Mar 31 19:28:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12767: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 23424 at Fri Mar 31 19:28:36 UTC 2017 kill -USR1 23424 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23424 killed at Fri Mar 31 19:28:36 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:28:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:28:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:28:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12768: Server never started - PASSED kill -0 23505 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23505 found at Fri Mar 31 19:28:43 UTC 2017 selfserv_9626 with PID 23505 started at Fri Mar 31 19:28:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12769: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 23505 at Fri Mar 31 19:28:43 UTC 2017 kill -USR1 23505 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23505 killed at Fri Mar 31 19:28:44 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:28:44 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:28:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:28:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12770: Server never started - PASSED kill -0 23575 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23575 found at Fri Mar 31 19:28:50 UTC 2017 selfserv_9626 with PID 23575 started at Fri Mar 31 19:28:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12771: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 23575 at Fri Mar 31 19:28:50 UTC 2017 kill -USR1 23575 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23575 killed at Fri Mar 31 19:28:51 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:28:51 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:28:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:28:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12772: Server never started - PASSED kill -0 23643 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23643 found at Fri Mar 31 19:28:57 UTC 2017 selfserv_9626 with PID 23643 started at Fri Mar 31 19:28:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12773: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 23643 at Fri Mar 31 19:28:57 UTC 2017 kill -USR1 23643 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23643 killed at Fri Mar 31 19:28:58 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:28:58 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:28:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:29:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12774: Server never started - PASSED kill -0 23724 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23724 found at Fri Mar 31 19:29:04 UTC 2017 selfserv_9626 with PID 23724 started at Fri Mar 31 19:29:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12775: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 23724 at Fri Mar 31 19:29:04 UTC 2017 kill -USR1 23724 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23724 killed at Fri Mar 31 19:29:05 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:29:05 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:29:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:29:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12776: Server never started - PASSED kill -0 23809 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23809 found at Fri Mar 31 19:29:11 UTC 2017 selfserv_9626 with PID 23809 started at Fri Mar 31 19:29:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12777: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 23809 at Fri Mar 31 19:29:12 UTC 2017 kill -USR1 23809 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23809 killed at Fri Mar 31 19:29:12 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:29:12 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:29:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:29:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12778: Server never started - PASSED kill -0 23877 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23877 found at Fri Mar 31 19:29:18 UTC 2017 selfserv_9626 with PID 23877 started at Fri Mar 31 19:29:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12779: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 23877 at Fri Mar 31 19:29:19 UTC 2017 kill -USR1 23877 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23877 killed at Fri Mar 31 19:29:19 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:29:19 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:29:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:29:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12780: Server never started - PASSED kill -0 23961 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23961 found at Fri Mar 31 19:29:25 UTC 2017 selfserv_9626 with PID 23961 started at Fri Mar 31 19:29:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12781: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 23961 at Fri Mar 31 19:29:26 UTC 2017 kill -USR1 23961 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23961 killed at Fri Mar 31 19:29:26 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:29:26 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:29:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:29:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12782: Server never started - PASSED kill -0 24029 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24029 found at Fri Mar 31 19:29:32 UTC 2017 selfserv_9626 with PID 24029 started at Fri Mar 31 19:29:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12783: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 24029 at Fri Mar 31 19:29:33 UTC 2017 kill -USR1 24029 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24029 killed at Fri Mar 31 19:29:33 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:29:34 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:29:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:29:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12784: Server never started - PASSED kill -0 24097 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24097 found at Fri Mar 31 19:29:40 UTC 2017 selfserv_9626 with PID 24097 started at Fri Mar 31 19:29:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12785: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 24097 at Fri Mar 31 19:29:40 UTC 2017 kill -USR1 24097 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24097 killed at Fri Mar 31 19:29:41 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:29:41 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:29:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:29:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12786: Server never started - PASSED kill -0 24178 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24178 found at Fri Mar 31 19:29:47 UTC 2017 selfserv_9626 with PID 24178 started at Fri Mar 31 19:29:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12787: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 24178 at Fri Mar 31 19:29:47 UTC 2017 kill -USR1 24178 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24178 killed at Fri Mar 31 19:29:48 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:29:48 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:29:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:29:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12788: Server never started - PASSED kill -0 24246 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24246 found at Fri Mar 31 19:29:54 UTC 2017 selfserv_9626 with PID 24246 started at Fri Mar 31 19:29:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12789: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 24246 at Fri Mar 31 19:29:54 UTC 2017 kill -USR1 24246 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24246 killed at Fri Mar 31 19:29:55 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:29:55 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:29:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:30:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12790: Server never started - PASSED kill -0 24314 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24314 found at Fri Mar 31 19:30:01 UTC 2017 selfserv_9626 with PID 24314 started at Fri Mar 31 19:30:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12791: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 24314 at Fri Mar 31 19:30:01 UTC 2017 kill -USR1 24314 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24314 killed at Fri Mar 31 19:30:02 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:30:02 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:30:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:30:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12792: Server never started - PASSED kill -0 24409 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24409 found at Fri Mar 31 19:30:08 UTC 2017 selfserv_9626 with PID 24409 started at Fri Mar 31 19:30:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12793: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 24409 at Fri Mar 31 19:30:09 UTC 2017 kill -USR1 24409 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24409 killed at Fri Mar 31 19:30:09 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:30:09 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:30:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:30:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12794: Server never started - PASSED kill -0 24477 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24477 found at Fri Mar 31 19:30:15 UTC 2017 selfserv_9626 with PID 24477 started at Fri Mar 31 19:30:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12795: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 24477 at Fri Mar 31 19:30:16 UTC 2017 kill -USR1 24477 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24477 killed at Fri Mar 31 19:30:16 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:30:16 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:30:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:30:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12796: Server never started - PASSED kill -0 24546 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24546 found at Fri Mar 31 19:30:22 UTC 2017 selfserv_9626 with PID 24546 started at Fri Mar 31 19:30:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12797: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 24546 at Fri Mar 31 19:30:23 UTC 2017 kill -USR1 24546 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24546 killed at Fri Mar 31 19:30:23 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:30:23 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:30:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:30:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12798: Server never started - PASSED kill -0 24629 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24629 found at Fri Mar 31 19:30:29 UTC 2017 selfserv_9626 with PID 24629 started at Fri Mar 31 19:30:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12799: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 24629 at Fri Mar 31 19:30:30 UTC 2017 kill -USR1 24629 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24629 killed at Fri Mar 31 19:30:30 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:30:31 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:30:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:30:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12800: Server never started - PASSED kill -0 24697 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24697 found at Fri Mar 31 19:30:37 UTC 2017 selfserv_9626 with PID 24697 started at Fri Mar 31 19:30:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12801: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 24697 at Fri Mar 31 19:30:37 UTC 2017 kill -USR1 24697 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24697 killed at Fri Mar 31 19:30:38 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:30:38 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:30:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:30:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12802: Server never started - PASSED kill -0 24766 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24766 found at Fri Mar 31 19:30:44 UTC 2017 selfserv_9626 with PID 24766 started at Fri Mar 31 19:30:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12803: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 24766 at Fri Mar 31 19:30:44 UTC 2017 kill -USR1 24766 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24766 killed at Fri Mar 31 19:30:45 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:30:45 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:30:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:30:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12804: Server never started - PASSED kill -0 24848 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24848 found at Fri Mar 31 19:30:51 UTC 2017 selfserv_9626 with PID 24848 started at Fri Mar 31 19:30:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12805: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 24848 at Fri Mar 31 19:30:51 UTC 2017 kill -USR1 24848 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24848 killed at Fri Mar 31 19:30:52 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:30:52 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:30:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:30:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12806: Server never started - PASSED kill -0 24916 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24916 found at Fri Mar 31 19:30:58 UTC 2017 selfserv_9626 with PID 24916 started at Fri Mar 31 19:30:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12807: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 24916 at Fri Mar 31 19:30:58 UTC 2017 kill -USR1 24916 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24916 killed at Fri Mar 31 19:30:59 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:30:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:30:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:31:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12808: Server never started - PASSED kill -0 24985 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 24985 found at Fri Mar 31 19:31:05 UTC 2017 selfserv_9626 with PID 24985 started at Fri Mar 31 19:31:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12809: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 24985 at Fri Mar 31 19:31:06 UTC 2017 kill -USR1 24985 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 24985 killed at Fri Mar 31 19:31:06 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:31:06 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:31:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:31:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12810: Server never started - PASSED kill -0 25078 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25078 found at Fri Mar 31 19:31:12 UTC 2017 selfserv_9626 with PID 25078 started at Fri Mar 31 19:31:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12811: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 25078 at Fri Mar 31 19:31:13 UTC 2017 kill -USR1 25078 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25078 killed at Fri Mar 31 19:31:13 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:31:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:31:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:31:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12812: Server never started - PASSED kill -0 25146 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25146 found at Fri Mar 31 19:31:19 UTC 2017 selfserv_9626 with PID 25146 started at Fri Mar 31 19:31:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12813: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 25146 at Fri Mar 31 19:31:20 UTC 2017 kill -USR1 25146 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25146 killed at Fri Mar 31 19:31:20 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:31:20 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:31:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:31:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12814: Server never started - PASSED kill -0 25218 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25218 found at Fri Mar 31 19:31:26 UTC 2017 selfserv_9626 with PID 25218 started at Fri Mar 31 19:31:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12815: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 25218 at Fri Mar 31 19:31:27 UTC 2017 kill -USR1 25218 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25218 killed at Fri Mar 31 19:31:27 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:31:28 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:31:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:31:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12816: Server never started - PASSED kill -0 25298 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25298 found at Fri Mar 31 19:31:34 UTC 2017 selfserv_9626 with PID 25298 started at Fri Mar 31 19:31:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12817: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 25298 at Fri Mar 31 19:31:34 UTC 2017 kill -USR1 25298 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25298 killed at Fri Mar 31 19:31:35 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:31:35 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:31:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:31:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12818: Server never started - PASSED kill -0 25366 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25366 found at Fri Mar 31 19:31:41 UTC 2017 selfserv_9626 with PID 25366 started at Fri Mar 31 19:31:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12819: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 25366 at Fri Mar 31 19:31:41 UTC 2017 kill -USR1 25366 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25366 killed at Fri Mar 31 19:31:42 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:31:42 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:31:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:31:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12820: Server never started - PASSED kill -0 25435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25435 found at Fri Mar 31 19:31:48 UTC 2017 selfserv_9626 with PID 25435 started at Fri Mar 31 19:31:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12821: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 25435 at Fri Mar 31 19:31:48 UTC 2017 kill -USR1 25435 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25435 killed at Fri Mar 31 19:31:49 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:31:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:31:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:31:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12822: Server never started - PASSED kill -0 25515 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25515 found at Fri Mar 31 19:31:55 UTC 2017 selfserv_9626 with PID 25515 started at Fri Mar 31 19:31:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12823: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 25515 at Fri Mar 31 19:31:55 UTC 2017 kill -USR1 25515 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25515 killed at Fri Mar 31 19:31:56 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:31:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:31:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:32:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12824: Server never started - PASSED kill -0 25583 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25583 found at Fri Mar 31 19:32:02 UTC 2017 selfserv_9626 with PID 25583 started at Fri Mar 31 19:32:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12825: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 25583 at Fri Mar 31 19:32:03 UTC 2017 kill -USR1 25583 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25583 killed at Fri Mar 31 19:32:03 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:32:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:32:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:32:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12826: Server never started - PASSED kill -0 25667 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25667 found at Fri Mar 31 19:32:09 UTC 2017 selfserv_9626 with PID 25667 started at Fri Mar 31 19:32:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12827: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 25667 at Fri Mar 31 19:32:10 UTC 2017 kill -USR1 25667 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25667 killed at Fri Mar 31 19:32:10 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:32:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:32:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:32:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12828: Server never started - PASSED kill -0 25747 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25747 found at Fri Mar 31 19:32:16 UTC 2017 selfserv_9626 with PID 25747 started at Fri Mar 31 19:32:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12829: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 25747 at Fri Mar 31 19:32:17 UTC 2017 kill -USR1 25747 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25747 killed at Fri Mar 31 19:32:17 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:32:17 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:32:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:32:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12830: Server never started - PASSED kill -0 25815 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25815 found at Fri Mar 31 19:32:23 UTC 2017 selfserv_9626 with PID 25815 started at Fri Mar 31 19:32:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12831: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 25815 at Fri Mar 31 19:32:24 UTC 2017 kill -USR1 25815 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25815 killed at Fri Mar 31 19:32:24 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:32:24 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:32:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:32:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12832: Server never started - PASSED kill -0 25887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25887 found at Fri Mar 31 19:32:30 UTC 2017 selfserv_9626 with PID 25887 started at Fri Mar 31 19:32:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12833: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 25887 at Fri Mar 31 19:32:31 UTC 2017 kill -USR1 25887 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25887 killed at Fri Mar 31 19:32:31 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:32:32 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:32:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:32:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12834: Server never started - PASSED kill -0 25967 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25967 found at Fri Mar 31 19:32:38 UTC 2017 selfserv_9626 with PID 25967 started at Fri Mar 31 19:32:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12835: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 25967 at Fri Mar 31 19:32:38 UTC 2017 kill -USR1 25967 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25967 killed at Fri Mar 31 19:32:39 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:32:39 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:32:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:32:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12836: Server never started - PASSED kill -0 26035 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26035 found at Fri Mar 31 19:32:45 UTC 2017 selfserv_9626 with PID 26035 started at Fri Mar 31 19:32:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12837: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 26035 at Fri Mar 31 19:32:45 UTC 2017 kill -USR1 26035 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 26035 killed at Fri Mar 31 19:32:46 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:32:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:32:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:32:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12838: Server never started - PASSED kill -0 26104 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26104 found at Fri Mar 31 19:32:52 UTC 2017 selfserv_9626 with PID 26104 started at Fri Mar 31 19:32:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12839: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 26104 at Fri Mar 31 19:32:52 UTC 2017 kill -USR1 26104 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 26104 killed at Fri Mar 31 19:32:53 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:32:53 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:32:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:32:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12840: Server never started - PASSED kill -0 26186 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26186 found at Fri Mar 31 19:32:59 UTC 2017 selfserv_9626 with PID 26186 started at Fri Mar 31 19:32:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12841: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 26186 at Fri Mar 31 19:33:00 UTC 2017 kill -USR1 26186 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 26186 killed at Fri Mar 31 19:33:00 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:33:00 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:33:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:33:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12842: Server never started - PASSED kill -0 26255 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26255 found at Fri Mar 31 19:33:06 UTC 2017 selfserv_9626 with PID 26255 started at Fri Mar 31 19:33:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12843: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 26255 at Fri Mar 31 19:33:07 UTC 2017 kill -USR1 26255 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 26255 killed at Fri Mar 31 19:33:07 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:33:07 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:33:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:33:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12844: Server never started - PASSED kill -0 26337 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26337 found at Fri Mar 31 19:33:13 UTC 2017 selfserv_9626 with PID 26337 started at Fri Mar 31 19:33:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12845: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 26337 at Fri Mar 31 19:33:14 UTC 2017 kill -USR1 26337 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 26337 killed at Fri Mar 31 19:33:14 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:33:14 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:33:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:33:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12846: Server never started - PASSED kill -0 26417 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26417 found at Fri Mar 31 19:33:20 UTC 2017 selfserv_9626 with PID 26417 started at Fri Mar 31 19:33:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12847: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 26417 at Fri Mar 31 19:33:21 UTC 2017 kill -USR1 26417 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 26417 killed at Fri Mar 31 19:33:21 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:33:22 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:33:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:33:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12848: Server never started - PASSED kill -0 26490 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26490 found at Fri Mar 31 19:33:27 UTC 2017 selfserv_9626 with PID 26490 started at Fri Mar 31 19:33:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12849: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 26490 at Fri Mar 31 19:33:28 UTC 2017 kill -USR1 26490 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 26490 killed at Fri Mar 31 19:33:28 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:33:29 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:33:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:33:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12850: Server never started - PASSED kill -0 26558 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26558 found at Fri Mar 31 19:33:35 UTC 2017 selfserv_9626 with PID 26558 started at Fri Mar 31 19:33:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12851: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 26558 at Fri Mar 31 19:33:35 UTC 2017 kill -USR1 26558 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 26558 killed at Fri Mar 31 19:33:36 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:33:36 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:33:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:33:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12852: Server never started - PASSED kill -0 26638 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26638 found at Fri Mar 31 19:33:42 UTC 2017 selfserv_9626 with PID 26638 started at Fri Mar 31 19:33:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12853: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 26638 at Fri Mar 31 19:33:42 UTC 2017 kill -USR1 26638 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 26638 killed at Fri Mar 31 19:33:43 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:33:43 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:33:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:33:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12854: Server never started - PASSED kill -0 26707 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26707 found at Fri Mar 31 19:33:49 UTC 2017 selfserv_9626 with PID 26707 started at Fri Mar 31 19:33:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12855: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 26707 at Fri Mar 31 19:33:49 UTC 2017 kill -USR1 26707 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 26707 killed at Fri Mar 31 19:33:50 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:33:50 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:33:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:33:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12856: Server never started - PASSED kill -0 26775 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26775 found at Fri Mar 31 19:33:56 UTC 2017 selfserv_9626 with PID 26775 started at Fri Mar 31 19:33:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12857: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 26775 at Fri Mar 31 19:33:56 UTC 2017 kill -USR1 26775 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 26775 killed at Fri Mar 31 19:33:57 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:33:57 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:33:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:34:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12858: Server never started - PASSED kill -0 26855 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26855 found at Fri Mar 31 19:34:03 UTC 2017 selfserv_9626 with PID 26855 started at Fri Mar 31 19:34:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12859: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 26855 at Fri Mar 31 19:34:04 UTC 2017 kill -USR1 26855 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 26855 killed at Fri Mar 31 19:34:04 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:34:04 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:34:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:34:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12860: Server never started - PASSED kill -0 26938 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 26938 found at Fri Mar 31 19:34:10 UTC 2017 selfserv_9626 with PID 26938 started at Fri Mar 31 19:34:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12861: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 26938 at Fri Mar 31 19:34:11 UTC 2017 kill -USR1 26938 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 26938 killed at Fri Mar 31 19:34:11 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:34:11 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:34:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:34:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12862: Server never started - PASSED kill -0 27007 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27007 found at Fri Mar 31 19:34:17 UTC 2017 selfserv_9626 with PID 27007 started at Fri Mar 31 19:34:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12863: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 27007 at Fri Mar 31 19:34:18 UTC 2017 kill -USR1 27007 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 27007 killed at Fri Mar 31 19:34:18 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:34:18 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:34:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:34:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12864: Server never started - PASSED kill -0 27087 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27087 found at Fri Mar 31 19:34:24 UTC 2017 selfserv_9626 with PID 27087 started at Fri Mar 31 19:34:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12865: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 27087 at Fri Mar 31 19:34:25 UTC 2017 kill -USR1 27087 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 27087 killed at Fri Mar 31 19:34:25 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:34:26 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:34:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:34:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12866: Server never started - PASSED kill -0 27159 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27159 found at Fri Mar 31 19:34:32 UTC 2017 selfserv_9626 with PID 27159 started at Fri Mar 31 19:34:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12867: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 27159 at Fri Mar 31 19:34:32 UTC 2017 kill -USR1 27159 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 27159 killed at Fri Mar 31 19:34:33 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:34:33 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:34:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:34:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12868: Server never started - PASSED kill -0 27227 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27227 found at Fri Mar 31 19:34:39 UTC 2017 selfserv_9626 with PID 27227 started at Fri Mar 31 19:34:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12869: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 27227 at Fri Mar 31 19:34:39 UTC 2017 kill -USR1 27227 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 27227 killed at Fri Mar 31 19:34:40 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:34:40 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:34:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:34:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12870: Server never started - PASSED kill -0 27307 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27307 found at Fri Mar 31 19:34:46 UTC 2017 selfserv_9626 with PID 27307 started at Fri Mar 31 19:34:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12871: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 27307 at Fri Mar 31 19:34:46 UTC 2017 kill -USR1 27307 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 27307 killed at Fri Mar 31 19:34:47 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:34:47 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:34:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:34:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12872: Server never started - PASSED kill -0 27376 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27376 found at Fri Mar 31 19:34:53 UTC 2017 selfserv_9626 with PID 27376 started at Fri Mar 31 19:34:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12873: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 27376 at Fri Mar 31 19:34:53 UTC 2017 kill -USR1 27376 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 27376 killed at Fri Mar 31 19:34:54 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:34:54 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:34:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:34:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12874: Server never started - PASSED kill -0 27444 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27444 found at Fri Mar 31 19:35:00 UTC 2017 selfserv_9626 with PID 27444 started at Fri Mar 31 19:35:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12875: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 27444 at Fri Mar 31 19:35:01 UTC 2017 kill -USR1 27444 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 27444 killed at Fri Mar 31 19:35:01 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:35:01 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:35:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:35:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12876: Server never started - PASSED kill -0 27526 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27526 found at Fri Mar 31 19:35:07 UTC 2017 selfserv_9626 with PID 27526 started at Fri Mar 31 19:35:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12877: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 27526 at Fri Mar 31 19:35:08 UTC 2017 kill -USR1 27526 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 27526 killed at Fri Mar 31 19:35:08 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:35:08 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:35:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:35:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12878: Server never started - PASSED kill -0 27606 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27606 found at Fri Mar 31 19:35:14 UTC 2017 selfserv_9626 with PID 27606 started at Fri Mar 31 19:35:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12879: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 27606 at Fri Mar 31 19:35:15 UTC 2017 kill -USR1 27606 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 27606 killed at Fri Mar 31 19:35:15 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:35:15 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:35:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:35:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12880: Server never started - PASSED kill -0 27674 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27674 found at Fri Mar 31 19:35:21 UTC 2017 selfserv_9626 with PID 27674 started at Fri Mar 31 19:35:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12881: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 27674 at Fri Mar 31 19:35:22 UTC 2017 kill -USR1 27674 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 27674 killed at Fri Mar 31 19:35:22 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:35:23 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:35:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:35:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12882: Server never started - PASSED kill -0 27757 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27757 found at Fri Mar 31 19:35:29 UTC 2017 selfserv_9626 with PID 27757 started at Fri Mar 31 19:35:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12883: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 27757 at Fri Mar 31 19:35:29 UTC 2017 kill -USR1 27757 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 27757 killed at Fri Mar 31 19:35:30 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:35:30 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:35:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:35:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12884: Server never started - PASSED kill -0 27826 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27826 found at Fri Mar 31 19:35:36 UTC 2017 selfserv_9626 with PID 27826 started at Fri Mar 31 19:35:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12885: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 27826 at Fri Mar 31 19:35:36 UTC 2017 kill -USR1 27826 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 27826 killed at Fri Mar 31 19:35:37 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:35:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:35:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:35:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12886: Server never started - PASSED kill -0 27894 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27894 found at Fri Mar 31 19:35:43 UTC 2017 selfserv_9626 with PID 27894 started at Fri Mar 31 19:35:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12887: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 27894 at Fri Mar 31 19:35:43 UTC 2017 kill -USR1 27894 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 27894 killed at Fri Mar 31 19:35:44 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:35:44 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:35:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:35:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12888: Server never started - PASSED kill -0 27975 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 27975 found at Fri Mar 31 19:35:50 UTC 2017 selfserv_9626 with PID 27975 started at Fri Mar 31 19:35:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12889: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 27975 at Fri Mar 31 19:35:51 UTC 2017 kill -USR1 27975 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 27975 killed at Fri Mar 31 19:35:51 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:35:51 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:35:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:35:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12890: Server never started - PASSED kill -0 28043 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28043 found at Fri Mar 31 19:35:57 UTC 2017 selfserv_9626 with PID 28043 started at Fri Mar 31 19:35:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12891: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 28043 at Fri Mar 31 19:35:58 UTC 2017 kill -USR1 28043 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28043 killed at Fri Mar 31 19:35:58 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:35:58 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:35:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:36:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12892: Server never started - PASSED kill -0 28111 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28111 found at Fri Mar 31 19:36:04 UTC 2017 selfserv_9626 with PID 28111 started at Fri Mar 31 19:36:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12893: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 28111 at Fri Mar 31 19:36:05 UTC 2017 kill -USR1 28111 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28111 killed at Fri Mar 31 19:36:05 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:36:05 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:36:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:36:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12894: Server never started - PASSED kill -0 28206 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28206 found at Fri Mar 31 19:36:11 UTC 2017 selfserv_9626 with PID 28206 started at Fri Mar 31 19:36:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12895: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 28206 at Fri Mar 31 19:36:12 UTC 2017 kill -USR1 28206 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28206 killed at Fri Mar 31 19:36:12 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:36:12 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:36:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:36:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12896: Server never started - PASSED kill -0 28274 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28274 found at Fri Mar 31 19:36:18 UTC 2017 selfserv_9626 with PID 28274 started at Fri Mar 31 19:36:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12897: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 28274 at Fri Mar 31 19:36:19 UTC 2017 kill -USR1 28274 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28274 killed at Fri Mar 31 19:36:19 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:36:20 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:36:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:36:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12898: Server never started - PASSED kill -0 28342 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28342 found at Fri Mar 31 19:36:25 UTC 2017 selfserv_9626 with PID 28342 started at Fri Mar 31 19:36:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12899: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 28342 at Fri Mar 31 19:36:26 UTC 2017 kill -USR1 28342 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28342 killed at Fri Mar 31 19:36:26 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:36:27 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:36:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:36:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12900: Server never started - PASSED kill -0 28426 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28426 found at Fri Mar 31 19:36:33 UTC 2017 selfserv_9626 with PID 28426 started at Fri Mar 31 19:36:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12901: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 28426 at Fri Mar 31 19:36:33 UTC 2017 kill -USR1 28426 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28426 killed at Fri Mar 31 19:36:34 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:36:34 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:36:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:36:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12902: Server never started - PASSED kill -0 28494 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28494 found at Fri Mar 31 19:36:40 UTC 2017 selfserv_9626 with PID 28494 started at Fri Mar 31 19:36:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12903: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 28494 at Fri Mar 31 19:36:40 UTC 2017 kill -USR1 28494 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28494 killed at Fri Mar 31 19:36:41 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:36:41 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:36:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:36:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12904: Server never started - PASSED kill -0 28562 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28562 found at Fri Mar 31 19:36:47 UTC 2017 selfserv_9626 with PID 28562 started at Fri Mar 31 19:36:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12905: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 28562 at Fri Mar 31 19:36:47 UTC 2017 kill -USR1 28562 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28562 killed at Fri Mar 31 19:36:48 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:36:48 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:36:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:36:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12906: Server never started - PASSED kill -0 28643 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28643 found at Fri Mar 31 19:36:54 UTC 2017 selfserv_9626 with PID 28643 started at Fri Mar 31 19:36:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12907: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 28643 at Fri Mar 31 19:36:55 UTC 2017 kill -USR1 28643 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28643 killed at Fri Mar 31 19:36:55 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:36:55 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:36:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:37:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12908: Server never started - PASSED kill -0 28711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28711 found at Fri Mar 31 19:37:01 UTC 2017 selfserv_9626 with PID 28711 started at Fri Mar 31 19:37:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12909: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 28711 at Fri Mar 31 19:37:02 UTC 2017 kill -USR1 28711 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28711 killed at Fri Mar 31 19:37:02 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:37:02 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:37:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:37:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12910: Server never started - PASSED kill -0 28792 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28792 found at Fri Mar 31 19:37:08 UTC 2017 selfserv_9626 with PID 28792 started at Fri Mar 31 19:37:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12911: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 28792 at Fri Mar 31 19:37:09 UTC 2017 kill -USR1 28792 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28792 killed at Fri Mar 31 19:37:09 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:37:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:37:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:37:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12912: Server never started - PASSED kill -0 28873 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28873 found at Fri Mar 31 19:37:15 UTC 2017 selfserv_9626 with PID 28873 started at Fri Mar 31 19:37:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12913: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 28873 at Fri Mar 31 19:37:16 UTC 2017 kill -USR1 28873 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28873 killed at Fri Mar 31 19:37:16 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:37:17 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:37:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:37:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12914: Server never started - PASSED kill -0 28941 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 28941 found at Fri Mar 31 19:37:23 UTC 2017 selfserv_9626 with PID 28941 started at Fri Mar 31 19:37:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12915: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 28941 at Fri Mar 31 19:37:23 UTC 2017 kill -USR1 28941 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 28941 killed at Fri Mar 31 19:37:24 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:37:24 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:37:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:37:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12916: Server never started - PASSED kill -0 29012 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29012 found at Fri Mar 31 19:37:30 UTC 2017 selfserv_9626 with PID 29012 started at Fri Mar 31 19:37:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12917: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 29012 at Fri Mar 31 19:37:30 UTC 2017 kill -USR1 29012 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29012 killed at Fri Mar 31 19:37:31 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:37:31 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:37:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:37:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12918: Server never started - PASSED kill -0 29093 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29093 found at Fri Mar 31 19:37:37 UTC 2017 selfserv_9626 with PID 29093 started at Fri Mar 31 19:37:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12919: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 29093 at Fri Mar 31 19:37:37 UTC 2017 kill -USR1 29093 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29093 killed at Fri Mar 31 19:37:38 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:37:38 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:37:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:37:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12920: Server never started - PASSED kill -0 29161 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29161 found at Fri Mar 31 19:37:44 UTC 2017 selfserv_9626 with PID 29161 started at Fri Mar 31 19:37:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12921: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 29161 at Fri Mar 31 19:37:45 UTC 2017 kill -USR1 29161 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29161 killed at Fri Mar 31 19:37:45 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9626 starting at Fri Mar 31 19:37:45 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:37:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:37:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12922: Server never started - PASSED kill -0 29229 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29229 found at Fri Mar 31 19:37:51 UTC 2017 selfserv_9626 with PID 29229 started at Fri Mar 31 19:37:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12923: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 29229 at Fri Mar 31 19:37:52 UTC 2017 kill -USR1 29229 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29229 killed at Fri Mar 31 19:37:52 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:37:52 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:37:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:37:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12924: Server never started - PASSED kill -0 29310 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29310 found at Fri Mar 31 19:37:58 UTC 2017 selfserv_9626 with PID 29310 started at Fri Mar 31 19:37:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12925: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 29310 at Fri Mar 31 19:37:59 UTC 2017 kill -USR1 29310 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29310 killed at Fri Mar 31 19:37:59 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:37:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:37:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:38:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12926: Server never started - PASSED kill -0 29378 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29378 found at Fri Mar 31 19:38:05 UTC 2017 selfserv_9626 with PID 29378 started at Fri Mar 31 19:38:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12927: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 29378 at Fri Mar 31 19:38:06 UTC 2017 kill -USR1 29378 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29378 killed at Fri Mar 31 19:38:06 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:38:06 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:38:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:38:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12928: Server never started - PASSED kill -0 29459 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29459 found at Fri Mar 31 19:38:12 UTC 2017 selfserv_9626 with PID 29459 started at Fri Mar 31 19:38:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12929: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 29459 at Fri Mar 31 19:38:13 UTC 2017 kill -USR1 29459 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29459 killed at Fri Mar 31 19:38:13 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:38:14 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:38:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:38:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12930: Server never started - PASSED kill -0 29540 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29540 found at Fri Mar 31 19:38:20 UTC 2017 selfserv_9626 with PID 29540 started at Fri Mar 31 19:38:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12931: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 29540 at Fri Mar 31 19:38:20 UTC 2017 kill -USR1 29540 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29540 killed at Fri Mar 31 19:38:21 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:38:21 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:38:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:38:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12932: Server never started - PASSED kill -0 29611 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29611 found at Fri Mar 31 19:38:27 UTC 2017 selfserv_9626 with PID 29611 started at Fri Mar 31 19:38:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12933: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 29611 at Fri Mar 31 19:38:27 UTC 2017 kill -USR1 29611 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29611 killed at Fri Mar 31 19:38:28 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:38:28 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:38:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:38:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12934: Server never started - PASSED kill -0 29679 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29679 found at Fri Mar 31 19:38:34 UTC 2017 selfserv_9626 with PID 29679 started at Fri Mar 31 19:38:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12935: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 29679 at Fri Mar 31 19:38:34 UTC 2017 kill -USR1 29679 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29679 killed at Fri Mar 31 19:38:35 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:38:35 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:38:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:38:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12936: Server never started - PASSED kill -0 29769 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29769 found at Fri Mar 31 19:38:41 UTC 2017 selfserv_9626 with PID 29769 started at Fri Mar 31 19:38:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12937: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 29769 at Fri Mar 31 19:38:42 UTC 2017 kill -USR1 29769 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29769 killed at Fri Mar 31 19:38:42 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:38:42 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:38:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:38:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12938: Server never started - PASSED kill -0 29837 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29837 found at Fri Mar 31 19:38:48 UTC 2017 selfserv_9626 with PID 29837 started at Fri Mar 31 19:38:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12939: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 29837 at Fri Mar 31 19:38:49 UTC 2017 kill -USR1 29837 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29837 killed at Fri Mar 31 19:38:49 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:38:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:38:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:38:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12940: Server never started - PASSED kill -0 29906 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29906 found at Fri Mar 31 19:38:55 UTC 2017 selfserv_9626 with PID 29906 started at Fri Mar 31 19:38:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12941: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 29906 at Fri Mar 31 19:38:56 UTC 2017 kill -USR1 29906 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29906 killed at Fri Mar 31 19:38:56 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:38:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:38:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:39:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12942: Server never started - PASSED kill -0 29986 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 29986 found at Fri Mar 31 19:39:02 UTC 2017 selfserv_9626 with PID 29986 started at Fri Mar 31 19:39:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12943: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 29986 at Fri Mar 31 19:39:03 UTC 2017 kill -USR1 29986 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 29986 killed at Fri Mar 31 19:39:03 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:39:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:39:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:39:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12944: Server never started - PASSED kill -0 30068 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30068 found at Fri Mar 31 19:39:09 UTC 2017 selfserv_9626 with PID 30068 started at Fri Mar 31 19:39:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12945: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 30068 at Fri Mar 31 19:39:10 UTC 2017 kill -USR1 30068 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30068 killed at Fri Mar 31 19:39:10 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:39:11 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:39:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:39:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12946: Server never started - PASSED kill -0 30137 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30137 found at Fri Mar 31 19:39:17 UTC 2017 selfserv_9626 with PID 30137 started at Fri Mar 31 19:39:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12947: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 30137 at Fri Mar 31 19:39:17 UTC 2017 kill -USR1 30137 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30137 killed at Fri Mar 31 19:39:18 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:39:18 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:39:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:39:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12948: Server never started - PASSED kill -0 30217 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30217 found at Fri Mar 31 19:39:24 UTC 2017 selfserv_9626 with PID 30217 started at Fri Mar 31 19:39:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12949: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 30217 at Fri Mar 31 19:39:24 UTC 2017 kill -USR1 30217 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30217 killed at Fri Mar 31 19:39:25 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:39:25 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:39:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:39:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12950: Server never started - PASSED kill -0 30288 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30288 found at Fri Mar 31 19:39:31 UTC 2017 selfserv_9626 with PID 30288 started at Fri Mar 31 19:39:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12951: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 30288 at Fri Mar 31 19:39:31 UTC 2017 kill -USR1 30288 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30288 killed at Fri Mar 31 19:39:32 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:39:32 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:39:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:39:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12952: Server never started - PASSED kill -0 30357 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30357 found at Fri Mar 31 19:39:38 UTC 2017 selfserv_9626 with PID 30357 started at Fri Mar 31 19:39:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12953: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 30357 at Fri Mar 31 19:39:38 UTC 2017 kill -USR1 30357 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30357 killed at Fri Mar 31 19:39:39 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:39:39 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:39:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:39:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12954: Server never started - PASSED kill -0 30437 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30437 found at Fri Mar 31 19:39:45 UTC 2017 selfserv_9626 with PID 30437 started at Fri Mar 31 19:39:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12955: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 30437 at Fri Mar 31 19:39:46 UTC 2017 kill -USR1 30437 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30437 killed at Fri Mar 31 19:39:46 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:39:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:39:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:39:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12956: Server never started - PASSED kill -0 30505 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30505 found at Fri Mar 31 19:39:52 UTC 2017 selfserv_9626 with PID 30505 started at Fri Mar 31 19:39:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12957: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 30505 at Fri Mar 31 19:39:53 UTC 2017 kill -USR1 30505 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30505 killed at Fri Mar 31 19:39:53 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:39:53 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:39:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:39:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12958: Server never started - PASSED kill -0 30574 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30574 found at Fri Mar 31 19:39:59 UTC 2017 selfserv_9626 with PID 30574 started at Fri Mar 31 19:39:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12959: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 30574 at Fri Mar 31 19:40:00 UTC 2017 kill -USR1 30574 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30574 killed at Fri Mar 31 19:40:00 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:40:00 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:40:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:40:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12960: Server never started - PASSED kill -0 30654 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30654 found at Fri Mar 31 19:40:06 UTC 2017 selfserv_9626 with PID 30654 started at Fri Mar 31 19:40:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12961: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 30654 at Fri Mar 31 19:40:07 UTC 2017 kill -USR1 30654 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30654 killed at Fri Mar 31 19:40:07 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:40:08 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:40:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:40:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12962: Server never started - PASSED kill -0 30735 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30735 found at Fri Mar 31 19:40:14 UTC 2017 selfserv_9626 with PID 30735 started at Fri Mar 31 19:40:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12963: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 30735 at Fri Mar 31 19:40:14 UTC 2017 kill -USR1 30735 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30735 killed at Fri Mar 31 19:40:15 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:40:15 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:40:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:40:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12964: Server never started - PASSED kill -0 30804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30804 found at Fri Mar 31 19:40:21 UTC 2017 selfserv_9626 with PID 30804 started at Fri Mar 31 19:40:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12965: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 30804 at Fri Mar 31 19:40:21 UTC 2017 kill -USR1 30804 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30804 killed at Fri Mar 31 19:40:22 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:40:22 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:40:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:40:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12966: Server never started - PASSED kill -0 30887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30887 found at Fri Mar 31 19:40:28 UTC 2017 selfserv_9626 with PID 30887 started at Fri Mar 31 19:40:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12967: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 30887 at Fri Mar 31 19:40:28 UTC 2017 kill -USR1 30887 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30887 killed at Fri Mar 31 19:40:29 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:40:29 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:40:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:40:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12968: Server never started - PASSED kill -0 30955 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 30955 found at Fri Mar 31 19:40:35 UTC 2017 selfserv_9626 with PID 30955 started at Fri Mar 31 19:40:35 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12969: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 30955 at Fri Mar 31 19:40:35 UTC 2017 kill -USR1 30955 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 30955 killed at Fri Mar 31 19:40:36 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:40:36 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:40:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:40:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12970: Server never started - PASSED kill -0 31024 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31024 found at Fri Mar 31 19:40:42 UTC 2017 selfserv_9626 with PID 31024 started at Fri Mar 31 19:40:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12971: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 31024 at Fri Mar 31 19:40:43 UTC 2017 kill -USR1 31024 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31024 killed at Fri Mar 31 19:40:43 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:40:43 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:40:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:40:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12972: Server never started - PASSED kill -0 31104 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31104 found at Fri Mar 31 19:40:49 UTC 2017 selfserv_9626 with PID 31104 started at Fri Mar 31 19:40:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12973: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 31104 at Fri Mar 31 19:40:50 UTC 2017 kill -USR1 31104 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31104 killed at Fri Mar 31 19:40:50 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:40:50 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:40:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:40:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12974: Server never started - PASSED kill -0 31172 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31172 found at Fri Mar 31 19:40:56 UTC 2017 selfserv_9626 with PID 31172 started at Fri Mar 31 19:40:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12975: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 31172 at Fri Mar 31 19:40:57 UTC 2017 kill -USR1 31172 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31172 killed at Fri Mar 31 19:40:57 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:40:57 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:40:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:41:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12976: Server never started - PASSED kill -0 31241 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31241 found at Fri Mar 31 19:41:03 UTC 2017 selfserv_9626 with PID 31241 started at Fri Mar 31 19:41:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12977: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 31241 at Fri Mar 31 19:41:04 UTC 2017 kill -USR1 31241 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31241 killed at Fri Mar 31 19:41:04 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:41:05 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:41:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:41:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12978: Server never started - PASSED kill -0 31335 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31335 found at Fri Mar 31 19:41:11 UTC 2017 selfserv_9626 with PID 31335 started at Fri Mar 31 19:41:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12979: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 31335 at Fri Mar 31 19:41:11 UTC 2017 kill -USR1 31335 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31335 killed at Fri Mar 31 19:41:12 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:41:12 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:41:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:41:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12980: Server never started - PASSED kill -0 31403 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31403 found at Fri Mar 31 19:41:18 UTC 2017 selfserv_9626 with PID 31403 started at Fri Mar 31 19:41:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12981: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 31403 at Fri Mar 31 19:41:18 UTC 2017 kill -USR1 31403 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31403 killed at Fri Mar 31 19:41:19 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:41:19 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:41:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:41:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12982: Server never started - PASSED kill -0 31472 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31472 found at Fri Mar 31 19:41:25 UTC 2017 selfserv_9626 with PID 31472 started at Fri Mar 31 19:41:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12983: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 31472 at Fri Mar 31 19:41:25 UTC 2017 kill -USR1 31472 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31472 killed at Fri Mar 31 19:41:26 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:41:26 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:41:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:41:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12984: Server never started - PASSED kill -0 31556 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31556 found at Fri Mar 31 19:41:32 UTC 2017 selfserv_9626 with PID 31556 started at Fri Mar 31 19:41:32 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12985: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 31556 at Fri Mar 31 19:41:32 UTC 2017 kill -USR1 31556 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31556 killed at Fri Mar 31 19:41:33 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:41:33 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:41:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:41:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12986: Server never started - PASSED kill -0 31625 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31625 found at Fri Mar 31 19:41:39 UTC 2017 selfserv_9626 with PID 31625 started at Fri Mar 31 19:41:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12987: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 31625 at Fri Mar 31 19:41:40 UTC 2017 kill -USR1 31625 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31625 killed at Fri Mar 31 19:41:40 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:41:40 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:41:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:41:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12988: Server never started - PASSED kill -0 31693 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31693 found at Fri Mar 31 19:41:46 UTC 2017 selfserv_9626 with PID 31693 started at Fri Mar 31 19:41:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12989: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 31693 at Fri Mar 31 19:41:47 UTC 2017 kill -USR1 31693 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31693 killed at Fri Mar 31 19:41:47 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:41:47 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:41:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:41:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12990: Server never started - PASSED kill -0 31775 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31775 found at Fri Mar 31 19:41:53 UTC 2017 selfserv_9626 with PID 31775 started at Fri Mar 31 19:41:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12991: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 31775 at Fri Mar 31 19:41:54 UTC 2017 kill -USR1 31775 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31775 killed at Fri Mar 31 19:41:54 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:41:54 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:41:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:42:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12992: Server never started - PASSED kill -0 31844 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31844 found at Fri Mar 31 19:42:00 UTC 2017 selfserv_9626 with PID 31844 started at Fri Mar 31 19:42:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12993: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 31844 at Fri Mar 31 19:42:01 UTC 2017 kill -USR1 31844 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31844 killed at Fri Mar 31 19:42:02 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:42:02 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:42:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:42:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12994: Server never started - PASSED kill -0 31936 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 31936 found at Fri Mar 31 19:42:08 UTC 2017 selfserv_9626 with PID 31936 started at Fri Mar 31 19:42:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12995: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 31936 at Fri Mar 31 19:42:08 UTC 2017 kill -USR1 31936 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 31936 killed at Fri Mar 31 19:42:09 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:42:09 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:42:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:42:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12996: Server never started - PASSED kill -0 32026 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32026 found at Fri Mar 31 19:42:15 UTC 2017 selfserv_9626 with PID 32026 started at Fri Mar 31 19:42:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12997: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 32026 at Fri Mar 31 19:42:15 UTC 2017 kill -USR1 32026 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32026 killed at Fri Mar 31 19:42:16 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:42:16 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:42:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:42:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12998: Server never started - PASSED kill -0 32095 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32095 found at Fri Mar 31 19:42:22 UTC 2017 selfserv_9626 with PID 32095 started at Fri Mar 31 19:42:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #12999: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 32095 at Fri Mar 31 19:42:23 UTC 2017 kill -USR1 32095 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32095 killed at Fri Mar 31 19:42:23 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:42:23 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:42:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:42:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13000: Server never started - PASSED kill -0 32166 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32166 found at Fri Mar 31 19:42:29 UTC 2017 selfserv_9626 with PID 32166 started at Fri Mar 31 19:42:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13001: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 32166 at Fri Mar 31 19:42:30 UTC 2017 kill -USR1 32166 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32166 killed at Fri Mar 31 19:42:30 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:42:30 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:42:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:42:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13002: Server never started - PASSED kill -0 32246 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32246 found at Fri Mar 31 19:42:36 UTC 2017 selfserv_9626 with PID 32246 started at Fri Mar 31 19:42:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13003: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 32246 at Fri Mar 31 19:42:37 UTC 2017 kill -USR1 32246 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32246 killed at Fri Mar 31 19:42:37 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:42:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:42:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:42:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13004: Server never started - PASSED kill -0 32315 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32315 found at Fri Mar 31 19:42:43 UTC 2017 selfserv_9626 with PID 32315 started at Fri Mar 31 19:42:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13005: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 32315 at Fri Mar 31 19:42:44 UTC 2017 kill -USR1 32315 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32315 killed at Fri Mar 31 19:42:44 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:42:44 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:42:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:42:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13006: Server never started - PASSED kill -0 32383 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32383 found at Fri Mar 31 19:42:50 UTC 2017 selfserv_9626 with PID 32383 started at Fri Mar 31 19:42:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13007: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 32383 at Fri Mar 31 19:42:51 UTC 2017 kill -USR1 32383 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32383 killed at Fri Mar 31 19:42:51 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:42:52 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:42:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:42:57 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13008: Server never started - PASSED kill -0 32463 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32463 found at Fri Mar 31 19:42:58 UTC 2017 selfserv_9626 with PID 32463 started at Fri Mar 31 19:42:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13009: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 32463 at Fri Mar 31 19:42:58 UTC 2017 kill -USR1 32463 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32463 killed at Fri Mar 31 19:42:59 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:42:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:42:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:43:04 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13010: Server never started - PASSED kill -0 32532 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32532 found at Fri Mar 31 19:43:05 UTC 2017 selfserv_9626 with PID 32532 started at Fri Mar 31 19:43:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13011: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 32532 at Fri Mar 31 19:43:05 UTC 2017 kill -USR1 32532 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32532 killed at Fri Mar 31 19:43:06 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:43:06 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:43:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:43:11 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13012: Server never started - PASSED kill -0 32613 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32613 found at Fri Mar 31 19:43:12 UTC 2017 selfserv_9626 with PID 32613 started at Fri Mar 31 19:43:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13013: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 32613 at Fri Mar 31 19:43:12 UTC 2017 kill -USR1 32613 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32613 killed at Fri Mar 31 19:43:13 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:43:13 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:43:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:43:18 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13014: Server never started - PASSED kill -0 32693 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32693 found at Fri Mar 31 19:43:19 UTC 2017 selfserv_9626 with PID 32693 started at Fri Mar 31 19:43:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13015: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 32693 at Fri Mar 31 19:43:20 UTC 2017 kill -USR1 32693 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32693 killed at Fri Mar 31 19:43:20 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:43:20 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:43:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:43:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13016: Server never started - PASSED kill -0 32762 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 32762 found at Fri Mar 31 19:43:26 UTC 2017 selfserv_9626 with PID 32762 started at Fri Mar 31 19:43:26 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13017: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 32762 at Fri Mar 31 19:43:27 UTC 2017 kill -USR1 32762 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 32762 killed at Fri Mar 31 19:43:27 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:43:27 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:43:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:43:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13018: Server never started - PASSED kill -0 365 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 365 found at Fri Mar 31 19:43:33 UTC 2017 selfserv_9626 with PID 365 started at Fri Mar 31 19:43:33 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13019: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 365 at Fri Mar 31 19:43:34 UTC 2017 kill -USR1 365 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 365 killed at Fri Mar 31 19:43:34 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:43:34 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:43:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:43:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13020: Server never started - PASSED kill -0 447 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 447 found at Fri Mar 31 19:43:40 UTC 2017 selfserv_9626 with PID 447 started at Fri Mar 31 19:43:40 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13021: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 447 at Fri Mar 31 19:43:41 UTC 2017 kill -USR1 447 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 447 killed at Fri Mar 31 19:43:41 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:43:41 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:43:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:43:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13022: Server never started - PASSED kill -0 517 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 517 found at Fri Mar 31 19:43:47 UTC 2017 selfserv_9626 with PID 517 started at Fri Mar 31 19:43:47 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13023: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 517 at Fri Mar 31 19:43:48 UTC 2017 kill -USR1 517 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 517 killed at Fri Mar 31 19:43:48 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:43:49 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:43:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:43:54 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13024: Server never started - PASSED kill -0 585 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 585 found at Fri Mar 31 19:43:55 UTC 2017 selfserv_9626 with PID 585 started at Fri Mar 31 19:43:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13025: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 585 at Fri Mar 31 19:43:55 UTC 2017 kill -USR1 585 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 585 killed at Fri Mar 31 19:43:56 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:43:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:43:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:44:01 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13026: Server never started - PASSED kill -0 665 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 665 found at Fri Mar 31 19:44:02 UTC 2017 selfserv_9626 with PID 665 started at Fri Mar 31 19:44:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13027: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 665 at Fri Mar 31 19:44:02 UTC 2017 kill -USR1 665 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 665 killed at Fri Mar 31 19:44:03 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:44:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:44:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:44:08 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13028: Server never started - PASSED kill -0 747 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 747 found at Fri Mar 31 19:44:09 UTC 2017 selfserv_9626 with PID 747 started at Fri Mar 31 19:44:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13029: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 747 at Fri Mar 31 19:44:09 UTC 2017 kill -USR1 747 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 747 killed at Fri Mar 31 19:44:10 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:44:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:44:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:44:15 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13030: Server never started - PASSED kill -0 815 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 815 found at Fri Mar 31 19:44:16 UTC 2017 selfserv_9626 with PID 815 started at Fri Mar 31 19:44:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13031: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 815 at Fri Mar 31 19:44:17 UTC 2017 kill -USR1 815 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 815 killed at Fri Mar 31 19:44:17 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:44:17 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:44:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:44:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13032: Server never started - PASSED kill -0 896 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 896 found at Fri Mar 31 19:44:23 UTC 2017 selfserv_9626 with PID 896 started at Fri Mar 31 19:44:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13033: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 896 at Fri Mar 31 19:44:24 UTC 2017 kill -USR1 896 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 896 killed at Fri Mar 31 19:44:24 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:44:24 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:44:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:44:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13034: Server never started - PASSED kill -0 967 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 967 found at Fri Mar 31 19:44:30 UTC 2017 selfserv_9626 with PID 967 started at Fri Mar 31 19:44:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13035: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 967 at Fri Mar 31 19:44:31 UTC 2017 kill -USR1 967 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 967 killed at Fri Mar 31 19:44:31 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:44:31 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:44:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:44:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13036: Server never started - PASSED kill -0 1051 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1051 found at Fri Mar 31 19:44:37 UTC 2017 selfserv_9626 with PID 1051 started at Fri Mar 31 19:44:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13037: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 1051 at Fri Mar 31 19:44:38 UTC 2017 kill -USR1 1051 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1051 killed at Fri Mar 31 19:44:38 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:44:39 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:44:39 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:44:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13038: Server never started - PASSED kill -0 1133 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1133 found at Fri Mar 31 19:44:45 UTC 2017 selfserv_9626 with PID 1133 started at Fri Mar 31 19:44:45 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13039: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 1133 at Fri Mar 31 19:44:45 UTC 2017 kill -USR1 1133 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1133 killed at Fri Mar 31 19:44:46 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:44:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:44:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:44:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13040: Server never started - PASSED kill -0 1205 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1205 found at Fri Mar 31 19:44:52 UTC 2017 selfserv_9626 with PID 1205 started at Fri Mar 31 19:44:52 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13041: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 1205 at Fri Mar 31 19:44:52 UTC 2017 kill -USR1 1205 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1205 killed at Fri Mar 31 19:44:53 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:44:53 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:44:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:44:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13042: Server never started - PASSED kill -0 1273 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1273 found at Fri Mar 31 19:44:59 UTC 2017 selfserv_9626 with PID 1273 started at Fri Mar 31 19:44:59 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13043: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 1273 at Fri Mar 31 19:44:59 UTC 2017 kill -USR1 1273 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1273 killed at Fri Mar 31 19:45:00 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:45:00 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:45:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:45:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13044: Server never started - PASSED kill -0 1354 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1354 found at Fri Mar 31 19:45:06 UTC 2017 selfserv_9626 with PID 1354 started at Fri Mar 31 19:45:06 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13045: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 1354 at Fri Mar 31 19:45:07 UTC 2017 kill -USR1 1354 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1354 killed at Fri Mar 31 19:45:07 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:45:07 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:45:07 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:45:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13046: Server never started - PASSED kill -0 1435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1435 found at Fri Mar 31 19:45:13 UTC 2017 selfserv_9626 with PID 1435 started at Fri Mar 31 19:45:13 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13047: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 1435 at Fri Mar 31 19:45:14 UTC 2017 kill -USR1 1435 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1435 killed at Fri Mar 31 19:45:14 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9626 starting at Fri Mar 31 19:45:14 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:45:14 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:45:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13048: Server never started - PASSED kill -0 1503 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1503 found at Fri Mar 31 19:45:20 UTC 2017 selfserv_9626 with PID 1503 started at Fri Mar 31 19:45:20 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13049: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 1503 at Fri Mar 31 19:45:21 UTC 2017 kill -USR1 1503 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1503 killed at Fri Mar 31 19:45:21 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:45:21 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:45:21 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:45:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13050: Server never started - PASSED kill -0 1587 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1587 found at Fri Mar 31 19:45:27 UTC 2017 selfserv_9626 with PID 1587 started at Fri Mar 31 19:45:27 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13051: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 1587 at Fri Mar 31 19:45:28 UTC 2017 kill -USR1 1587 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1587 killed at Fri Mar 31 19:45:28 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:45:28 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:45:28 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:45:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13052: Server never started - PASSED kill -0 1656 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1656 found at Fri Mar 31 19:45:34 UTC 2017 selfserv_9626 with PID 1656 started at Fri Mar 31 19:45:34 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13053: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED trying to kill selfserv_9626 with PID 1656 at Fri Mar 31 19:45:35 UTC 2017 kill -USR1 1656 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1656 killed at Fri Mar 31 19:45:35 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:45:36 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:45:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:45:41 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13054: Server never started - PASSED kill -0 1724 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1724 found at Fri Mar 31 19:45:42 UTC 2017 selfserv_9626 with PID 1724 started at Fri Mar 31 19:45:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13055: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 1724 at Fri Mar 31 19:45:42 UTC 2017 kill -USR1 1724 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1724 killed at Fri Mar 31 19:45:43 UTC 2017 ssl.sh: Cache CRL SSL Client Tests - with ECC =============================== /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/authin.tl.tmp 0 selfserv_9626 starting at Fri Mar 31 19:45:43 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:45:43 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:45:48 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13056: Server never started - PASSED kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:45:49 UTC 2017 selfserv_9626 with PID 1804 started at Fri Mar 31 19:45:49 UTC 2017 Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:45:49 UTC 2017 ssl.sh: #13057: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:45:50 UTC 2017 ssl.sh: #13058: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:45:51 UTC 2017 ssl.sh: #13059: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:45:51 UTC 2017 ssl.sh: #13060: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:45:52 UTC 2017 ssl.sh: #13061: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:45:52 UTC 2017 ssl.sh: #13062: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:45:53 UTC 2017 ssl.sh: #13063: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:45:54 UTC 2017 ssl.sh: #13064: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:45:54 UTC 2017 ssl.sh: #13065: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:45:55 UTC 2017 ssl.sh: #13066: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:45:56 UTC 2017 ssl.sh: #13067: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:45:57 UTC 2017 ssl.sh: #13068: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:45:57 UTC 2017 ssl.sh: #13069: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:45:58 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13070: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:45:58 UTC 2017 ssl.sh: #13071: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:45:59 UTC 2017 ssl.sh: #13072: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:00 UTC 2017 ssl.sh: #13073: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:00 UTC 2017 ssl.sh: #13074: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:01 UTC 2017 ssl.sh: #13075: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:02 UTC 2017 ssl.sh: #13076: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:02 UTC 2017 ssl.sh: #13077: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:03 UTC 2017 ssl.sh: #13078: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:04 UTC 2017 ssl.sh: #13079: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:04 UTC 2017 ssl.sh: #13080: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:05 UTC 2017 ssl.sh: #13081: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:06 UTC 2017 ssl.sh: #13082: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:06 UTC 2017 ssl.sh: #13083: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:07 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13084: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:08 UTC 2017 ssl.sh: #13085: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:08 UTC 2017 ssl.sh: #13086: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:09 UTC 2017 ssl.sh: #13087: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:09 UTC 2017 ssl.sh: #13088: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:10 UTC 2017 ssl.sh: #13089: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:11 UTC 2017 ssl.sh: #13090: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:11 UTC 2017 ssl.sh: #13091: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:12 UTC 2017 ssl.sh: #13092: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:13 UTC 2017 ssl.sh: #13093: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:13 UTC 2017 ssl.sh: #13094: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:14 UTC 2017 ssl.sh: #13095: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:15 UTC 2017 ssl.sh: #13096: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 1804 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 1804 found at Fri Mar 31 19:46:16 UTC 2017 ssl.sh: #13097: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 1804 at Fri Mar 31 19:46:16 UTC 2017 kill -USR1 1804 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 1804 killed at Fri Mar 31 19:46:16 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:46:16 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:46:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:46:22 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13098: Server never started - PASSED kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:22 UTC 2017 selfserv_9626 with PID 3265 started at Fri Mar 31 19:46:22 UTC 2017 Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:23 UTC 2017 ssl.sh: #13099: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:23 UTC 2017 ssl.sh: #13100: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:24 UTC 2017 ssl.sh: #13101: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:25 UTC 2017 ssl.sh: #13102: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:25 UTC 2017 ssl.sh: #13103: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:26 UTC 2017 ssl.sh: #13104: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:27 UTC 2017 ssl.sh: #13105: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:27 UTC 2017 ssl.sh: #13106: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:28 UTC 2017 ssl.sh: #13107: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:29 UTC 2017 ssl.sh: #13108: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:29 UTC 2017 ssl.sh: #13109: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:30 UTC 2017 ssl.sh: #13110: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:31 UTC 2017 ssl.sh: #13111: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:31 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13112: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:32 UTC 2017 ssl.sh: #13113: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:32 UTC 2017 ssl.sh: #13114: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:33 UTC 2017 ssl.sh: #13115: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:34 UTC 2017 ssl.sh: #13116: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:34 UTC 2017 ssl.sh: #13117: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:35 UTC 2017 ssl.sh: #13118: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:36 UTC 2017 ssl.sh: #13119: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:36 UTC 2017 ssl.sh: #13120: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:37 UTC 2017 ssl.sh: #13121: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:38 UTC 2017 ssl.sh: #13122: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:38 UTC 2017 ssl.sh: #13123: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:39 UTC 2017 ssl.sh: #13124: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:40 UTC 2017 ssl.sh: #13125: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:40 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13126: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:41 UTC 2017 ssl.sh: #13127: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:42 UTC 2017 ssl.sh: #13128: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:42 UTC 2017 ssl.sh: #13129: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:43 UTC 2017 ssl.sh: #13130: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:43 UTC 2017 ssl.sh: #13131: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:44 UTC 2017 ssl.sh: #13132: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:45 UTC 2017 ssl.sh: #13133: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:45 UTC 2017 ssl.sh: #13134: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:46 UTC 2017 ssl.sh: #13135: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:47 UTC 2017 ssl.sh: #13136: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:47 UTC 2017 ssl.sh: #13137: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:48 UTC 2017 ssl.sh: #13138: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 3265 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 3265 found at Fri Mar 31 19:46:49 UTC 2017 ssl.sh: #13139: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 3265 at Fri Mar 31 19:46:49 UTC 2017 kill -USR1 3265 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 3265 killed at Fri Mar 31 19:46:49 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:46:50 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:46:50 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:46:55 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13140: Server never started - PASSED kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:46:55 UTC 2017 selfserv_9626 with PID 4755 started at Fri Mar 31 19:46:56 UTC 2017 Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:46:56 UTC 2017 ssl.sh: #13141: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:46:57 UTC 2017 ssl.sh: #13142: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:46:57 UTC 2017 ssl.sh: #13143: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:46:58 UTC 2017 ssl.sh: #13144: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:46:59 UTC 2017 ssl.sh: #13145: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:46:59 UTC 2017 ssl.sh: #13146: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:00 UTC 2017 ssl.sh: #13147: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:01 UTC 2017 ssl.sh: #13148: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:01 UTC 2017 ssl.sh: #13149: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:02 UTC 2017 ssl.sh: #13150: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:03 UTC 2017 ssl.sh: #13151: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:03 UTC 2017 ssl.sh: #13152: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:04 UTC 2017 ssl.sh: #13153: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:05 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13154: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:05 UTC 2017 ssl.sh: #13155: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:06 UTC 2017 ssl.sh: #13156: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:07 UTC 2017 ssl.sh: #13157: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:07 UTC 2017 ssl.sh: #13158: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:08 UTC 2017 ssl.sh: #13159: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:09 UTC 2017 ssl.sh: #13160: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:09 UTC 2017 ssl.sh: #13161: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:10 UTC 2017 ssl.sh: #13162: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:10 UTC 2017 ssl.sh: #13163: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:11 UTC 2017 ssl.sh: #13164: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:12 UTC 2017 ssl.sh: #13165: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:13 UTC 2017 ssl.sh: #13166: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:13 UTC 2017 ssl.sh: #13167: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:14 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13168: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:14 UTC 2017 ssl.sh: #13169: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:15 UTC 2017 ssl.sh: #13170: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:16 UTC 2017 ssl.sh: #13171: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:16 UTC 2017 ssl.sh: #13172: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:17 UTC 2017 ssl.sh: #13173: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:18 UTC 2017 ssl.sh: #13174: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:18 UTC 2017 ssl.sh: #13175: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:19 UTC 2017 ssl.sh: #13176: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:20 UTC 2017 ssl.sh: #13177: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:20 UTC 2017 ssl.sh: #13178: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:21 UTC 2017 ssl.sh: #13179: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:22 UTC 2017 ssl.sh: #13180: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 4755 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 4755 found at Fri Mar 31 19:47:22 UTC 2017 ssl.sh: #13181: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 4755 at Fri Mar 31 19:47:23 UTC 2017 kill -USR1 4755 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 4755 killed at Fri Mar 31 19:47:23 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:47:23 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:47:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:47:29 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13182: Server never started - PASSED kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:29 UTC 2017 selfserv_9626 with PID 6208 started at Fri Mar 31 19:47:29 UTC 2017 Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:30 UTC 2017 ssl.sh: #13183: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:30 UTC 2017 ssl.sh: #13184: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:31 UTC 2017 ssl.sh: #13185: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:32 UTC 2017 ssl.sh: #13186: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:32 UTC 2017 ssl.sh: #13187: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:33 UTC 2017 ssl.sh: #13188: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:33 UTC 2017 ssl.sh: #13189: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:34 UTC 2017 ssl.sh: #13190: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:35 UTC 2017 ssl.sh: #13191: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:35 UTC 2017 ssl.sh: #13192: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:36 UTC 2017 ssl.sh: #13193: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:37 UTC 2017 ssl.sh: #13194: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:38 UTC 2017 ssl.sh: #13195: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:38 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13196: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:39 UTC 2017 ssl.sh: #13197: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:39 UTC 2017 ssl.sh: #13198: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:40 UTC 2017 ssl.sh: #13199: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:41 UTC 2017 ssl.sh: #13200: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:41 UTC 2017 ssl.sh: #13201: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:42 UTC 2017 ssl.sh: #13202: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:43 UTC 2017 ssl.sh: #13203: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:43 UTC 2017 ssl.sh: #13204: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:44 UTC 2017 ssl.sh: #13205: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:45 UTC 2017 ssl.sh: #13206: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:45 UTC 2017 ssl.sh: #13207: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:46 UTC 2017 ssl.sh: #13208: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:47 UTC 2017 ssl.sh: #13209: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:47 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13210: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:48 UTC 2017 ssl.sh: #13211: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:48 UTC 2017 ssl.sh: #13212: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:49 UTC 2017 ssl.sh: #13213: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:50 UTC 2017 ssl.sh: #13214: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:50 UTC 2017 ssl.sh: #13215: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:51 UTC 2017 ssl.sh: #13216: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:52 UTC 2017 ssl.sh: #13217: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:52 UTC 2017 ssl.sh: #13218: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:53 UTC 2017 ssl.sh: #13219: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:54 UTC 2017 ssl.sh: #13220: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:54 UTC 2017 ssl.sh: #13221: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 254 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:55 UTC 2017 ssl.sh: #13222: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 6208 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 6208 found at Fri Mar 31 19:47:56 UTC 2017 ssl.sh: #13223: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 254 - FAILED trying to kill selfserv_9626 with PID 6208 at Fri Mar 31 19:47:56 UTC 2017 kill -USR1 6208 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 6208 killed at Fri Mar 31 19:47:56 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:47:56 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:47:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:48:02 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13224: Server never started - PASSED kill -0 7643 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7643 found at Fri Mar 31 19:48:02 UTC 2017 selfserv_9626 with PID 7643 started at Fri Mar 31 19:48:02 UTC 2017 trying to kill selfserv_9626 with PID 7643 at Fri Mar 31 19:48:03 UTC 2017 kill -USR1 7643 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7643 killed at Fri Mar 31 19:48:03 UTC 2017 selfserv_9626 starting at Fri Mar 31 19:48:03 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:48:03 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:48:09 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13225: Server never started - PASSED kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:09 UTC 2017 selfserv_9626 with PID 7711 started at Fri Mar 31 19:48:09 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:10 UTC 2017 ssl.sh: #13226: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:10 UTC 2017 ssl.sh: #13227: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:11 UTC 2017 ssl.sh: #13228: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:12 UTC 2017 ssl.sh: #13229: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:12 UTC 2017 ssl.sh: #13230: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:13 UTC 2017 ssl.sh: #13231: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:13 UTC 2017 ssl.sh: #13232: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:14 UTC 2017 ssl.sh: #13233: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:15 UTC 2017 ssl.sh: #13234: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:15 UTC 2017 ssl.sh: #13235: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:16 UTC 2017 ssl.sh: #13236: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:17 UTC 2017 ssl.sh: #13237: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:18 UTC 2017 ssl.sh: #13238: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:18 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13239: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:19 UTC 2017 ssl.sh: #13240: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:19 UTC 2017 ssl.sh: #13241: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:20 UTC 2017 ssl.sh: #13242: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:21 UTC 2017 ssl.sh: #13243: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:21 UTC 2017 ssl.sh: #13244: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:22 UTC 2017 ssl.sh: #13245: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:23 UTC 2017 ssl.sh: #13246: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:23 UTC 2017 ssl.sh: #13247: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:24 UTC 2017 ssl.sh: #13248: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:25 UTC 2017 ssl.sh: #13249: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:25 UTC 2017 ssl.sh: #13250: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:26 UTC 2017 ssl.sh: #13251: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:27 UTC 2017 ssl.sh: #13252: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:27 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13253: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:28 UTC 2017 ssl.sh: #13254: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:29 UTC 2017 ssl.sh: #13255: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:29 UTC 2017 ssl.sh: #13256: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:30 UTC 2017 ssl.sh: #13257: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:30 UTC 2017 ssl.sh: #13258: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:31 UTC 2017 ssl.sh: #13259: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:32 UTC 2017 ssl.sh: #13260: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:32 UTC 2017 ssl.sh: #13261: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:33 UTC 2017 ssl.sh: #13262: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:34 UTC 2017 ssl.sh: #13263: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:34 UTC 2017 ssl.sh: #13264: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:35 UTC 2017 ssl.sh: #13265: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 7711 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 7711 found at Fri Mar 31 19:48:36 UTC 2017 ssl.sh: #13266: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 7711 at Fri Mar 31 19:48:36 UTC 2017 kill -USR1 7711 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 7711 killed at Fri Mar 31 19:48:36 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:48:37 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:48:37 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:48:42 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13267: Server never started - PASSED kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:42 UTC 2017 selfserv_9626 with PID 9150 started at Fri Mar 31 19:48:43 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:43 UTC 2017 ssl.sh: #13268: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:44 UTC 2017 ssl.sh: #13269: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:44 UTC 2017 ssl.sh: #13270: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:45 UTC 2017 ssl.sh: #13271: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:46 UTC 2017 ssl.sh: #13272: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:46 UTC 2017 ssl.sh: #13273: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:47 UTC 2017 ssl.sh: #13274: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:48 UTC 2017 ssl.sh: #13275: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:48 UTC 2017 ssl.sh: #13276: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:49 UTC 2017 ssl.sh: #13277: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:50 UTC 2017 ssl.sh: #13278: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:50 UTC 2017 ssl.sh: #13279: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:51 UTC 2017 ssl.sh: #13280: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:52 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13281: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:52 UTC 2017 ssl.sh: #13282: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:53 UTC 2017 ssl.sh: #13283: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:53 UTC 2017 ssl.sh: #13284: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:54 UTC 2017 ssl.sh: #13285: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:55 UTC 2017 ssl.sh: #13286: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:55 UTC 2017 ssl.sh: #13287: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:56 UTC 2017 ssl.sh: #13288: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:57 UTC 2017 ssl.sh: #13289: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:57 UTC 2017 ssl.sh: #13290: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:58 UTC 2017 ssl.sh: #13291: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:59 UTC 2017 ssl.sh: #13292: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:48:59 UTC 2017 ssl.sh: #13293: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:49:00 UTC 2017 ssl.sh: #13294: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:49:01 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13295: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:49:01 UTC 2017 ssl.sh: #13296: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:49:02 UTC 2017 ssl.sh: #13297: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:49:03 UTC 2017 ssl.sh: #13298: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:49:03 UTC 2017 ssl.sh: #13299: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:49:04 UTC 2017 ssl.sh: #13300: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:49:05 UTC 2017 ssl.sh: #13301: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:49:05 UTC 2017 ssl.sh: #13302: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:49:06 UTC 2017 ssl.sh: #13303: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:49:07 UTC 2017 ssl.sh: #13304: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:49:07 UTC 2017 ssl.sh: #13305: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:49:08 UTC 2017 ssl.sh: #13306: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:49:09 UTC 2017 ssl.sh: #13307: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 9150 found at Fri Mar 31 19:49:09 UTC 2017 ssl.sh: #13308: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 9150 at Fri Mar 31 19:49:10 UTC 2017 kill -USR1 9150 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 9150 killed at Fri Mar 31 19:49:10 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:49:10 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:49:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:49:16 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13309: Server never started - PASSED kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:16 UTC 2017 selfserv_9626 with PID 10602 started at Fri Mar 31 19:49:16 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:17 UTC 2017 ssl.sh: #13310: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:17 UTC 2017 ssl.sh: #13311: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:18 UTC 2017 ssl.sh: #13312: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:19 UTC 2017 ssl.sh: #13313: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:19 UTC 2017 ssl.sh: #13314: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:20 UTC 2017 ssl.sh: #13315: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:21 UTC 2017 ssl.sh: #13316: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:21 UTC 2017 ssl.sh: #13317: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:22 UTC 2017 ssl.sh: #13318: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:23 UTC 2017 ssl.sh: #13319: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:23 UTC 2017 ssl.sh: #13320: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:24 UTC 2017 ssl.sh: #13321: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:25 UTC 2017 ssl.sh: #13322: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:25 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13323: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:26 UTC 2017 ssl.sh: #13324: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:26 UTC 2017 ssl.sh: #13325: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:27 UTC 2017 ssl.sh: #13326: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:28 UTC 2017 ssl.sh: #13327: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:28 UTC 2017 ssl.sh: #13328: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:29 UTC 2017 ssl.sh: #13329: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:30 UTC 2017 ssl.sh: #13330: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:30 UTC 2017 ssl.sh: #13331: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:31 UTC 2017 ssl.sh: #13332: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:32 UTC 2017 ssl.sh: #13333: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:32 UTC 2017 ssl.sh: #13334: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:33 UTC 2017 ssl.sh: #13335: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:34 UTC 2017 ssl.sh: #13336: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:34 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13337: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:35 UTC 2017 ssl.sh: #13338: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:36 UTC 2017 ssl.sh: #13339: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:36 UTC 2017 ssl.sh: #13340: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:37 UTC 2017 ssl.sh: #13341: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:38 UTC 2017 ssl.sh: #13342: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:38 UTC 2017 ssl.sh: #13343: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:39 UTC 2017 ssl.sh: #13344: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:40 UTC 2017 ssl.sh: #13345: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:40 UTC 2017 ssl.sh: #13346: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:41 UTC 2017 ssl.sh: #13347: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:42 UTC 2017 ssl.sh: #13348: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:42 UTC 2017 ssl.sh: #13349: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 10602 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 10602 found at Fri Mar 31 19:49:43 UTC 2017 ssl.sh: #13350: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 10602 at Fri Mar 31 19:49:43 UTC 2017 kill -USR1 10602 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 10602 killed at Fri Mar 31 19:49:44 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:49:44 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:49:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:49:49 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13351: Server never started - PASSED kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:49:50 UTC 2017 selfserv_9626 with PID 12040 started at Fri Mar 31 19:49:50 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:49:50 UTC 2017 ssl.sh: #13352: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:49:51 UTC 2017 ssl.sh: #13353: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:49:51 UTC 2017 ssl.sh: #13354: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:49:52 UTC 2017 ssl.sh: #13355: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:49:53 UTC 2017 ssl.sh: #13356: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:49:53 UTC 2017 ssl.sh: #13357: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:49:54 UTC 2017 ssl.sh: #13358: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:49:55 UTC 2017 ssl.sh: #13359: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:49:55 UTC 2017 ssl.sh: #13360: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:49:56 UTC 2017 ssl.sh: #13361: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:49:57 UTC 2017 ssl.sh: #13362: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:49:57 UTC 2017 ssl.sh: #13363: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:49:58 UTC 2017 ssl.sh: #13364: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:49:59 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13365: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:49:59 UTC 2017 ssl.sh: #13366: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:00 UTC 2017 ssl.sh: #13367: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:01 UTC 2017 ssl.sh: #13368: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:01 UTC 2017 ssl.sh: #13369: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:02 UTC 2017 ssl.sh: #13370: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:03 UTC 2017 ssl.sh: #13371: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:03 UTC 2017 ssl.sh: #13372: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:04 UTC 2017 ssl.sh: #13373: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:05 UTC 2017 ssl.sh: #13374: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:05 UTC 2017 ssl.sh: #13375: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:06 UTC 2017 ssl.sh: #13376: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:07 UTC 2017 ssl.sh: #13377: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:07 UTC 2017 ssl.sh: #13378: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:08 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13379: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:09 UTC 2017 ssl.sh: #13380: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:09 UTC 2017 ssl.sh: #13381: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:10 UTC 2017 ssl.sh: #13382: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:10 UTC 2017 ssl.sh: #13383: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:11 UTC 2017 ssl.sh: #13384: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:12 UTC 2017 ssl.sh: #13385: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:12 UTC 2017 ssl.sh: #13386: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:13 UTC 2017 ssl.sh: #13387: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:14 UTC 2017 ssl.sh: #13388: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:14 UTC 2017 ssl.sh: #13389: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:15 UTC 2017 ssl.sh: #13390: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:16 UTC 2017 ssl.sh: #13391: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 12040 found at Fri Mar 31 19:50:17 UTC 2017 ssl.sh: #13392: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 12040 at Fri Mar 31 19:50:17 UTC 2017 kill -USR1 12040 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 12040 killed at Fri Mar 31 19:50:17 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:50:17 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:50:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:50:23 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13393: Server never started - PASSED kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:23 UTC 2017 selfserv_9626 with PID 13489 started at Fri Mar 31 19:50:23 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:24 UTC 2017 ssl.sh: #13394: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:24 UTC 2017 ssl.sh: #13395: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:25 UTC 2017 ssl.sh: #13396: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:26 UTC 2017 ssl.sh: #13397: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:26 UTC 2017 ssl.sh: #13398: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:27 UTC 2017 ssl.sh: #13399: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:28 UTC 2017 ssl.sh: #13400: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:28 UTC 2017 ssl.sh: #13401: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:29 UTC 2017 ssl.sh: #13402: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:30 UTC 2017 ssl.sh: #13403: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:30 UTC 2017 ssl.sh: #13404: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:31 UTC 2017 ssl.sh: #13405: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:32 UTC 2017 ssl.sh: #13406: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:32 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13407: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:33 UTC 2017 ssl.sh: #13408: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:34 UTC 2017 ssl.sh: #13409: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:34 UTC 2017 ssl.sh: #13410: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:35 UTC 2017 ssl.sh: #13411: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:35 UTC 2017 ssl.sh: #13412: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:36 UTC 2017 ssl.sh: #13413: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:37 UTC 2017 ssl.sh: #13414: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:37 UTC 2017 ssl.sh: #13415: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:38 UTC 2017 ssl.sh: #13416: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:39 UTC 2017 ssl.sh: #13417: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:40 UTC 2017 ssl.sh: #13418: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:40 UTC 2017 ssl.sh: #13419: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:41 UTC 2017 ssl.sh: #13420: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:41 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13421: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:42 UTC 2017 ssl.sh: #13422: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:43 UTC 2017 ssl.sh: #13423: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:43 UTC 2017 ssl.sh: #13424: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:44 UTC 2017 ssl.sh: #13425: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:45 UTC 2017 ssl.sh: #13426: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:45 UTC 2017 ssl.sh: #13427: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:46 UTC 2017 ssl.sh: #13428: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:47 UTC 2017 ssl.sh: #13429: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:47 UTC 2017 ssl.sh: #13430: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:48 UTC 2017 ssl.sh: #13431: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:49 UTC 2017 ssl.sh: #13432: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:49 UTC 2017 ssl.sh: #13433: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 13489 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 13489 found at Fri Mar 31 19:50:50 UTC 2017 ssl.sh: #13434: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 13489 at Fri Mar 31 19:50:50 UTC 2017 kill -USR1 13489 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 13489 killed at Fri Mar 31 19:50:51 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:50:51 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:50:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:50:56 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13435: Server never started - PASSED kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:50:57 UTC 2017 selfserv_9626 with PID 14928 started at Fri Mar 31 19:50:57 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:50:57 UTC 2017 ssl.sh: #13436: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:50:58 UTC 2017 ssl.sh: #13437: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:50:59 UTC 2017 ssl.sh: #13438: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:50:59 UTC 2017 ssl.sh: #13439: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:00 UTC 2017 ssl.sh: #13440: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:01 UTC 2017 ssl.sh: #13441: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:01 UTC 2017 ssl.sh: #13442: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:02 UTC 2017 ssl.sh: #13443: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:03 UTC 2017 ssl.sh: #13444: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:03 UTC 2017 ssl.sh: #13445: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:04 UTC 2017 ssl.sh: #13446: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:05 UTC 2017 ssl.sh: #13447: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:05 UTC 2017 ssl.sh: #13448: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:06 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13449: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:07 UTC 2017 ssl.sh: #13450: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:07 UTC 2017 ssl.sh: #13451: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:08 UTC 2017 ssl.sh: #13452: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:08 UTC 2017 ssl.sh: #13453: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:09 UTC 2017 ssl.sh: #13454: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:10 UTC 2017 ssl.sh: #13455: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:10 UTC 2017 ssl.sh: #13456: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:11 UTC 2017 ssl.sh: #13457: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:12 UTC 2017 ssl.sh: #13458: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:12 UTC 2017 ssl.sh: #13459: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:13 UTC 2017 ssl.sh: #13460: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:14 UTC 2017 ssl.sh: #13461: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:15 UTC 2017 ssl.sh: #13462: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:15 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13463: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:16 UTC 2017 ssl.sh: #13464: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:16 UTC 2017 ssl.sh: #13465: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:17 UTC 2017 ssl.sh: #13466: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:18 UTC 2017 ssl.sh: #13467: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:18 UTC 2017 ssl.sh: #13468: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:19 UTC 2017 ssl.sh: #13469: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:20 UTC 2017 ssl.sh: #13470: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:20 UTC 2017 ssl.sh: #13471: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:21 UTC 2017 ssl.sh: #13472: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:22 UTC 2017 ssl.sh: #13473: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:22 UTC 2017 ssl.sh: #13474: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:23 UTC 2017 ssl.sh: #13475: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 14928 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 14928 found at Fri Mar 31 19:51:24 UTC 2017 ssl.sh: #13476: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 14928 at Fri Mar 31 19:51:24 UTC 2017 kill -USR1 14928 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 14928 killed at Fri Mar 31 19:51:24 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:51:24 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:51:24 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:51:30 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13477: Server never started - PASSED kill -0 16380 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16380 found at Fri Mar 31 19:51:30 UTC 2017 selfserv_9626 with PID 16380 started at Fri Mar 31 19:51:30 UTC 2017 trying to kill selfserv_9626 with PID 16380 at Fri Mar 31 19:51:30 UTC 2017 kill -USR1 16380 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16380 killed at Fri Mar 31 19:51:31 UTC 2017 selfserv_9626 starting at Fri Mar 31 19:51:31 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:51:31 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:51:36 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13478: Server never started - PASSED kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:37 UTC 2017 selfserv_9626 with PID 16435 started at Fri Mar 31 19:51:37 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:38 UTC 2017 ssl.sh: #13479: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:38 UTC 2017 ssl.sh: #13480: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:39 UTC 2017 ssl.sh: #13481: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:39 UTC 2017 ssl.sh: #13482: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:40 UTC 2017 ssl.sh: #13483: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:41 UTC 2017 ssl.sh: #13484: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:41 UTC 2017 ssl.sh: #13485: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:42 UTC 2017 ssl.sh: #13486: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:43 UTC 2017 ssl.sh: #13487: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:43 UTC 2017 ssl.sh: #13488: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:44 UTC 2017 ssl.sh: #13489: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:45 UTC 2017 ssl.sh: #13490: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:46 UTC 2017 ssl.sh: #13491: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:46 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13492: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:47 UTC 2017 ssl.sh: #13493: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:47 UTC 2017 ssl.sh: #13494: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:48 UTC 2017 ssl.sh: #13495: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:49 UTC 2017 ssl.sh: #13496: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:49 UTC 2017 ssl.sh: #13497: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:50 UTC 2017 ssl.sh: #13498: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:51 UTC 2017 ssl.sh: #13499: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:51 UTC 2017 ssl.sh: #13500: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:52 UTC 2017 ssl.sh: #13501: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:53 UTC 2017 ssl.sh: #13502: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:53 UTC 2017 ssl.sh: #13503: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:54 UTC 2017 ssl.sh: #13504: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:55 UTC 2017 ssl.sh: #13505: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:55 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13506: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:56 UTC 2017 ssl.sh: #13507: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:57 UTC 2017 ssl.sh: #13508: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:57 UTC 2017 ssl.sh: #13509: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:58 UTC 2017 ssl.sh: #13510: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:59 UTC 2017 ssl.sh: #13511: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:51:59 UTC 2017 ssl.sh: #13512: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:52:00 UTC 2017 ssl.sh: #13513: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:52:01 UTC 2017 ssl.sh: #13514: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:52:01 UTC 2017 ssl.sh: #13515: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:52:02 UTC 2017 ssl.sh: #13516: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:52:03 UTC 2017 ssl.sh: #13517: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:52:03 UTC 2017 ssl.sh: #13518: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 16435 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 16435 found at Fri Mar 31 19:52:04 UTC 2017 ssl.sh: #13519: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 16435 at Fri Mar 31 19:52:04 UTC 2017 kill -USR1 16435 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 16435 killed at Fri Mar 31 19:52:05 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:52:05 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:52:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:52:10 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13520: Server never started - PASSED kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:11 UTC 2017 selfserv_9626 with PID 17887 started at Fri Mar 31 19:52:11 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:11 UTC 2017 ssl.sh: #13521: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:12 UTC 2017 ssl.sh: #13522: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:13 UTC 2017 ssl.sh: #13523: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:13 UTC 2017 ssl.sh: #13524: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:14 UTC 2017 ssl.sh: #13525: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:15 UTC 2017 ssl.sh: #13526: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:15 UTC 2017 ssl.sh: #13527: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:16 UTC 2017 ssl.sh: #13528: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:16 UTC 2017 ssl.sh: #13529: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:17 UTC 2017 ssl.sh: #13530: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:18 UTC 2017 ssl.sh: #13531: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:19 UTC 2017 ssl.sh: #13532: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:19 UTC 2017 ssl.sh: #13533: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:20 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13534: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:20 UTC 2017 ssl.sh: #13535: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:21 UTC 2017 ssl.sh: #13536: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:22 UTC 2017 ssl.sh: #13537: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:22 UTC 2017 ssl.sh: #13538: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:23 UTC 2017 ssl.sh: #13539: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:24 UTC 2017 ssl.sh: #13540: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:24 UTC 2017 ssl.sh: #13541: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:25 UTC 2017 ssl.sh: #13542: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:26 UTC 2017 ssl.sh: #13543: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:26 UTC 2017 ssl.sh: #13544: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:27 UTC 2017 ssl.sh: #13545: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:28 UTC 2017 ssl.sh: #13546: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:28 UTC 2017 ssl.sh: #13547: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:29 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13548: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:30 UTC 2017 ssl.sh: #13549: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:30 UTC 2017 ssl.sh: #13550: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:31 UTC 2017 ssl.sh: #13551: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:32 UTC 2017 ssl.sh: #13552: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:32 UTC 2017 ssl.sh: #13553: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:33 UTC 2017 ssl.sh: #13554: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:34 UTC 2017 ssl.sh: #13555: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:34 UTC 2017 ssl.sh: #13556: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:35 UTC 2017 ssl.sh: #13557: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:36 UTC 2017 ssl.sh: #13558: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:36 UTC 2017 ssl.sh: #13559: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:37 UTC 2017 ssl.sh: #13560: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 17887 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 17887 found at Fri Mar 31 19:52:38 UTC 2017 ssl.sh: #13561: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 17887 at Fri Mar 31 19:52:38 UTC 2017 kill -USR1 17887 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 17887 killed at Fri Mar 31 19:52:38 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:52:38 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:52:38 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:52:44 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13562: Server never started - PASSED kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:44 UTC 2017 selfserv_9626 with PID 19327 started at Fri Mar 31 19:52:44 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:45 UTC 2017 ssl.sh: #13563: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:46 UTC 2017 ssl.sh: #13564: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:46 UTC 2017 ssl.sh: #13565: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:47 UTC 2017 ssl.sh: #13566: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:47 UTC 2017 ssl.sh: #13567: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:48 UTC 2017 ssl.sh: #13568: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:49 UTC 2017 ssl.sh: #13569: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:49 UTC 2017 ssl.sh: #13570: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:50 UTC 2017 ssl.sh: #13571: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:51 UTC 2017 ssl.sh: #13572: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:51 UTC 2017 ssl.sh: #13573: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:52 UTC 2017 ssl.sh: #13574: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:53 UTC 2017 ssl.sh: #13575: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:53 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13576: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:54 UTC 2017 ssl.sh: #13577: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:55 UTC 2017 ssl.sh: #13578: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:55 UTC 2017 ssl.sh: #13579: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:56 UTC 2017 ssl.sh: #13580: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:57 UTC 2017 ssl.sh: #13581: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:57 UTC 2017 ssl.sh: #13582: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:58 UTC 2017 ssl.sh: #13583: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:59 UTC 2017 ssl.sh: #13584: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:52:59 UTC 2017 ssl.sh: #13585: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:53:00 UTC 2017 ssl.sh: #13586: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:53:01 UTC 2017 ssl.sh: #13587: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:53:01 UTC 2017 ssl.sh: #13588: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:53:02 UTC 2017 ssl.sh: #13589: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:53:03 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13590: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:53:03 UTC 2017 ssl.sh: #13591: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:53:04 UTC 2017 ssl.sh: #13592: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:53:05 UTC 2017 ssl.sh: #13593: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:53:05 UTC 2017 ssl.sh: #13594: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:53:06 UTC 2017 ssl.sh: #13595: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:53:07 UTC 2017 ssl.sh: #13596: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:53:07 UTC 2017 ssl.sh: #13597: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:53:08 UTC 2017 ssl.sh: #13598: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:53:09 UTC 2017 ssl.sh: #13599: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:53:09 UTC 2017 ssl.sh: #13600: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:53:10 UTC 2017 ssl.sh: #13601: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:53:11 UTC 2017 ssl.sh: #13602: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 19327 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 19327 found at Fri Mar 31 19:53:11 UTC 2017 ssl.sh: #13603: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 19327 at Fri Mar 31 19:53:11 UTC 2017 kill -USR1 19327 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 19327 killed at Fri Mar 31 19:53:12 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:53:12 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:53:12 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:53:17 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13604: Server never started - PASSED kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:18 UTC 2017 selfserv_9626 with PID 20776 started at Fri Mar 31 19:53:18 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:19 UTC 2017 ssl.sh: #13605: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:19 UTC 2017 ssl.sh: #13606: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:20 UTC 2017 ssl.sh: #13607: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:20 UTC 2017 ssl.sh: #13608: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:21 UTC 2017 ssl.sh: #13609: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:22 UTC 2017 ssl.sh: #13610: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:22 UTC 2017 ssl.sh: #13611: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:23 UTC 2017 ssl.sh: #13612: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:24 UTC 2017 ssl.sh: #13613: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:24 UTC 2017 ssl.sh: #13614: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:25 UTC 2017 ssl.sh: #13615: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:26 UTC 2017 ssl.sh: #13616: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:27 UTC 2017 ssl.sh: #13617: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:27 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13618: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:28 UTC 2017 ssl.sh: #13619: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:28 UTC 2017 ssl.sh: #13620: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:29 UTC 2017 ssl.sh: #13621: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:30 UTC 2017 ssl.sh: #13622: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:30 UTC 2017 ssl.sh: #13623: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:31 UTC 2017 ssl.sh: #13624: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:32 UTC 2017 ssl.sh: #13625: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:32 UTC 2017 ssl.sh: #13626: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:33 UTC 2017 ssl.sh: #13627: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:34 UTC 2017 ssl.sh: #13628: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:34 UTC 2017 ssl.sh: #13629: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:35 UTC 2017 ssl.sh: #13630: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:36 UTC 2017 ssl.sh: #13631: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:36 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13632: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:37 UTC 2017 ssl.sh: #13633: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:38 UTC 2017 ssl.sh: #13634: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:38 UTC 2017 ssl.sh: #13635: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:39 UTC 2017 ssl.sh: #13636: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:40 UTC 2017 ssl.sh: #13637: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:40 UTC 2017 ssl.sh: #13638: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:41 UTC 2017 ssl.sh: #13639: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:41 UTC 2017 ssl.sh: #13640: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:42 UTC 2017 ssl.sh: #13641: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:43 UTC 2017 ssl.sh: #13642: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:44 UTC 2017 ssl.sh: #13643: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:44 UTC 2017 ssl.sh: #13644: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 20776 found at Fri Mar 31 19:53:45 UTC 2017 ssl.sh: #13645: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 20776 at Fri Mar 31 19:53:45 UTC 2017 kill -USR1 20776 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 20776 killed at Fri Mar 31 19:53:46 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:53:46 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:53:46 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:53:51 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13646: Server never started - PASSED kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:53:52 UTC 2017 selfserv_9626 with PID 22214 started at Fri Mar 31 19:53:52 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:53:52 UTC 2017 ssl.sh: #13647: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:53:53 UTC 2017 ssl.sh: #13648: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:53:53 UTC 2017 ssl.sh: #13649: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:53:54 UTC 2017 ssl.sh: #13650: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:53:55 UTC 2017 ssl.sh: #13651: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:53:55 UTC 2017 ssl.sh: #13652: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:53:56 UTC 2017 ssl.sh: #13653: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:53:57 UTC 2017 ssl.sh: #13654: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:53:57 UTC 2017 ssl.sh: #13655: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:53:58 UTC 2017 ssl.sh: #13656: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:53:59 UTC 2017 ssl.sh: #13657: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:53:59 UTC 2017 ssl.sh: #13658: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:00 UTC 2017 ssl.sh: #13659: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:01 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13660: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:01 UTC 2017 ssl.sh: #13661: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:02 UTC 2017 ssl.sh: #13662: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:03 UTC 2017 ssl.sh: #13663: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:03 UTC 2017 ssl.sh: #13664: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:04 UTC 2017 ssl.sh: #13665: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:05 UTC 2017 ssl.sh: #13666: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:05 UTC 2017 ssl.sh: #13667: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:06 UTC 2017 ssl.sh: #13668: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:07 UTC 2017 ssl.sh: #13669: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:07 UTC 2017 ssl.sh: #13670: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:08 UTC 2017 ssl.sh: #13671: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:09 UTC 2017 ssl.sh: #13672: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:09 UTC 2017 ssl.sh: #13673: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:10 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13674: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:11 UTC 2017 ssl.sh: #13675: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:11 UTC 2017 ssl.sh: #13676: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:12 UTC 2017 ssl.sh: #13677: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:13 UTC 2017 ssl.sh: #13678: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:13 UTC 2017 ssl.sh: #13679: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:14 UTC 2017 ssl.sh: #13680: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:15 UTC 2017 ssl.sh: #13681: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:15 UTC 2017 ssl.sh: #13682: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:16 UTC 2017 ssl.sh: #13683: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:17 UTC 2017 ssl.sh: #13684: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:17 UTC 2017 ssl.sh: #13685: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:18 UTC 2017 ssl.sh: #13686: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 22214 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 22214 found at Fri Mar 31 19:54:19 UTC 2017 ssl.sh: #13687: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 22214 at Fri Mar 31 19:54:19 UTC 2017 kill -USR1 22214 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 22214 killed at Fri Mar 31 19:54:19 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:54:19 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:54:19 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:54:25 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13688: Server never started - PASSED kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:25 UTC 2017 selfserv_9626 with PID 23666 started at Fri Mar 31 19:54:25 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:26 UTC 2017 ssl.sh: #13689: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:27 UTC 2017 ssl.sh: #13690: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:27 UTC 2017 ssl.sh: #13691: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:28 UTC 2017 ssl.sh: #13692: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:28 UTC 2017 ssl.sh: #13693: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:29 UTC 2017 ssl.sh: #13694: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:30 UTC 2017 ssl.sh: #13695: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:30 UTC 2017 ssl.sh: #13696: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:31 UTC 2017 ssl.sh: #13697: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:32 UTC 2017 ssl.sh: #13698: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:32 UTC 2017 ssl.sh: #13699: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:33 UTC 2017 ssl.sh: #13700: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:34 UTC 2017 ssl.sh: #13701: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:34 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13702: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:35 UTC 2017 ssl.sh: #13703: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:36 UTC 2017 ssl.sh: #13704: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:36 UTC 2017 ssl.sh: #13705: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:37 UTC 2017 ssl.sh: #13706: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:38 UTC 2017 ssl.sh: #13707: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:38 UTC 2017 ssl.sh: #13708: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:39 UTC 2017 ssl.sh: #13709: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:40 UTC 2017 ssl.sh: #13710: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:40 UTC 2017 ssl.sh: #13711: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:41 UTC 2017 ssl.sh: #13712: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:42 UTC 2017 ssl.sh: #13713: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:42 UTC 2017 ssl.sh: #13714: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:43 UTC 2017 ssl.sh: #13715: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 1, expected is 0 - FAILED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:44 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #13716: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:44 UTC 2017 ssl.sh: #13717: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:45 UTC 2017 ssl.sh: #13718: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:45 UTC 2017 ssl.sh: #13719: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:46 UTC 2017 ssl.sh: #13720: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:47 UTC 2017 ssl.sh: #13721: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:47 UTC 2017 ssl.sh: #13722: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:48 UTC 2017 ssl.sh: #13723: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:49 UTC 2017 ssl.sh: #13724: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:49 UTC 2017 ssl.sh: #13725: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:50 UTC 2017 ssl.sh: #13726: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:51 UTC 2017 ssl.sh: #13727: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:52 UTC 2017 ssl.sh: #13728: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 1, expected is 0 - FAILED Server Args: -r_-r_-r_-r tstclnt -p 9626 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 23666 found at Fri Mar 31 19:54:52 UTC 2017 ssl.sh: #13729: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 23666 at Fri Mar 31 19:54:52 UTC 2017 kill -USR1 23666 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 23666 killed at Fri Mar 31 19:54:53 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9626 starting at Fri Mar 31 19:54:53 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:54:53 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:54:58 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13730: Server never started - PASSED kill -0 25107 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25107 found at Fri Mar 31 19:54:59 UTC 2017 selfserv_9626 with PID 25107 started at Fri Mar 31 19:54:59 UTC 2017 trying to kill selfserv_9626 with PID 25107 at Fri Mar 31 19:54:59 UTC 2017 kill -USR1 25107 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25107 killed at Fri Mar 31 19:54:59 UTC 2017 ssl.sh: SSL POLICY - server /client - with ECC =============================== Saving pkcs11.txt selfserv_9626 starting at Fri Mar 31 19:54:59 UTC 2017 selfserv_9626 -D -p 9626 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2460\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9626 at Fri Mar 31 19:55:00 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed retrying to connect to selfserv_9626 at Fri Mar 31 19:55:05 UTC 2017 tstclnt -p 9626 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13731: Server never started - PASSED kill -0 25163 >/dev/null 2>/dev/null No server to kill selfserv_9626 with PID 25163 found at Fri Mar 31 19:55:05 UTC 2017 selfserv_9626 with PID 25163 started at Fri Mar 31 19:55:05 UTC 2017 ssl.sh: running Allowed by Narrow Policy ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13732: Allowed by Narrow Policy produced a returncode of 1, expected is 0 - FAILED ssl.sh: running Allowed by Strict Policy ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1/ssl,ssl-key-exchange:sha256/cert-signature:rsa/ssl-key-exchange:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13733: Allowed by Strict Policy produced a returncode of 1, expected is 0 - FAILED ssl.sh: running Allow All Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13734: Allow All Explicitly produced a returncode of 1, expected is 0 - FAILED ssl.sh: running Disallow All Explicitly. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all library=/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13735: Disallow All Explicitly. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Explicitly. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256 library=/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13736: Disallow SHA256 Signatures Explicitly. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Implicitly Narrow. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:rsa/ssl-key-exchange:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13737: Disallow SHA256 Signatures Implicitly Narrow. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Implicitly. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha384/all:sha512/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13738: Disallow SHA256 Signatures Implicitly. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=des-ede3-cbc library=/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13739: Disallow Cipher Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Implicitly Narrow. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa:des-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13740: Disallow Cipher Implicitly Narrow. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Implicitly. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-verion-max=tls1.2 library=/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13741: Disallow Cipher Implicitly. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=hmac-sha1 library=/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13742: Disallow HMAC Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Implicitly Narrow. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md5:sha256:rsa:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13743: Disallow HMAC Implicitly Narrow. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Signatures Implicitly. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13744: Disallow HMAC Signatures Implicitly. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Explicitly. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13745: Disallow Key Exchange Explicitly. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Implicitly Narrow. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:dh-dss:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13746: Disallow Key Exchange Implicitly Narrow. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchnage Signatures Implicitly. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13747: Disallow Key Exchnage Signatures Implicitly. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Exlicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13748: Disallow Version Exlicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Implicitly Narrow. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa:des-ede3-cbc:tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13749: Disallow Version Implicitly Narrow. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Implicitly. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9626 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.28.2/nss/tests/ssl/sslreq.dat tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed ssl.sh: #13750: Disallow Version Implicitly. produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9626 with PID 25163 at Fri Mar 31 19:55:19 UTC 2017 kill -USR1 25163 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9626 -b -p 9626 2>/dev/null; selfserv_9626 with PID 25163 killed at Fri Mar 31 19:55:20 UTC 2017 TIMESTAMP ssl END: Fri Mar 31 19:55:20 UTC 2017 Running tests for merge TIMESTAMP merge BEGIN: Fri Mar 31 19:55:20 UTC 2017 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests.v1.2460 -t "Test1" sdr.sh: #13751: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests.v2.2460 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #13752: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests.v3.2460 -t "1234567" sdr.sh: #13753: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests.v1.2460 -t "Test1" sdr.sh: #13754: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests.v2.2460 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #13755: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests.v3.2460 -t "1234567" sdr.sh: #13756: Decrypt - Value 3 - PASSED merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests.v3.2460 -t Test2 -f ../tests.pw merge.sh: #13757: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #13758: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #13759: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #13760: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #13761: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #13762: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:20:23 2017 Not After : Thu Mar 31 19:20:23 2022 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:13:1f:aa:11:8e:43:a6:4a:9b:c8:5a:99:11:dc:4d: 21:eb:1a:38:39:19:7d:99:82:ea:d2:b2:3c:e8:02:5e: 28:7a:85:f3:be:fd:dd:78:84:19:a8:5f:27:39:4a:1a: 03:4c:3c:89:5a:5a:f3:15:1f:e9:5c:00:58:c0:a4:99: 8b:0b:2c:66:c3:a1:00:cc:b0:19:21:1d:af:8f:8d:68: d9:09:69:c2:8e:0e:33:d8:d3:bd:d2:33:44:c3:18:53: b6:4e:c0:33:f4:95:30:2a:ba:09:f7:18:d9:3c:41:53: 9c:a6:39:77:df:6d:45:06:d0:ba:77:cb:b9:f6:c7:86: e8:10:9e:f1:33:a7:84:f8:c1:e9:43:d0:d5:aa:15:38: 53:af:74:f1:03:47:7c:53:81:05:ff:13:08:96:e8:9f: 4a:cf:ab:a0:c3:b6:9d:16:54:0d:a6:7c:d1:2f:09:2b: 67:8c:17:d1:76:ca:56:6b:72:78:63:00:e8:b5:da:80: 4a:0b:96:23:c1:c5:a9:98:9c:d7:fc:a7:ba:4c:5e:ea: 3d:3a:e9:6a:b3:76:d7:bb:f3:24:33:bc:9a:5e:8c:86: 51:d3:c7:bc:c5:c3:5a:b5:66:09:04:d6:45:25:72:ec: 92:12:be:4a:96:9e:62:58:51:7a:d0:4f:e5:4a:a7:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:ed:e1:6f:10:2c:c9:56:c6:4e:fc:3b:b1:53:0c:7a: 6a:6c:ba:25:16:f7:ab:a7:30:19:02:cc:a5:34:42:52: 2f:14:5d:91:19:34:c4:42:68:1e:8d:f6:d7:1a:09:16: 10:80:cc:52:29:4b:81:bb:2a:c5:2b:b9:8d:fe:3f:05: cc:97:4e:1a:50:d4:9a:15:2e:ff:9e:c1:61:12:76:de: 4c:86:15:2d:ae:61:92:ab:71:3c:cd:5c:3c:e5:90:8d: 1f:cb:68:52:42:8f:f3:21:ab:fe:e0:68:f2:64:39:83: 1d:78:99:ae:f7:cf:1b:b6:ac:13:0e:70:97:3b:d2:88: 87:24:e2:f3:1f:0f:29:c6:33:45:85:3f:c2:0d:77:f8: 85:51:b9:5f:56:08:c2:ad:51:c1:9c:dc:2e:17:e1:14: 88:4a:93:c2:a9:a1:82:2e:b6:e9:20:25:f2:c2:aa:8d: 14:30:b4:6a:7c:7c:77:20:4a:35:4b:cf:84:de:58:a0: 61:3c:4f:e6:bc:b8:0f:3e:b7:31:a9:64:c0:fb:98:e4: 83:3f:e5:0c:1e:31:36:ee:b2:72:ec:28:4a:27:67:55: 21:b3:b5:c5:af:39:30:a6:52:a6:3d:3b:80:bc:59:49: 42:b5:f3:9e:92:f7:d3:26:27:b3:1a:e3:82:68:fa:fd Fingerprint (SHA-256): CE:36:56:91:28:15:00:6C:2A:9A:6B:6E:65:2C:B5:7A:83:53:5C:C6:57:34:2D:69:63:A9:36:E5:45:FB:F2:CD Fingerprint (SHA1): 14:2F:DC:84:3D:BF:1B:49:D0:FC:9C:B7:C6:C3:9A:AC:EA:13:04:36 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #13763: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Mar 31 19:20:46 2017 Not After : Thu Mar 31 19:20:46 2022 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5a:48:6d:33:90:3f:88:aa:66:df:2d:9d:3e:59:11: 84:24:aa:01:4d:c3:2a:a1:01:b9:b8:07:1d:aa:3c:57: d9:48:69:34:cd:1d:d7:d9:d1:5e:16:84:12:bc:77:b7: 2d:a0:2b:e9:a5:30:06:6d:1e:46:1d:02:c2:b1:4c:5c: cd:76:25:da:a7:af:c8:02:3d:8e:38:2d:93:da:61:4c: c5:e7:da:11:3b:3f:5a:88:83:4f:11:d6:7d:22:14:b9: 43:ba:7a:90:57:ab:54:03:cf:b0:87:77:ca:9d:c4:05: cb:ba:7d:d1:3a:b9:e3:ad:62:68:f3:c2:60:46:e4:df: 32:c5:b7:40:e8:2d:c1:2b:40:b4:b6:5b:f9:30:b4:62: 63:59:db:b4:91:00:7f:62:1e:7f:ad:e5:7f:47:4d:71: e4:c4:2f:32:f4:4d:f9:0f:6f:1e:f7:aa:54:a6:a4:37: 96:8c:e4:82:27:42:6c:72:73:9c:62:7f:38:4f:92:0f: 18:c1:5d:0b:3b:d6:92:28:b2:56:c4:d9:ee:f8:bf:8e: 95:70:0e:90:5f:73:fc:88:81:15:ad:ed:c2:2b:c3:1d: 2c:3f:a5:f1:29:e1:b0:01:cb:c7:3f:ab:08:e2:fc:6a: 8a:5d:b2:f3:60:de:91:d4:58:65:ed:97:15:c0:45:6b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:f2:ee:2e:05:4f:5c:8d:78:cb:68:e5:ca:ed:0b:8a: 6b:f6:92:b2:ae:95:14:19:d5:df:b6:66:76:66:af:14: 6a:51:37:52:73:f2:16:ab:fc:8e:c1:a7:66:71:81:f0: e9:10:8f:ec:3a:d8:b3:59:4f:b5:b3:3a:74:36:34:21: 58:b2:c6:a5:08:93:4a:ae:ee:4d:fa:c1:c2:15:5c:cb: ef:fe:1b:e3:d4:a9:dc:e4:bc:e6:47:94:8f:a4:1a:4e: 16:91:3e:79:25:44:2f:54:c2:ac:ea:ec:85:b7:dc:fe: f6:6e:f3:88:78:06:86:e0:33:e9:58:7a:51:b4:0f:ab: 59:ac:bc:fb:7a:dc:fc:6a:60:0a:f0:52:0a:17:7a:de: e2:5d:2c:c4:45:01:85:86:41:5c:29:24:39:ed:bc:e4: 24:48:a4:77:73:88:86:59:fd:ee:4a:78:8a:35:0f:ab: 96:1d:df:cf:f0:8c:94:4c:21:2a:9d:ec:1e:b4:d7:a1: 48:65:5a:45:5e:85:37:22:2a:10:ed:7c:c3:96:a9:08: a9:77:7d:12:1a:32:57:a7:7a:76:e7:54:3a:1c:f7:b6: 06:e8:0a:50:f2:d1:c3:70:65:3e:cd:29:0f:f6:88:9f: de:ed:3b:ea:f3:c9:d6:fb:0d:7e:c7:91:28:8e:f3:25 Fingerprint (SHA-256): 11:E4:B8:B3:3E:03:84:F7:52:C2:A7:98:11:9B:4B:F4:FE:DA:50:C0:CB:31:71:2D:1E:BD:59:E3:5F:4B:79:F4 Fingerprint (SHA1): 06:56:DF:43:3E:14:8D:A8:82:CE:05:F1:A8:7F:44:F1:7C:75:3D:27 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #13764: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #13765: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA CT,C,C TestCA-dsa CT,C,C TestCA-ec CT,C,C Alice u,u,u Alice-dsa u,u,u Alice-dsamixed u,u,u Alice-ec u,u,u Alice-ecmixed u,u,u bob@bogus.com ,, Dave u,u,u eve@bogus.com ,, bob-ec@bogus.com ,, Dave-ec u,u,u Dave-dsa u,u,u Dave-dsamixed u,u,u Dave-ecmixed u,u,u localhost.localdomain u,u,u localhost.localdomain-dsa u,u,u localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u localhost.localdomain-ecmixed u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-dsa u,u,u localhost-sni.localdomain-dsamixed u,u,u localhost-sni.localdomain-ec u,u,u localhost-sni.localdomain-ecmixed u,u,u ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-dsa u,u,u serverCA-dsa C,C,C ExtendedSSLUser-dsamixed u,u,u ExtendedSSLUser-ec u,u,u serverCA-ec C,C,C ExtendedSSLUser-ecmixed u,u,u chain-1-clientCA ,, clientCA-dsa T,C,C clientCA-ec T,C,C chain-2-clientCA-ec ,, chain-2-clientCA-dsa ,, chain-1-clientCA-dsa ,, chain-2-clientCA ,, chain-1-clientCA-ec ,, clientCA T,C,C Alice #2 ,, Alice #1 ,, Alice #99 ,, Alice #3 ,, Alice #4 ,, Alice #100 ,, CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests.v3.2460 -t Test2 -f ../tests.pw merge.sh: #13766: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests.v1.2460 -t Test1 -f ../tests.pw merge.sh: #13767: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #13768: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #13769: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #13770: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Fri Mar 31 19:23:21 2017 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Fri Mar 31 19:05:41 2017 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Fri Mar 31 19:23:13 2017 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #13771: Verifying TestCA CRL - PASSED TEST_MODE=SHARED_DB NSS_DEFAULT_DB_TYPE=sql TIMESTAMP merge END: Fri Mar 31 19:56:01 UTC 2017 Running tests for chains TIMESTAMP chains BEGIN: Fri Mar 31 19:56:01 UTC 2017 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #13772: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195602 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13773: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #13774: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #13775: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #13776: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13777: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13778: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13779: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #13780: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #13781: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13782: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13783: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13784: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #13785: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #13786: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13787: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9637 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13788: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13789: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #13790: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #13791: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13792: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13793: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13794: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #13795: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13796: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13797: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13798: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #13799: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13800: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13801: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13802: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #13803: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13804: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13805: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13806: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #13807: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13808: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9637 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13809: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13810: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #13811: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13812: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13813: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13814: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #13815: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13816: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13817: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13818: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #13819: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13820: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9637 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13821: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13822: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #13823: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13824: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13825: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13826: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #13827: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13828: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9636/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13829: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13830: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #13831: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13832: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9637 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13833: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13834: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20170331195927Z nextupdate=20180331195927Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Mar 31 19:59:27 2017 Next Update: Sat Mar 31 19:59:27 2018 CRL Extensions: chains.sh: #13835: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20170331195928Z addcert 2 20170331195928Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Mar 31 19:59:28 2017 Next Update: Sat Mar 31 19:59:27 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 19:59:28 2017 CRL Extensions: chains.sh: #13836: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20170331195929Z nextupdate=20180331195929Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Mar 31 19:59:29 2017 Next Update: Sat Mar 31 19:59:29 2018 CRL Extensions: chains.sh: #13837: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20170331195930Z addcert 2 20170331195930Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Mar 31 19:59:30 2017 Next Update: Sat Mar 31 19:59:29 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 19:59:30 2017 CRL Extensions: chains.sh: #13838: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20170331195931Z addcert 4 20170331195931Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Mar 31 19:59:31 2017 Next Update: Sat Mar 31 19:59:29 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 19:59:30 2017 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Fri Mar 31 19:59:31 2017 CRL Extensions: chains.sh: #13839: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20170331195932Z nextupdate=20180331195932Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Mar 31 19:59:32 2017 Next Update: Sat Mar 31 19:59:32 2018 CRL Extensions: chains.sh: #13840: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20170331195933Z addcert 2 20170331195933Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Mar 31 19:59:33 2017 Next Update: Sat Mar 31 19:59:32 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 19:59:33 2017 CRL Extensions: chains.sh: #13841: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20170331195934Z addcert 3 20170331195934Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Mar 31 19:59:34 2017 Next Update: Sat Mar 31 19:59:32 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 19:59:33 2017 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Mar 31 19:59:34 2017 CRL Extensions: chains.sh: #13842: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20170331195935Z nextupdate=20180331195935Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Mar 31 19:59:35 2017 Next Update: Sat Mar 31 19:59:35 2018 CRL Extensions: chains.sh: #13843: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20170331195936Z addcert 2 20170331195936Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Mar 31 19:59:36 2017 Next Update: Sat Mar 31 19:59:35 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 19:59:36 2017 CRL Extensions: chains.sh: #13844: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20170331195937Z addcert 3 20170331195937Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Mar 31 19:59:37 2017 Next Update: Sat Mar 31 19:59:35 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Mar 31 19:59:36 2017 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Mar 31 19:59:37 2017 CRL Extensions: chains.sh: #13845: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #13846: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #13847: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #13848: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #13849: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #13850: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #13851: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.28.2/dist/Linux4.8_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #13852: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #13853: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #13854: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #13855: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #13856: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #13857: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #13858: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #13859: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #13860: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #13861: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #13862: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #13863: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #13864: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #13865: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #13866: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #13867: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #13868: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #13869: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED httpserv starting at Fri Mar 31 19:59:58 UTC 2017 httpserv -D -p 9636 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.2460 & trying to connect to httpserv at Fri Mar 31 19:59:58 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 retrying to connect to httpserv at Fri Mar 31 20:00:04 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 chains.sh: #13870: Waiting for Server - FAILED kill -0 27781 >/dev/null 2>/dev/null httpserv with PID 27781 found at Fri Mar 31 20:00:04 UTC 2017 httpserv with PID 27781 started at Fri Mar 31 20:00:04 UTC 2017 tstclnt -h localhost.localdomain -p 9636 -q -t 20 tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #13871: Test that OCSP server is reachable - FAILED trying to kill httpserv with PID 27781 at Fri Mar 31 20:00:06 UTC 2017 kill -USR1 27781 httpserv: normal termination httpserv -b -p 9636 2>/dev/null; httpserv with PID 27781 killed at Fri Mar 31 20:00:06 UTC 2017 httpserv starting at Fri Mar 31 20:00:06 UTC 2017 httpserv -D -p 9636 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.2460 & trying to connect to httpserv at Fri Mar 31 20:00:06 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 retrying to connect to httpserv at Fri Mar 31 20:00:12 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 chains.sh: #13872: Waiting for Server - FAILED kill -0 27881 >/dev/null 2>/dev/null httpserv with PID 27881 found at Fri Mar 31 20:00:12 UTC 2017 httpserv with PID 27881 started at Fri Mar 31 20:00:12 UTC 2017 tstclnt -h localhost.localdomain -p 9636 -q -t 20 tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed chains.sh: #13873: Test that OCSP server is reachable - FAILED trying to kill httpserv with PID 27881 at Fri Mar 31 20:00:14 UTC 2017 kill -USR1 27881 httpserv: normal termination httpserv -b -p 9636 2>/dev/null; httpserv with PID 27881 killed at Fri Mar 31 20:00:14 UTC 2017 httpserv starting at Fri Mar 31 20:00:14 UTC 2017 httpserv -D -p 9636 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.2460 & trying to connect to httpserv at Fri Mar 31 20:00:14 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 retrying to connect to httpserv at Fri Mar 31 20:00:20 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 chains.sh: #13874: Waiting for Server - FAILED kill -0 27966 >/dev/null 2>/dev/null httpserv with PID 27966 found at Fri Mar 31 20:00:20 UTC 2017 httpserv with PID 27966 started at Fri Mar 31 20:00:20 UTC 2017 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #13875: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195603 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13876: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #13877: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #13878: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195604 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13879: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #13880: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #13881: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13882: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 331195605 -7 Bridge@Army < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13883: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13884: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 331195606 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13885: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13886: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #13887: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #13888: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13889: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 331195607 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13890: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13891: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #13892: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #13893: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #13894: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195604 (0x13bda4d4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:01:05 2017 Not After : Thu Mar 31 20:01:05 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:04:7d:53:eb:01:21:43:e0:8c:c3:13:db:35:00:e6: c4:56:e1:f1:b4:49:84:1c:c9:c8:ed:9d:af:9a:02:81: fb:52:23:0d:7d:c4:df:ab:a4:48:39:e3:19:af:fb:ac: ec:fa:cf:ab:36:63:b9:1f:bc:08:21:16:f4:77:e1:87: aa:3a:33:76:fd:ba:b7:71:ce:a9:f0:36:4d:85:cb:15: 2f:b8:82:71:0f:74:1c:22:46:6e:24:33:e4:d8:e0:77: 04:e3:86:c5:23:5b:33:21:3c:51:c7:55:21:c7:a1:9a: c7:26:32:eb:fe:f9:78:72:02:fd:3f:41:71:e2:00:41: 71:82:81:59:1d:06:68:bf:ad:e4:dc:14:60:f1:4d:a7: a5:cf:8c:dd:e8:98:cb:a4:05:a0:d0:24:68:0e:59:09: 6c:93:25:84:7d:97:94:57:0c:ee:d1:37:59:81:06:ee: 68:15:46:76:30:be:64:c4:84:0f:fc:c6:2f:dc:aa:98: b2:89:99:11:0b:c7:27:4f:69:72:3e:ff:f4:5e:6c:ff: aa:6b:6b:8e:eb:b9:f3:26:4d:30:b8:d6:6d:67:62:e4: 15:de:66:9d:fc:7a:d4:d4:bc:9f:b0:8b:27:76:9c:aa: 1a:51:cb:5c:c1:f6:5f:9c:b9:10:cd:21:e8:24:48:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:08:59:ea:98:e1:c0:5d:6b:16:46:cc:9a:2c:fb:0b: 2e:ef:b1:25:02:61:0e:0c:36:92:41:95:90:34:46:f3: 35:5c:49:8c:28:32:9e:5e:a5:ea:7d:02:26:da:d0:fb: 06:ba:95:be:13:ba:be:20:ee:de:3f:75:a9:9e:d6:7a: b6:05:00:b8:61:dc:12:ff:0b:a9:93:ca:16:6c:05:38: 04:68:43:14:3e:03:1b:8d:28:1c:47:2f:e4:cc:b4:ee: d1:df:86:48:7a:4e:76:06:19:7e:20:10:8b:b1:a9:f1: c5:24:7a:01:11:98:b2:27:de:50:9a:c2:f6:4f:64:bf: f9:62:f4:e1:cb:2f:fa:27:a3:22:28:88:d7:11:6b:a4: b0:a9:ef:ed:88:56:47:72:f9:0c:4c:ad:15:d5:50:5e: 7f:ca:43:d6:f4:7f:48:6a:1e:17:09:f1:db:75:42:92: f8:8f:f4:05:78:80:21:ed:52:85:0c:7b:47:2b:93:49: 57:98:ec:f9:07:e0:17:15:a9:aa:62:ed:ae:8d:79:eb: fb:c4:66:0d:07:1f:55:e0:e0:91:f3:54:ec:10:40:ef: ad:08:59:c3:e7:9b:d7:8f:42:b4:51:b6:76:e7:88:a0: 5e:56:de:3c:11:4c:b9:0d:cc:e2:31:36:a5:58:49:ca Fingerprint (SHA-256): 17:1E:F0:8B:A0:5E:E0:DD:D1:5E:13:FA:32:F2:29:F5:35:B3:07:7E:24:3E:BB:15:B1:8C:5B:78:D9:3B:84:F2 Fingerprint (SHA1): A2:10:49:25:E2:77:0B:C5:23:DD:0B:A9:3B:6D:08:C9:DA:4D:76:BD Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13895: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195603 (0x13bda4d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 20:01:00 2017 Not After : Thu Mar 31 20:01:00 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:2a:6c:95:a9:9b:89:91:a9:7a:d4:31:e2:37:bf:d7: b3:b4:24:71:e8:2f:e5:76:92:1a:dd:fc:9f:ce:d9:a8: bc:04:92:91:44:a5:1f:a9:0f:8c:c7:ac:02:a7:1c:ff: ff:cc:f6:86:ee:d3:36:69:c7:df:a8:a9:c1:84:c9:34: 3f:9b:9e:1c:db:d1:9b:20:fb:1a:73:b3:a8:76:dd:cc: 43:fe:23:c6:f7:5f:a9:f8:e7:5c:7f:9b:a5:d2:29:07: ec:3e:60:04:52:28:6e:a9:e7:ae:dd:f2:3f:60:5e:35: d2:8d:e5:6f:4b:23:1c:95:35:1c:13:95:68:0b:0b:89: df:e1:a0:c0:5d:ec:9e:e0:c9:73:42:99:4f:c7:e7:03: 68:6f:4c:a6:56:6f:c9:e9:99:7a:57:96:3c:b8:16:9b: ca:72:df:fd:e4:e9:10:f4:13:dd:9b:23:45:0c:36:da: 6c:0a:b5:0d:57:24:5d:f5:61:55:fa:32:b0:8f:e5:f1: 9d:46:78:b0:cf:73:e7:a6:ec:46:6b:69:a1:44:4e:d3: 78:d5:1d:a2:5c:11:95:38:a4:87:24:3d:af:5a:a5:bd: 78:06:b6:89:5c:b3:d2:52:dd:2b:bf:1d:ad:7f:9f:ca: 77:82:77:b5:85:63:33:6d:7c:68:d1:58:dd:b3:23:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:92:be:2d:b4:f6:ed:74:fd:24:8b:a8:e4:91:1f:3b: df:12:b0:90:b2:cc:46:e9:63:21:19:72:19:b1:03:d8: fc:a6:b9:7f:07:f4:41:c0:de:b5:4e:1b:69:cb:c4:bf: 2e:6d:ec:1f:00:e6:e1:76:95:0c:33:c2:68:23:44:6b: a7:26:f2:02:47:0e:d0:93:79:a8:3f:a7:3b:d1:22:c5: 8f:ec:d6:04:1e:39:cb:41:4e:f5:cc:c4:7a:67:08:cd: 8b:e0:6a:60:ed:c6:ac:98:0b:94:49:9c:34:82:ee:f3: 13:dc:e0:16:1a:56:24:10:f2:2e:ef:fc:89:28:b6:d5: f5:3e:0b:e6:cb:b3:52:dd:b5:70:33:b7:09:43:59:c1: c1:86:76:51:18:ab:42:89:c1:d5:84:55:f4:d2:08:b7: e3:00:05:4f:bc:99:d1:37:fd:a0:83:0a:0c:29:d6:03: 02:f5:7d:27:da:0c:20:c6:90:0e:d6:69:b9:7b:5f:2e: 19:4f:92:25:83:3a:3a:b4:be:1b:16:3a:cf:f3:60:18: 4d:42:8f:ab:93:12:a8:b1:3e:22:6c:18:d2:40:48:dc: 94:e7:9e:a6:75:94:3c:30:2e:8a:b4:18:cd:fb:4b:ae: c8:7e:86:28:a2:ce:12:60:3c:7d:f1:eb:6e:34:fc:90 Fingerprint (SHA-256): 89:48:6C:51:ED:92:CF:FB:F6:C7:74:4D:3D:E1:6A:77:FA:08:0E:6E:70:71:16:8B:16:26:BD:37:8A:85:74:2D Fingerprint (SHA1): 03:75:A1:34:2E:A4:A5:C5:02:F3:B0:97:41:5D:F8:36:97:D2:6E:8A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13896: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #13897: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #13898: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #13899: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195603 (0x13bda4d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 20:01:00 2017 Not After : Thu Mar 31 20:01:00 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:2a:6c:95:a9:9b:89:91:a9:7a:d4:31:e2:37:bf:d7: b3:b4:24:71:e8:2f:e5:76:92:1a:dd:fc:9f:ce:d9:a8: bc:04:92:91:44:a5:1f:a9:0f:8c:c7:ac:02:a7:1c:ff: ff:cc:f6:86:ee:d3:36:69:c7:df:a8:a9:c1:84:c9:34: 3f:9b:9e:1c:db:d1:9b:20:fb:1a:73:b3:a8:76:dd:cc: 43:fe:23:c6:f7:5f:a9:f8:e7:5c:7f:9b:a5:d2:29:07: ec:3e:60:04:52:28:6e:a9:e7:ae:dd:f2:3f:60:5e:35: d2:8d:e5:6f:4b:23:1c:95:35:1c:13:95:68:0b:0b:89: df:e1:a0:c0:5d:ec:9e:e0:c9:73:42:99:4f:c7:e7:03: 68:6f:4c:a6:56:6f:c9:e9:99:7a:57:96:3c:b8:16:9b: ca:72:df:fd:e4:e9:10:f4:13:dd:9b:23:45:0c:36:da: 6c:0a:b5:0d:57:24:5d:f5:61:55:fa:32:b0:8f:e5:f1: 9d:46:78:b0:cf:73:e7:a6:ec:46:6b:69:a1:44:4e:d3: 78:d5:1d:a2:5c:11:95:38:a4:87:24:3d:af:5a:a5:bd: 78:06:b6:89:5c:b3:d2:52:dd:2b:bf:1d:ad:7f:9f:ca: 77:82:77:b5:85:63:33:6d:7c:68:d1:58:dd:b3:23:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:92:be:2d:b4:f6:ed:74:fd:24:8b:a8:e4:91:1f:3b: df:12:b0:90:b2:cc:46:e9:63:21:19:72:19:b1:03:d8: fc:a6:b9:7f:07:f4:41:c0:de:b5:4e:1b:69:cb:c4:bf: 2e:6d:ec:1f:00:e6:e1:76:95:0c:33:c2:68:23:44:6b: a7:26:f2:02:47:0e:d0:93:79:a8:3f:a7:3b:d1:22:c5: 8f:ec:d6:04:1e:39:cb:41:4e:f5:cc:c4:7a:67:08:cd: 8b:e0:6a:60:ed:c6:ac:98:0b:94:49:9c:34:82:ee:f3: 13:dc:e0:16:1a:56:24:10:f2:2e:ef:fc:89:28:b6:d5: f5:3e:0b:e6:cb:b3:52:dd:b5:70:33:b7:09:43:59:c1: c1:86:76:51:18:ab:42:89:c1:d5:84:55:f4:d2:08:b7: e3:00:05:4f:bc:99:d1:37:fd:a0:83:0a:0c:29:d6:03: 02:f5:7d:27:da:0c:20:c6:90:0e:d6:69:b9:7b:5f:2e: 19:4f:92:25:83:3a:3a:b4:be:1b:16:3a:cf:f3:60:18: 4d:42:8f:ab:93:12:a8:b1:3e:22:6c:18:d2:40:48:dc: 94:e7:9e:a6:75:94:3c:30:2e:8a:b4:18:cd:fb:4b:ae: c8:7e:86:28:a2:ce:12:60:3c:7d:f1:eb:6e:34:fc:90 Fingerprint (SHA-256): 89:48:6C:51:ED:92:CF:FB:F6:C7:74:4D:3D:E1:6A:77:FA:08:0E:6E:70:71:16:8B:16:26:BD:37:8A:85:74:2D Fingerprint (SHA1): 03:75:A1:34:2E:A4:A5:C5:02:F3:B0:97:41:5D:F8:36:97:D2:6E:8A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13900: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195604 (0x13bda4d4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:01:05 2017 Not After : Thu Mar 31 20:01:05 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:04:7d:53:eb:01:21:43:e0:8c:c3:13:db:35:00:e6: c4:56:e1:f1:b4:49:84:1c:c9:c8:ed:9d:af:9a:02:81: fb:52:23:0d:7d:c4:df:ab:a4:48:39:e3:19:af:fb:ac: ec:fa:cf:ab:36:63:b9:1f:bc:08:21:16:f4:77:e1:87: aa:3a:33:76:fd:ba:b7:71:ce:a9:f0:36:4d:85:cb:15: 2f:b8:82:71:0f:74:1c:22:46:6e:24:33:e4:d8:e0:77: 04:e3:86:c5:23:5b:33:21:3c:51:c7:55:21:c7:a1:9a: c7:26:32:eb:fe:f9:78:72:02:fd:3f:41:71:e2:00:41: 71:82:81:59:1d:06:68:bf:ad:e4:dc:14:60:f1:4d:a7: a5:cf:8c:dd:e8:98:cb:a4:05:a0:d0:24:68:0e:59:09: 6c:93:25:84:7d:97:94:57:0c:ee:d1:37:59:81:06:ee: 68:15:46:76:30:be:64:c4:84:0f:fc:c6:2f:dc:aa:98: b2:89:99:11:0b:c7:27:4f:69:72:3e:ff:f4:5e:6c:ff: aa:6b:6b:8e:eb:b9:f3:26:4d:30:b8:d6:6d:67:62:e4: 15:de:66:9d:fc:7a:d4:d4:bc:9f:b0:8b:27:76:9c:aa: 1a:51:cb:5c:c1:f6:5f:9c:b9:10:cd:21:e8:24:48:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:08:59:ea:98:e1:c0:5d:6b:16:46:cc:9a:2c:fb:0b: 2e:ef:b1:25:02:61:0e:0c:36:92:41:95:90:34:46:f3: 35:5c:49:8c:28:32:9e:5e:a5:ea:7d:02:26:da:d0:fb: 06:ba:95:be:13:ba:be:20:ee:de:3f:75:a9:9e:d6:7a: b6:05:00:b8:61:dc:12:ff:0b:a9:93:ca:16:6c:05:38: 04:68:43:14:3e:03:1b:8d:28:1c:47:2f:e4:cc:b4:ee: d1:df:86:48:7a:4e:76:06:19:7e:20:10:8b:b1:a9:f1: c5:24:7a:01:11:98:b2:27:de:50:9a:c2:f6:4f:64:bf: f9:62:f4:e1:cb:2f:fa:27:a3:22:28:88:d7:11:6b:a4: b0:a9:ef:ed:88:56:47:72:f9:0c:4c:ad:15:d5:50:5e: 7f:ca:43:d6:f4:7f:48:6a:1e:17:09:f1:db:75:42:92: f8:8f:f4:05:78:80:21:ed:52:85:0c:7b:47:2b:93:49: 57:98:ec:f9:07:e0:17:15:a9:aa:62:ed:ae:8d:79:eb: fb:c4:66:0d:07:1f:55:e0:e0:91:f3:54:ec:10:40:ef: ad:08:59:c3:e7:9b:d7:8f:42:b4:51:b6:76:e7:88:a0: 5e:56:de:3c:11:4c:b9:0d:cc:e2:31:36:a5:58:49:ca Fingerprint (SHA-256): 17:1E:F0:8B:A0:5E:E0:DD:D1:5E:13:FA:32:F2:29:F5:35:B3:07:7E:24:3E:BB:15:B1:8C:5B:78:D9:3B:84:F2 Fingerprint (SHA1): A2:10:49:25:E2:77:0B:C5:23:DD:0B:A9:3B:6D:08:C9:DA:4D:76:BD Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13901: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #13902: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #13903: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #13904: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #13905: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #13906: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195604 (0x13bda4d4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:01:05 2017 Not After : Thu Mar 31 20:01:05 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:04:7d:53:eb:01:21:43:e0:8c:c3:13:db:35:00:e6: c4:56:e1:f1:b4:49:84:1c:c9:c8:ed:9d:af:9a:02:81: fb:52:23:0d:7d:c4:df:ab:a4:48:39:e3:19:af:fb:ac: ec:fa:cf:ab:36:63:b9:1f:bc:08:21:16:f4:77:e1:87: aa:3a:33:76:fd:ba:b7:71:ce:a9:f0:36:4d:85:cb:15: 2f:b8:82:71:0f:74:1c:22:46:6e:24:33:e4:d8:e0:77: 04:e3:86:c5:23:5b:33:21:3c:51:c7:55:21:c7:a1:9a: c7:26:32:eb:fe:f9:78:72:02:fd:3f:41:71:e2:00:41: 71:82:81:59:1d:06:68:bf:ad:e4:dc:14:60:f1:4d:a7: a5:cf:8c:dd:e8:98:cb:a4:05:a0:d0:24:68:0e:59:09: 6c:93:25:84:7d:97:94:57:0c:ee:d1:37:59:81:06:ee: 68:15:46:76:30:be:64:c4:84:0f:fc:c6:2f:dc:aa:98: b2:89:99:11:0b:c7:27:4f:69:72:3e:ff:f4:5e:6c:ff: aa:6b:6b:8e:eb:b9:f3:26:4d:30:b8:d6:6d:67:62:e4: 15:de:66:9d:fc:7a:d4:d4:bc:9f:b0:8b:27:76:9c:aa: 1a:51:cb:5c:c1:f6:5f:9c:b9:10:cd:21:e8:24:48:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:08:59:ea:98:e1:c0:5d:6b:16:46:cc:9a:2c:fb:0b: 2e:ef:b1:25:02:61:0e:0c:36:92:41:95:90:34:46:f3: 35:5c:49:8c:28:32:9e:5e:a5:ea:7d:02:26:da:d0:fb: 06:ba:95:be:13:ba:be:20:ee:de:3f:75:a9:9e:d6:7a: b6:05:00:b8:61:dc:12:ff:0b:a9:93:ca:16:6c:05:38: 04:68:43:14:3e:03:1b:8d:28:1c:47:2f:e4:cc:b4:ee: d1:df:86:48:7a:4e:76:06:19:7e:20:10:8b:b1:a9:f1: c5:24:7a:01:11:98:b2:27:de:50:9a:c2:f6:4f:64:bf: f9:62:f4:e1:cb:2f:fa:27:a3:22:28:88:d7:11:6b:a4: b0:a9:ef:ed:88:56:47:72:f9:0c:4c:ad:15:d5:50:5e: 7f:ca:43:d6:f4:7f:48:6a:1e:17:09:f1:db:75:42:92: f8:8f:f4:05:78:80:21:ed:52:85:0c:7b:47:2b:93:49: 57:98:ec:f9:07:e0:17:15:a9:aa:62:ed:ae:8d:79:eb: fb:c4:66:0d:07:1f:55:e0:e0:91:f3:54:ec:10:40:ef: ad:08:59:c3:e7:9b:d7:8f:42:b4:51:b6:76:e7:88:a0: 5e:56:de:3c:11:4c:b9:0d:cc:e2:31:36:a5:58:49:ca Fingerprint (SHA-256): 17:1E:F0:8B:A0:5E:E0:DD:D1:5E:13:FA:32:F2:29:F5:35:B3:07:7E:24:3E:BB:15:B1:8C:5B:78:D9:3B:84:F2 Fingerprint (SHA1): A2:10:49:25:E2:77:0B:C5:23:DD:0B:A9:3B:6D:08:C9:DA:4D:76:BD Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13907: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195604 (0x13bda4d4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:01:05 2017 Not After : Thu Mar 31 20:01:05 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:04:7d:53:eb:01:21:43:e0:8c:c3:13:db:35:00:e6: c4:56:e1:f1:b4:49:84:1c:c9:c8:ed:9d:af:9a:02:81: fb:52:23:0d:7d:c4:df:ab:a4:48:39:e3:19:af:fb:ac: ec:fa:cf:ab:36:63:b9:1f:bc:08:21:16:f4:77:e1:87: aa:3a:33:76:fd:ba:b7:71:ce:a9:f0:36:4d:85:cb:15: 2f:b8:82:71:0f:74:1c:22:46:6e:24:33:e4:d8:e0:77: 04:e3:86:c5:23:5b:33:21:3c:51:c7:55:21:c7:a1:9a: c7:26:32:eb:fe:f9:78:72:02:fd:3f:41:71:e2:00:41: 71:82:81:59:1d:06:68:bf:ad:e4:dc:14:60:f1:4d:a7: a5:cf:8c:dd:e8:98:cb:a4:05:a0:d0:24:68:0e:59:09: 6c:93:25:84:7d:97:94:57:0c:ee:d1:37:59:81:06:ee: 68:15:46:76:30:be:64:c4:84:0f:fc:c6:2f:dc:aa:98: b2:89:99:11:0b:c7:27:4f:69:72:3e:ff:f4:5e:6c:ff: aa:6b:6b:8e:eb:b9:f3:26:4d:30:b8:d6:6d:67:62:e4: 15:de:66:9d:fc:7a:d4:d4:bc:9f:b0:8b:27:76:9c:aa: 1a:51:cb:5c:c1:f6:5f:9c:b9:10:cd:21:e8:24:48:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:08:59:ea:98:e1:c0:5d:6b:16:46:cc:9a:2c:fb:0b: 2e:ef:b1:25:02:61:0e:0c:36:92:41:95:90:34:46:f3: 35:5c:49:8c:28:32:9e:5e:a5:ea:7d:02:26:da:d0:fb: 06:ba:95:be:13:ba:be:20:ee:de:3f:75:a9:9e:d6:7a: b6:05:00:b8:61:dc:12:ff:0b:a9:93:ca:16:6c:05:38: 04:68:43:14:3e:03:1b:8d:28:1c:47:2f:e4:cc:b4:ee: d1:df:86:48:7a:4e:76:06:19:7e:20:10:8b:b1:a9:f1: c5:24:7a:01:11:98:b2:27:de:50:9a:c2:f6:4f:64:bf: f9:62:f4:e1:cb:2f:fa:27:a3:22:28:88:d7:11:6b:a4: b0:a9:ef:ed:88:56:47:72:f9:0c:4c:ad:15:d5:50:5e: 7f:ca:43:d6:f4:7f:48:6a:1e:17:09:f1:db:75:42:92: f8:8f:f4:05:78:80:21:ed:52:85:0c:7b:47:2b:93:49: 57:98:ec:f9:07:e0:17:15:a9:aa:62:ed:ae:8d:79:eb: fb:c4:66:0d:07:1f:55:e0:e0:91:f3:54:ec:10:40:ef: ad:08:59:c3:e7:9b:d7:8f:42:b4:51:b6:76:e7:88:a0: 5e:56:de:3c:11:4c:b9:0d:cc:e2:31:36:a5:58:49:ca Fingerprint (SHA-256): 17:1E:F0:8B:A0:5E:E0:DD:D1:5E:13:FA:32:F2:29:F5:35:B3:07:7E:24:3E:BB:15:B1:8C:5B:78:D9:3B:84:F2 Fingerprint (SHA1): A2:10:49:25:E2:77:0B:C5:23:DD:0B:A9:3B:6D:08:C9:DA:4D:76:BD Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13908: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #13909: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #13910: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #13911: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #13912: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #13913: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195603 (0x13bda4d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 20:01:00 2017 Not After : Thu Mar 31 20:01:00 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:2a:6c:95:a9:9b:89:91:a9:7a:d4:31:e2:37:bf:d7: b3:b4:24:71:e8:2f:e5:76:92:1a:dd:fc:9f:ce:d9:a8: bc:04:92:91:44:a5:1f:a9:0f:8c:c7:ac:02:a7:1c:ff: ff:cc:f6:86:ee:d3:36:69:c7:df:a8:a9:c1:84:c9:34: 3f:9b:9e:1c:db:d1:9b:20:fb:1a:73:b3:a8:76:dd:cc: 43:fe:23:c6:f7:5f:a9:f8:e7:5c:7f:9b:a5:d2:29:07: ec:3e:60:04:52:28:6e:a9:e7:ae:dd:f2:3f:60:5e:35: d2:8d:e5:6f:4b:23:1c:95:35:1c:13:95:68:0b:0b:89: df:e1:a0:c0:5d:ec:9e:e0:c9:73:42:99:4f:c7:e7:03: 68:6f:4c:a6:56:6f:c9:e9:99:7a:57:96:3c:b8:16:9b: ca:72:df:fd:e4:e9:10:f4:13:dd:9b:23:45:0c:36:da: 6c:0a:b5:0d:57:24:5d:f5:61:55:fa:32:b0:8f:e5:f1: 9d:46:78:b0:cf:73:e7:a6:ec:46:6b:69:a1:44:4e:d3: 78:d5:1d:a2:5c:11:95:38:a4:87:24:3d:af:5a:a5:bd: 78:06:b6:89:5c:b3:d2:52:dd:2b:bf:1d:ad:7f:9f:ca: 77:82:77:b5:85:63:33:6d:7c:68:d1:58:dd:b3:23:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:92:be:2d:b4:f6:ed:74:fd:24:8b:a8:e4:91:1f:3b: df:12:b0:90:b2:cc:46:e9:63:21:19:72:19:b1:03:d8: fc:a6:b9:7f:07:f4:41:c0:de:b5:4e:1b:69:cb:c4:bf: 2e:6d:ec:1f:00:e6:e1:76:95:0c:33:c2:68:23:44:6b: a7:26:f2:02:47:0e:d0:93:79:a8:3f:a7:3b:d1:22:c5: 8f:ec:d6:04:1e:39:cb:41:4e:f5:cc:c4:7a:67:08:cd: 8b:e0:6a:60:ed:c6:ac:98:0b:94:49:9c:34:82:ee:f3: 13:dc:e0:16:1a:56:24:10:f2:2e:ef:fc:89:28:b6:d5: f5:3e:0b:e6:cb:b3:52:dd:b5:70:33:b7:09:43:59:c1: c1:86:76:51:18:ab:42:89:c1:d5:84:55:f4:d2:08:b7: e3:00:05:4f:bc:99:d1:37:fd:a0:83:0a:0c:29:d6:03: 02:f5:7d:27:da:0c:20:c6:90:0e:d6:69:b9:7b:5f:2e: 19:4f:92:25:83:3a:3a:b4:be:1b:16:3a:cf:f3:60:18: 4d:42:8f:ab:93:12:a8:b1:3e:22:6c:18:d2:40:48:dc: 94:e7:9e:a6:75:94:3c:30:2e:8a:b4:18:cd:fb:4b:ae: c8:7e:86:28:a2:ce:12:60:3c:7d:f1:eb:6e:34:fc:90 Fingerprint (SHA-256): 89:48:6C:51:ED:92:CF:FB:F6:C7:74:4D:3D:E1:6A:77:FA:08:0E:6E:70:71:16:8B:16:26:BD:37:8A:85:74:2D Fingerprint (SHA1): 03:75:A1:34:2E:A4:A5:C5:02:F3:B0:97:41:5D:F8:36:97:D2:6E:8A Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13914: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195603 (0x13bda4d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 20:01:00 2017 Not After : Thu Mar 31 20:01:00 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:2a:6c:95:a9:9b:89:91:a9:7a:d4:31:e2:37:bf:d7: b3:b4:24:71:e8:2f:e5:76:92:1a:dd:fc:9f:ce:d9:a8: bc:04:92:91:44:a5:1f:a9:0f:8c:c7:ac:02:a7:1c:ff: ff:cc:f6:86:ee:d3:36:69:c7:df:a8:a9:c1:84:c9:34: 3f:9b:9e:1c:db:d1:9b:20:fb:1a:73:b3:a8:76:dd:cc: 43:fe:23:c6:f7:5f:a9:f8:e7:5c:7f:9b:a5:d2:29:07: ec:3e:60:04:52:28:6e:a9:e7:ae:dd:f2:3f:60:5e:35: d2:8d:e5:6f:4b:23:1c:95:35:1c:13:95:68:0b:0b:89: df:e1:a0:c0:5d:ec:9e:e0:c9:73:42:99:4f:c7:e7:03: 68:6f:4c:a6:56:6f:c9:e9:99:7a:57:96:3c:b8:16:9b: ca:72:df:fd:e4:e9:10:f4:13:dd:9b:23:45:0c:36:da: 6c:0a:b5:0d:57:24:5d:f5:61:55:fa:32:b0:8f:e5:f1: 9d:46:78:b0:cf:73:e7:a6:ec:46:6b:69:a1:44:4e:d3: 78:d5:1d:a2:5c:11:95:38:a4:87:24:3d:af:5a:a5:bd: 78:06:b6:89:5c:b3:d2:52:dd:2b:bf:1d:ad:7f:9f:ca: 77:82:77:b5:85:63:33:6d:7c:68:d1:58:dd:b3:23:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:92:be:2d:b4:f6:ed:74:fd:24:8b:a8:e4:91:1f:3b: df:12:b0:90:b2:cc:46:e9:63:21:19:72:19:b1:03:d8: fc:a6:b9:7f:07:f4:41:c0:de:b5:4e:1b:69:cb:c4:bf: 2e:6d:ec:1f:00:e6:e1:76:95:0c:33:c2:68:23:44:6b: a7:26:f2:02:47:0e:d0:93:79:a8:3f:a7:3b:d1:22:c5: 8f:ec:d6:04:1e:39:cb:41:4e:f5:cc:c4:7a:67:08:cd: 8b:e0:6a:60:ed:c6:ac:98:0b:94:49:9c:34:82:ee:f3: 13:dc:e0:16:1a:56:24:10:f2:2e:ef:fc:89:28:b6:d5: f5:3e:0b:e6:cb:b3:52:dd:b5:70:33:b7:09:43:59:c1: c1:86:76:51:18:ab:42:89:c1:d5:84:55:f4:d2:08:b7: e3:00:05:4f:bc:99:d1:37:fd:a0:83:0a:0c:29:d6:03: 02:f5:7d:27:da:0c:20:c6:90:0e:d6:69:b9:7b:5f:2e: 19:4f:92:25:83:3a:3a:b4:be:1b:16:3a:cf:f3:60:18: 4d:42:8f:ab:93:12:a8:b1:3e:22:6c:18:d2:40:48:dc: 94:e7:9e:a6:75:94:3c:30:2e:8a:b4:18:cd:fb:4b:ae: c8:7e:86:28:a2:ce:12:60:3c:7d:f1:eb:6e:34:fc:90 Fingerprint (SHA-256): 89:48:6C:51:ED:92:CF:FB:F6:C7:74:4D:3D:E1:6A:77:FA:08:0E:6E:70:71:16:8B:16:26:BD:37:8A:85:74:2D Fingerprint (SHA1): 03:75:A1:34:2E:A4:A5:C5:02:F3:B0:97:41:5D:F8:36:97:D2:6E:8A Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13915: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #13916: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195608 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13917: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #13918: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #13919: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195609 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13920: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #13921: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #13922: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195610 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13923: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #13924: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #13925: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195611 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13926: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #13927: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #13928: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195612 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13929: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #13930: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #13931: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195613 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13932: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #13933: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #13934: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195614 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13935: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #13936: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #13937: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195615 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13938: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #13939: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #13940: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195616 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13941: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #13942: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #13943: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13944: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 331195617 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13945: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13946: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 331195618 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13947: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13948: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 331195619 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13949: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13950: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #13951: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #13952: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13953: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 331195620 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13954: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13955: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 331195621 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13956: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13957: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 331195622 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13958: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13959: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #13960: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #13961: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13962: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 331195623 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13963: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13964: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 331195624 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13965: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13966: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 331195625 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13967: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13968: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #13969: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #13970: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13971: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 331195626 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13972: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13973: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 331195627 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13974: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13975: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 331195628 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13976: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13977: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #13978: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13979: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13980: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 331195629 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13981: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13982: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #13983: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13984: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331195630 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13985: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13986: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195608 (0x13bda4d8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Mar 31 20:01:59 2017 Not After : Thu Mar 31 20:01:59 2067 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:fd:06:8c:a6:c5:0c:a8:5e:0f:37:29:b1:c4:3d:50: ea:14:bc:89:60:9c:9a:cd:d9:8d:42:dd:d3:79:e4:8e: 56:07:62:6e:b0:1b:ed:0c:df:61:98:b0:65:b7:de:b7: 20:e0:66:f5:ac:4b:a0:fe:ae:68:4b:60:7e:59:cb:51: 17:11:82:2c:f1:18:4d:87:47:68:76:0f:cd:92:c8:52: 50:ac:43:59:42:8f:9a:8a:cc:6d:1f:28:44:8d:97:ac: 0e:03:f8:ca:79:4e:ec:dc:c4:bf:5f:25:ba:5c:88:bc: f0:cc:aa:e1:42:fd:a8:2c:be:30:34:99:93:00:73:7b: 27:24:b7:22:9d:1b:77:cb:09:3f:c5:ef:6c:56:54:a2: 48:c9:9f:71:ee:d8:99:91:44:cd:f0:7f:af:0c:5c:70: 40:09:38:01:82:53:05:c9:45:06:05:b9:a7:70:9e:53: 2c:3b:cc:5b:a1:57:e8:f6:c5:6d:86:db:03:81:49:2d: 99:12:23:91:0d:f6:07:0e:84:83:08:a6:aa:1a:b6:34: e1:ad:11:e9:b5:e7:0b:54:84:6a:49:13:cf:4f:28:ee: f4:3d:c8:71:be:d5:b1:53:ea:be:48:71:d3:53:71:f0: be:7a:71:97:53:5c:51:bd:c0:f2:17:ba:f2:d5:8e:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:bf:71:7f:a6:33:e1:db:28:c2:57:32:eb:e8:70:92: 41:74:08:da:79:47:bf:43:eb:c4:5c:87:19:c1:ec:ec: 81:f1:2c:cf:50:c6:f0:f5:ea:bb:39:1d:34:23:0d:85: 96:d5:d6:3a:ef:8b:b1:a3:bb:21:c0:be:31:3f:3a:b0: 93:1b:f7:39:82:1c:42:6b:9d:04:d3:e6:2e:ea:cf:42: 0f:56:c9:35:a5:74:c1:13:96:67:6a:06:b8:12:42:7a: a6:1b:e9:ce:59:6b:b4:a6:c7:62:2f:83:28:4b:9e:d4: a6:02:c5:c8:44:7c:8f:1c:c3:ab:0c:92:bf:a6:48:5c: 2c:a6:56:f7:24:c5:2e:ab:1e:64:68:74:48:64:4c:c2: af:05:a6:ff:2b:3f:8c:ce:4d:3e:e4:6c:54:15:a0:46: e9:f7:cc:5e:6a:11:a5:4c:0c:a2:df:6d:b6:0e:0f:45: ed:e4:ba:6c:27:77:83:c7:99:5c:71:8b:8e:1a:08:1c: 29:06:f2:6e:0b:80:f4:e3:93:da:c6:8d:2a:27:87:8c: 89:99:04:4a:06:6b:77:a3:7e:24:f9:f0:e6:17:47:72: cb:63:a9:65:5e:22:8d:a2:0a:ed:d0:14:15:cf:31:0f: 0c:98:3a:3a:30:9a:85:8e:55:1d:71:fe:7a:27:ee:87 Fingerprint (SHA-256): D7:C7:EE:6A:A7:0E:AA:98:68:71:3B:F5:24:BC:B8:52:44:C0:F1:7D:92:0D:37:5D:49:45:C2:2F:8F:79:92:AD Fingerprint (SHA1): AF:C4:6A:B5:0E:6B:9F:24:3E:98:78:8D:E3:13:10:0E:3D:F4:6D:0B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #13987: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195609 (0x13bda4d9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Mar 31 20:02:11 2017 Not After : Thu Mar 31 20:02:11 2067 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:ba:15:45:b2:fe:aa:7f:ff:fc:39:8d:8b:0a:da:86: e9:b6:12:b0:a3:eb:eb:f2:b7:4c:34:60:26:0c:50:8a: a4:8d:9d:e3:d7:28:83:f6:4d:7c:0b:bf:cd:4a:34:92: 5d:49:f1:0c:34:64:d8:0e:9b:14:24:e0:89:d6:49:34: 38:96:8e:f5:83:dc:58:73:a1:8e:1e:2a:c3:89:8a:a8: bb:3c:12:bf:f5:3a:a8:6f:5f:8e:29:cb:da:e9:4e:b2: 8e:00:af:f2:16:e1:56:c4:67:51:5b:f2:e6:63:5b:4a: 6f:ec:5e:3c:f8:34:de:d4:19:f3:84:1d:8a:05:b8:c2: 5a:0f:e3:82:58:e7:7b:99:1b:9c:55:2f:4d:97:ec:f4: 9b:3d:25:cb:2b:6e:b4:94:b9:26:9d:1a:0a:6f:1c:57: d9:8d:62:23:00:72:33:d4:59:28:60:46:18:25:ef:e0: 1c:9d:41:03:86:1f:ed:92:32:30:68:65:0f:20:27:0c: c0:97:67:26:47:ef:45:23:53:f9:47:4d:4f:35:36:59: fc:f3:0a:99:28:ab:f5:f3:a6:00:a8:7f:5c:5e:5b:db: 3d:9e:b0:69:2f:d2:b8:58:14:24:d1:d9:6e:31:d6:95: 53:1e:39:2a:67:c5:a1:64:f5:a5:df:21:a2:71:2c:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:41:2b:8e:e8:af:fe:a9:4d:6f:8b:65:ae:33:0f:c0: ee:e6:0f:b9:3c:8f:6a:9d:ee:e1:06:c3:47:eb:af:1d: 70:63:7e:0c:bf:a8:1f:77:0a:a1:57:20:0e:af:e1:ad: 8b:ae:3c:c7:74:7c:0f:5b:bd:3c:20:28:58:3d:7c:15: e4:d5:20:e9:14:f2:d9:d0:6f:46:93:b1:7c:98:f3:76: 15:53:d2:bf:b1:a0:ea:c9:02:67:14:df:82:cd:8e:ce: 1a:f0:98:89:6f:d3:d4:ed:7b:29:d2:1b:ae:e8:5e:5f: f1:0c:94:3a:4b:83:7d:a2:6d:b7:ed:0c:cb:a0:88:6c: bc:a4:72:67:79:ea:f2:28:e4:30:8c:56:5e:5b:d1:61: 0b:8a:df:63:00:25:31:42:e2:0e:28:b9:df:34:87:20: 55:23:1b:9a:6b:eb:cf:c3:97:ff:cb:6f:fa:ed:b6:74: 3d:c0:2d:36:75:1c:11:ef:75:aa:0a:82:22:8f:30:9c: 56:ed:3a:e0:cd:c7:41:0a:aa:52:32:28:b6:bc:11:d5: 5b:fb:b4:53:bb:fa:f8:7e:bb:ed:ab:d7:11:ca:f8:f5: 3a:79:19:75:9b:c7:07:15:20:fa:70:9d:93:8f:ab:a6: c3:03:ee:c3:1c:37:f5:9c:f4:00:37:17:05:aa:48:35 Fingerprint (SHA-256): E1:E5:D6:7F:35:C2:41:DF:52:12:EA:07:18:F9:37:8A:90:36:3D:FD:0D:C3:F9:13:6B:88:2A:66:C7:21:91:7E Fingerprint (SHA1): 00:4C:DD:9B:15:52:82:11:53:21:81:2C:57:AC:54:96:87:8B:F1:76 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #13988: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195610 (0x13bda4da) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Mar 31 20:02:23 2017 Not After : Thu Mar 31 20:02:23 2067 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:1c:2a:83:0d:85:9b:89:af:5d:e1:8e:c7:cd:50:79: 57:db:59:12:f7:b3:2e:d6:96:56:df:dd:0a:c5:2e:d2: 44:33:a1:8d:b4:cf:e4:5f:7f:09:d3:f7:0d:f6:c2:f7: 5c:58:03:80:c5:8a:64:ee:e5:23:d9:1f:c6:4f:2a:6b: b5:0d:04:dc:95:65:01:f5:9f:59:1e:46:a1:81:51:da: 00:c4:57:8c:e9:63:e3:9b:d6:25:e3:c1:d0:c3:a2:85: bc:13:8a:b7:12:47:0b:69:8d:a3:0a:83:5d:0b:5e:4b: e4:62:05:61:98:c6:c5:f5:d4:1e:65:cb:5b:96:d1:c8: 01:91:cd:09:dc:6b:f7:03:d8:bf:6d:83:63:1d:65:32: eb:cb:09:c3:5a:b7:db:f7:bf:0e:86:be:1c:aa:30:0d: 70:fc:52:b0:7a:d7:99:ac:31:74:27:25:cf:31:df:d5: 98:25:5a:42:6d:f2:3f:49:ae:e6:a8:03:3e:19:28:1e: 63:7b:c6:af:e5:55:52:e2:e4:1d:71:39:30:63:a9:d8: a2:c0:25:04:ba:50:60:db:7b:d7:1c:de:28:54:cb:41: af:61:2a:7d:a6:90:b0:51:94:f9:93:d6:e1:99:5a:d8: 4d:cd:a9:91:56:d3:4d:e5:94:bd:7c:f0:35:6d:2d:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:f7:2d:d7:58:28:e6:ca:c8:d6:19:0c:86:f2:8e:1c: 34:27:c9:9d:3b:3e:e3:a2:2b:85:59:e9:5f:de:42:06: 16:e1:4f:a3:94:6e:cb:98:5e:8e:50:90:1d:3d:19:20: 4a:44:d7:fa:1e:d2:0a:e5:6a:30:5c:f8:1b:15:b6:fb: 06:23:a6:c7:e9:fb:1f:ba:73:5b:ea:89:b7:a5:b8:59: a1:35:20:54:0a:9c:8c:e8:8b:31:5a:0e:88:73:fc:f4: 49:e9:cc:93:86:ef:fe:d0:18:65:12:44:f7:75:5a:6e: b1:4c:a9:23:9b:78:6f:35:17:07:76:c5:02:33:2d:81: c1:02:b9:65:65:22:ab:f6:d9:38:1f:6a:fc:f7:ff:c0: 8c:24:cd:42:3e:34:c9:f2:eb:3f:27:53:5f:ea:f4:93: 75:7f:a8:02:57:ed:c5:cf:ee:01:7a:22:bc:f2:09:cd: c2:55:7f:5d:8f:29:3d:a2:41:9c:f7:12:3e:75:97:e7: 26:be:b7:6a:28:fa:9f:60:f6:22:e4:46:37:62:ef:5d: 36:28:15:62:28:ea:ec:37:16:f9:d8:01:ca:56:39:22: 0c:dc:dc:b8:e5:0d:c9:f3:00:7d:fb:56:60:f4:95:5b: e0:53:2e:bf:57:e5:73:e7:da:1f:4f:34:5e:78:ee:a4 Fingerprint (SHA-256): AF:78:FC:41:5C:7B:EA:F2:F1:E1:E7:87:88:79:59:5F:2D:99:DE:4D:3C:3C:DA:19:64:AB:11:27:D5:DA:9E:39 Fingerprint (SHA1): 87:F2:58:B4:2F:69:DD:F8:47:06:F2:91:21:10:41:60:B6:04:6E:50 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #13989: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195611 (0x13bda4db) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Mar 31 20:02:30 2017 Not After : Thu Mar 31 20:02:30 2067 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:e7:28:1d:47:ab:a6:82:a1:dc:47:09:1e:6b:42:bc: 95:42:36:d1:23:ba:ce:18:94:37:ba:72:95:4e:4a:0b: 46:16:68:3b:a1:17:29:d4:5d:fa:53:e4:3c:fa:34:42: 6b:e9:e3:91:f2:83:d4:34:1f:1f:3c:8d:d4:7e:23:a3: 7e:6e:5f:13:d5:2b:c5:44:4c:e4:e6:08:d7:69:e4:5c: c0:40:d8:26:01:1a:4a:03:c5:d8:bf:31:5b:7e:a3:07: 09:80:6d:c1:c6:a6:57:e4:92:a5:f2:ae:e5:ee:76:9b: 64:fc:8e:08:14:0e:28:e8:13:45:ce:89:3d:f8:1b:36: f8:5f:56:29:1f:c9:e3:0b:53:db:21:76:66:a2:be:e5: 11:d1:98:29:0f:45:39:f7:bf:aa:28:6c:78:22:af:b1: fb:6f:50:c1:62:19:c5:a0:74:84:9b:81:bd:4c:c7:9d: 92:78:b2:71:24:fd:e8:e7:10:43:ab:f9:cf:af:5e:67: b7:75:2e:50:ff:f9:57:9d:12:ec:88:cc:1e:ab:4a:cd: b2:8c:62:fa:51:be:fa:34:af:a5:07:22:7c:06:2f:44: 56:4e:12:39:2b:80:f2:c0:66:30:8e:19:d8:d0:38:10: 67:42:2d:51:02:40:26:95:55:e0:cd:f5:d3:7c:12:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:24:28:32:99:4e:dd:d1:45:e4:72:54:52:1a:1e:74: 99:83:a1:01:ad:b2:d8:5e:1d:99:61:a6:d5:d0:d2:a8: d7:c1:7b:c5:87:8b:80:42:59:16:78:38:1c:a2:17:7a: 3f:5d:5c:cf:4a:9e:81:5c:11:4e:85:32:71:69:f3:bc: af:bb:82:14:c1:c5:cc:99:38:0c:f0:17:87:3f:87:f2: 69:95:9e:f8:41:eb:48:5a:4a:18:3c:57:4d:f9:3e:f7: 3f:7c:79:80:25:24:f6:31:e6:4a:e0:b8:44:6a:a9:35: 05:07:27:35:43:fd:1b:52:7f:30:9a:a8:4b:1e:f5:84: 0b:e2:a2:1a:1d:fe:34:17:1e:9d:20:0f:48:66:a4:36: d1:50:37:12:b3:02:b2:a2:c8:55:b6:bc:54:4c:8c:97: 69:a0:fd:11:f3:ad:53:9a:58:5d:70:10:89:84:17:ed: c3:8d:0d:df:22:55:1b:11:3a:03:c4:c7:51:17:84:07: 40:45:f6:46:3c:1e:22:fa:d2:b5:42:f3:a1:fb:b4:40: 22:23:15:f9:43:46:68:a8:16:5e:c9:96:79:08:e2:fc: 30:2c:33:6f:e8:f0:57:87:ff:fb:68:fe:50:9d:1d:5b: b3:a2:a6:6f:5d:c7:8d:d7:84:a9:49:84:ea:21:cf:7f Fingerprint (SHA-256): 14:25:9E:29:86:57:D8:33:1E:F7:6F:13:BC:2B:7B:E0:BF:AD:90:2A:34:21:24:71:DF:BA:6A:1B:23:62:18:33 Fingerprint (SHA1): EA:EF:3D:F1:59:9C:B9:A6:3E:0C:D8:D0:19:87:56:B2:37:CA:56:92 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #13990: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195612 (0x13bda4dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Mar 31 20:02:56 2017 Not After : Thu Mar 31 20:02:56 2067 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c8:e5:cb:5e:74:07:6d:ea:78:14:37:92:04:3c:c3: 08:aa:59:50:fb:a5:ec:74:15:db:38:3c:30:63:7f:70: 63:ce:2c:ab:81:d2:ce:aa:04:8a:56:12:fb:94:ef:e4: 81:2f:33:bd:ca:45:5d:fd:da:df:bd:8d:23:17:e2:f6: 23:63:11:95:75:79:f2:35:ce:10:29:87:2e:24:09:ac: c1:db:23:9b:58:61:9a:c9:14:f5:3c:6f:ea:f5:5b:fe: e6:0b:82:a3:ea:dc:82:b6:19:e5:19:1a:a9:97:cb:73: b8:07:5d:ac:31:2b:03:1d:d6:c1:3c:ff:e2:b3:79:24: c0:b2:73:27:b3:95:ce:6f:7c:17:26:5d:5b:bd:88:b6: 66:f9:ae:37:cc:48:bf:23:45:13:33:28:0f:1d:12:47: f3:85:3c:6b:3e:8f:23:fa:72:c3:3c:43:34:16:4c:a3: e9:98:3d:94:f5:0b:86:4b:2d:e5:7d:03:3a:45:4b:35: c2:17:d4:3f:60:f5:2f:35:f6:cc:f2:30:99:3e:61:26: 9a:ee:3f:18:58:6a:2a:3c:bc:1e:0b:c6:9a:53:8a:6c: 09:2a:12:11:73:ad:07:2f:d5:90:22:57:7c:59:95:97: 1b:ff:bc:48:bd:6d:84:75:1f:1f:51:22:cb:0c:36:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:29:26:af:f4:3b:71:af:b3:e4:ea:ab:08:80:0f:1e: fc:20:03:0f:9d:d3:b9:eb:82:83:0b:4e:06:30:93:9d: 13:57:55:8f:3b:a4:39:c3:d3:d5:b9:4f:35:9d:c8:eb: a0:6f:f3:c1:4a:ff:24:20:78:4d:1b:54:94:b7:75:ea: 00:1e:0a:f2:71:43:ee:62:37:76:14:c9:61:dc:c8:0e: 5c:d1:91:51:26:a9:96:56:f0:b7:df:79:10:1a:bd:00: 76:05:74:33:56:3d:c6:03:e4:a6:db:14:0e:25:6e:e2: 89:fe:1f:d1:bf:5b:ec:05:12:28:80:cc:6e:52:fb:b0: cf:d7:f4:21:fa:28:c4:16:3f:22:e2:29:7f:cf:a3:a1: d3:b9:87:45:8a:93:5c:21:7b:17:9c:d8:ad:b0:f9:04: 51:32:f1:bf:4e:1e:f2:14:7d:6c:49:6b:f4:1d:9b:c4: a0:37:0d:9e:c2:cc:d3:f9:22:45:18:7c:0e:a8:3d:37: 96:1e:e1:5a:16:72:15:ef:21:3f:b9:2e:ae:20:24:97: 2b:a3:20:b6:0d:9a:41:09:b6:9c:fc:12:e2:4f:b6:5f: 24:ff:c2:da:82:78:3a:b6:ab:8b:9f:a6:f5:e0:ed:34: 15:11:a8:ba:76:4d:94:b6:06:9d:d6:9e:01:a8:9c:d9 Fingerprint (SHA-256): 60:29:A2:E4:24:CE:0C:B7:C2:0F:C2:40:C7:04:47:27:CB:D7:66:95:F1:BB:B9:07:B0:0F:2E:64:75:97:18:CA Fingerprint (SHA1): 10:CC:2A:5B:1C:BE:1E:4B:6B:D6:6D:31:DD:40:2C:DB:9A:41:2B:2F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #13991: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195613 (0x13bda4dd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Mar 31 20:03:12 2017 Not After : Thu Mar 31 20:03:12 2067 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:7f:da:e7:6c:f6:ff:91:31:d6:2f:ae:ed:04:75:e1: 5b:88:7c:b3:88:bd:42:43:23:2c:b7:8e:3b:1f:cd:ed: 43:04:46:24:84:74:62:3f:aa:c0:8a:05:d9:ff:80:69: 09:3c:53:31:d7:ae:28:39:63:d6:0a:61:66:f6:82:bb: 8a:4a:11:79:58:b9:34:39:16:79:5c:65:de:a7:f3:6d: 7c:40:b5:17:8a:1f:02:34:90:36:56:14:b2:ee:a2:54: 7d:24:2b:c6:d8:55:e4:37:43:46:a6:74:85:9a:59:11: 35:1e:6a:88:76:fa:ee:6c:92:67:57:dc:a6:97:e1:80: 30:b7:81:02:bd:ed:5d:b0:c8:2c:b1:bb:02:ba:6f:d8: d0:97:d2:34:39:d5:88:68:15:39:78:9b:50:96:60:a9: 06:59:00:e5:ee:1f:b7:9b:6e:18:e4:25:5b:d6:cb:41: 4f:7f:f2:01:1e:0b:86:9a:01:93:98:e6:5a:80:83:3b: 91:2f:9f:f6:d1:3e:44:29:eb:f4:55:9c:84:0b:37:f3: 2f:21:7f:d6:64:a1:a1:dd:73:f2:e0:cb:e2:ad:9f:7d: eb:1e:7a:5b:19:15:17:ff:2d:71:2d:49:47:48:ed:48: db:41:36:7f:d7:42:d3:a4:02:46:90:f5:9c:72:96:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3b:c1:f7:f7:27:06:05:71:75:e0:2b:53:63:31:82:31: 87:f0:10:23:e6:41:b8:8d:06:08:b3:24:bc:c3:95:80: fb:19:66:3c:4c:b5:34:39:0d:a1:20:6c:0a:e7:29:ac: fa:b2:76:ca:e4:06:b4:bd:32:03:49:56:b5:3d:16:93: f7:ff:74:31:a7:d1:c7:4d:95:6f:2f:b7:d9:e6:64:bf: bb:93:67:7f:40:c1:27:23:81:33:bc:1c:e6:32:5b:0d: 03:ef:f3:dd:fa:f8:ba:75:c1:31:c8:f4:4e:5b:35:d3: 68:78:67:7b:59:9a:16:77:c6:ff:5d:36:96:b4:28:10: 7d:ea:86:60:12:00:a4:fc:43:b4:b1:bb:74:e0:45:43: 7c:15:d2:15:e4:d8:4d:d6:a1:ac:7a:f1:9d:8b:20:7c: 70:f1:31:be:13:1e:04:f8:5a:ee:4a:4c:f2:9c:55:58: b5:5b:da:e3:84:97:60:d3:09:bb:63:36:cd:c2:72:e5: 39:8c:3a:fd:d4:bc:80:e8:3f:c0:dc:c1:5d:99:6f:0d: 04:4b:81:ca:08:bc:aa:f1:e6:af:87:87:31:02:af:11: 80:3d:ad:bb:34:14:e8:65:97:14:f4:48:b8:4f:b3:7a: 57:e5:5b:61:de:34:de:3c:45:6b:1e:50:d8:c5:4f:d5 Fingerprint (SHA-256): 8A:D4:03:3F:32:46:71:D1:83:0E:F7:2B:11:B9:D0:AB:15:E3:46:DD:A2:95:F9:A2:88:8F:1E:3D:F7:F1:59:2E Fingerprint (SHA1): E1:54:10:EA:59:E6:15:96:17:10:07:E9:1F:02:62:47:1F:57:5B:82 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #13992: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195614 (0x13bda4de) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Mar 31 20:03:26 2017 Not After : Thu Mar 31 20:03:26 2067 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:fc:e0:a3:2b:84:35:7a:00:4f:35:cb:46:16:33:20: 7c:42:04:0e:92:b0:4e:2e:b8:82:85:3a:a1:ce:f2:41: fb:50:8f:1f:da:24:e2:02:d3:13:fd:7b:4b:ec:f4:bf: 0e:11:cb:a3:bd:9f:f7:23:87:0a:71:55:0a:59:b4:4b: 1c:7e:f9:f6:5d:2b:11:b2:bb:43:89:31:e9:73:f8:05: 07:e7:5b:36:2f:34:39:05:42:fd:ed:7b:d2:27:b9:73: 05:be:84:2a:77:2f:e8:71:9e:06:13:25:2e:54:5b:f9: a4:cc:4c:87:0b:39:f3:84:f7:99:0e:9b:86:11:cf:36: ca:fb:24:c0:83:89:27:e8:a0:11:90:b5:f8:19:7e:40: 5e:b4:e2:52:6e:e4:57:78:a9:11:74:15:1d:4a:c6:65: 7e:d4:cb:86:5e:b2:61:82:02:e0:3d:50:8d:16:3c:58: 6a:b0:7f:9d:1e:c3:50:e9:74:f2:c2:52:4c:38:c1:23: d9:31:ea:f1:ca:7f:a9:40:cf:ed:65:86:dc:5c:5c:02: 0b:bb:3b:36:58:e0:86:88:40:e6:74:91:d2:e1:2f:3c: e8:3e:10:8d:7a:c8:ae:cb:ad:5b:c2:08:b0:c4:51:9b: 93:1e:15:17:24:ee:24:ec:24:d2:e9:a0:af:fa:04:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:91:22:f3:76:87:6a:6d:30:da:38:bb:65:90:a2:0b: 23:6b:80:99:a9:31:9e:e3:39:ca:76:20:cd:58:bc:b0: c3:7c:63:3e:14:f6:45:e2:0a:2f:fa:3b:82:e1:88:89: f9:78:41:cf:39:7a:dd:22:47:03:b1:51:36:80:44:39: 02:8a:45:8d:c4:82:f5:80:b2:5d:73:3c:61:bc:42:f9: 85:7f:e9:4e:ae:b3:8d:75:1a:76:d8:f3:c4:51:c7:32: 5a:34:a6:b4:76:b8:6a:09:78:46:95:d8:42:e9:ab:48: 17:53:3b:52:23:b6:d0:a0:e1:03:6f:13:4f:07:ee:d7: e0:a9:3b:06:d1:ad:45:86:d4:87:ab:a1:9d:07:b2:a8: 12:97:1d:f1:7f:ef:0a:7f:08:8b:ea:b8:fc:4e:d8:c1: 76:a2:f1:40:b6:5e:22:92:54:1c:df:64:de:68:83:e7: 99:07:38:e0:b4:af:f2:d8:22:47:ce:bd:de:83:c8:12: 14:0b:b4:10:08:04:0f:a7:d8:94:b4:18:af:6f:58:77: df:e2:0e:ec:30:9c:65:69:45:3c:84:9f:9f:d9:13:65: 8b:02:9d:50:06:9b:9c:ed:f8:24:67:af:b4:b3:82:44: 2b:09:85:c3:f9:07:86:44:05:95:2f:c3:e8:36:d8:b9 Fingerprint (SHA-256): CD:2E:08:3B:70:0B:A4:93:AD:82:F8:3C:A2:E3:A4:91:07:0F:6F:10:B0:7B:BE:A3:37:62:C9:22:FB:0B:94:5F Fingerprint (SHA1): 8C:86:C8:A3:D6:44:25:71:ED:BD:8F:98:30:99:58:EE:50:E5:BC:F6 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #13993: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195615 (0x13bda4df) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Mar 31 20:03:41 2017 Not After : Thu Mar 31 20:03:41 2067 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:4f:15:3f:24:6a:65:a5:5f:d0:9f:1c:39:dd:15:ab: 2f:99:52:d5:a0:5d:18:75:86:aa:d8:92:33:be:5f:5d: 5c:6d:2a:df:d0:bf:8c:e1:87:e1:a7:b6:92:2a:cd:ee: ea:f3:85:c5:83:aa:fb:49:eb:4b:31:6f:24:9a:e5:dd: 9a:cb:73:9d:8f:99:9a:c0:5e:14:b8:4f:5a:41:4d:f7: 3a:db:97:b3:13:4f:8a:9d:28:d9:18:78:32:5c:00:d0: 3c:db:34:f7:79:97:6d:fc:04:c0:43:7d:18:7b:8c:04: 04:60:b6:68:17:28:ef:cf:0e:44:23:d5:a0:3c:1d:16: 46:85:d5:d4:c1:a1:c8:81:b3:7c:a1:b2:cd:6e:33:d6: c7:14:5c:0c:2f:79:1d:c2:57:53:00:4a:3a:e0:ee:cc: 23:28:ef:2e:31:91:ae:5e:3c:34:0b:fc:8f:58:72:33: 05:8f:36:ec:8b:18:ae:a5:79:16:b7:92:00:64:82:ab: ab:36:b2:73:99:ef:4c:af:5f:47:20:99:6a:68:d8:aa: d6:86:ed:e7:25:3f:99:34:ad:da:f5:36:3c:ee:0e:3f: eb:f4:ed:40:f7:4c:ee:52:62:f4:04:20:ea:80:38:6a: 16:7a:cb:03:8c:d4:eb:85:5d:f4:b7:af:6f:3d:e2:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:62:1f:6e:c2:39:a4:2c:26:d4:64:33:c5:79:9e:d9: 25:aa:f6:cf:e7:94:27:16:d2:bd:dd:50:ee:39:6f:ae: 5f:f7:77:84:ef:18:99:62:4a:7f:a7:2c:fb:c2:2b:e1: 5b:16:3c:43:2a:0b:20:36:ca:fb:ec:26:8f:09:a7:e5: 3e:a7:ff:67:1b:ea:89:96:5e:d8:99:b6:4e:86:15:ef: 9d:d3:d3:f6:33:d8:a0:62:30:2d:b3:f0:38:c0:18:b5: 74:f6:26:ba:ee:6a:88:5b:06:dd:9f:bb:57:7e:98:e5: 4b:75:22:4a:ff:4b:e9:2c:b7:eb:aa:bf:1e:5d:f4:b4: 16:d0:51:cf:e9:10:fd:f8:43:76:ee:f9:ef:c6:f3:b5: 47:d4:24:04:88:b8:68:0e:58:ba:56:90:77:da:8a:3d: 2d:09:0c:53:f5:cc:d2:02:c0:af:50:1a:e2:65:2e:76: ae:bf:c6:4f:a4:a6:77:5b:5d:7b:0b:ca:b0:a4:8c:11: 97:cb:42:c0:90:02:1d:e8:da:2b:22:e3:d0:6a:3a:0f: 5b:92:b8:e7:17:4d:2d:71:63:99:da:98:27:6a:b2:22: 9f:d6:e4:df:78:d1:27:d8:a0:e0:89:62:2b:43:7a:24: a4:ad:34:7e:2e:19:cf:ff:90:65:86:2c:9d:5e:93:a2 Fingerprint (SHA-256): 48:D9:47:FE:B9:8B:95:D1:F1:94:7B:06:F9:04:83:02:83:4E:7B:4C:A3:07:63:E9:39:DF:7F:D9:05:95:FC:9F Fingerprint (SHA1): 6C:F7:C4:69:39:3E:5A:D8:6C:90:F6:59:00:CB:2C:68:87:57:97:D5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #13994: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195616 (0x13bda4e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Mar 31 20:04:17 2017 Not After : Thu Mar 31 20:04:17 2067 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:72:f6:bc:cf:a1:21:02:f3:d1:44:8e:92:ee:ba:8f: cb:3e:45:ac:7b:8e:1a:85:a6:64:e0:9a:11:29:a4:db: 21:ea:64:83:b0:9f:67:ef:6c:a6:e5:41:35:ea:f6:c6: 40:4f:18:1e:17:a4:61:fb:b3:99:eb:da:6f:2d:ac:ba: 1d:5c:b8:f5:7f:52:e4:2a:c9:8b:26:30:5c:18:ae:14: 19:68:a6:d9:33:18:bc:22:8e:8a:15:7c:02:27:b8:f9: 3d:42:28:99:36:b0:d7:09:4e:a8:5e:f5:f6:1d:af:74: d6:23:9e:8a:9a:30:58:44:42:aa:8e:b0:44:f9:d0:01: 6b:e4:f6:bc:44:89:36:95:14:bb:25:91:7b:83:e8:a0: 18:37:d5:47:d2:d6:02:a8:61:33:bc:88:e0:b5:1a:00: 65:f7:96:c5:f5:bd:28:d8:0c:c2:7a:ea:97:d8:77:8e: f7:fa:3e:ff:f9:a7:14:24:06:ef:68:c8:eb:9c:52:99: 4e:48:b2:a6:55:2b:6e:1b:77:04:c2:42:9b:7f:3d:09: 81:35:61:71:d0:dc:9f:6d:c9:13:65:ba:f6:e4:9c:5c: d4:20:7c:50:fd:cb:d3:76:64:06:a4:77:69:40:9e:45: 52:f8:9e:56:ea:53:e4:eb:c4:91:dc:b2:df:48:93:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:a9:f7:d2:fc:0d:13:aa:e5:a3:c3:20:ad:ae:d8:2b: f4:7b:8e:89:8c:21:af:89:dc:1b:d2:0a:0e:8d:4a:d5: 64:13:61:75:47:19:38:21:b3:c0:08:2c:f4:7a:73:87: 6e:f9:c6:4b:0a:96:e3:54:51:37:c3:a8:dd:9e:8a:7a: 2e:cd:80:21:77:29:52:3b:e0:4c:b1:cc:08:76:77:8a: c5:a1:17:7f:63:68:8d:52:fb:d2:f9:02:6d:d6:f7:ba: 8b:72:81:fd:22:bd:4e:76:83:70:6a:9f:16:46:e4:2e: 00:cc:90:14:28:d6:4d:6c:b1:25:27:9f:a7:d2:11:1e: cf:b4:1b:dd:02:3b:db:78:40:20:e4:cc:11:bf:3c:ed: 64:50:84:da:5d:0f:e5:6b:5d:10:56:0c:8c:04:56:2a: 8f:8b:96:e0:ae:a5:51:1e:28:80:c5:8d:62:9b:ef:78: 41:a3:ab:56:f7:fb:2a:bb:c6:8d:c7:2b:2c:fc:1e:47: 3f:32:74:93:b3:d8:2c:b8:ad:b7:93:04:3e:3f:b0:fb: 64:d7:36:33:2e:5b:92:e4:cb:8f:46:ef:a7:97:f1:2b: fb:54:3c:cd:97:db:df:86:62:70:13:9c:da:67:e7:ed: 87:54:d5:54:91:4c:d5:52:92:0b:f4:3f:93:72:40:ca Fingerprint (SHA-256): C6:1A:67:F6:B9:6A:79:45:BE:AC:B2:88:AB:AF:EA:14:80:FF:25:59:94:4F:5A:9C:A4:22:F8:3C:00:3A:A0:3F Fingerprint (SHA1): 97:FB:F5:A8:4D:27:62:55:BF:0A:9D:61:DA:85:75:AE:45:2B:4B:F4 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #13995: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #13996: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195631 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13997: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #13998: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13999: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14000: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331195632 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14001: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14002: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14003: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14004: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331195633 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14005: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14006: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #14007: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14008: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 331195634 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14009: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14010: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14011: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195631 (0x13bda4ef) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:05:58 2017 Not After : Thu Mar 31 20:05:58 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:58:e7:45:73:46:89:55:b7:e8:1e:9f:74:7d:8f:45: 12:98:43:8f:f6:f2:56:91:60:19:09:dd:d1:1d:e6:bf: 97:66:6f:ec:1b:c0:df:ae:83:fc:f3:13:7f:38:c7:fe: 21:d4:60:3e:66:7d:18:71:7d:1b:40:87:d9:33:65:bf: 04:3b:ee:ca:b4:03:8b:ae:32:4c:68:ef:f5:57:86:08: 67:f8:29:5e:f2:a7:6b:fe:92:18:c1:e3:d5:6d:03:42: 4d:86:98:d7:ed:9e:31:20:6f:7f:e4:5a:4a:72:40:bf: 07:bd:14:cd:24:3a:c9:4d:9d:d8:bf:cc:47:3e:c5:5d: da:ef:8e:a1:23:16:fd:35:db:4d:66:cb:ca:8c:07:bd: d0:41:9d:4e:40:5d:20:ed:49:d1:e4:bc:9d:f9:46:dc: 77:b7:79:77:75:db:c3:89:3e:0c:ca:91:84:7c:af:8c: 09:1f:0b:d8:e7:0f:2f:6f:56:0e:85:bd:45:f4:2d:87: a2:aa:b2:73:4e:84:18:3f:0e:10:18:57:2f:e2:af:40: bc:6e:fd:57:a0:8a:01:02:12:13:58:ad:4d:21:fe:75: 7d:9b:62:80:a5:25:9b:43:1d:87:88:60:44:e8:f9:0b: 2c:80:91:95:ef:e8:76:c8:f8:32:d7:e3:c1:b5:ac:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:8f:52:48:c6:ca:4b:e5:4d:e7:da:50:0b:44:f6:08: 63:ab:3e:7e:27:0b:e9:a2:f7:27:71:1d:7f:88:5c:7d: 4c:e6:98:aa:d7:59:61:f3:9e:e4:45:17:ab:c1:31:85: ba:da:aa:0f:8e:70:27:a1:43:d2:64:b2:37:9d:b2:f6: ef:bd:8e:be:b3:92:06:bc:ae:6b:f1:77:c7:4a:f2:6a: ba:9f:e3:b1:90:1f:58:3c:31:df:7d:87:67:15:e0:e2: 2a:11:79:6d:59:23:27:6d:00:c9:6d:9c:bf:f1:f2:41: 70:c5:cb:09:42:69:3c:52:e4:38:ee:99:cd:ad:fe:ba: 7b:3a:78:30:ab:33:71:53:73:5b:b1:29:79:54:e1:15: 92:63:6a:b9:f2:37:51:c8:63:70:a6:ab:ad:5e:b1:30: 82:b9:dd:8c:e9:16:ec:02:dc:d3:a3:61:7a:5f:58:db: 91:fc:3d:f4:64:89:64:7c:8f:d3:56:67:ce:01:31:d2: 6f:1b:f7:db:76:1b:ac:cd:7b:7b:c0:50:10:7d:fb:34: 87:19:5a:3e:d7:0c:8e:09:a9:54:76:cd:33:26:8e:e3: b4:d2:c0:8f:27:6c:6d:7c:67:44:33:c2:ce:85:7a:f2: 53:b0:91:c1:35:f0:2b:54:07:a3:f8:98:b7:74:62:b8 Fingerprint (SHA-256): 99:DD:99:12:99:E9:77:A0:38:21:24:32:28:3D:6B:9E:F3:39:AB:F3:FB:00:F2:7B:53:14:79:97:8F:7A:4A:A4 Fingerprint (SHA1): 44:E1:5E:AF:63:1F:06:DD:3A:6D:1C:E3:38:95:C2:A7:BF:F9:A4:D8 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14012: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14013: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195632 (0x13bda4f0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:06:11 2017 Not After : Thu Mar 31 20:06:11 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:6b:dd:77:1c:8d:64:84:3b:84:7f:73:60:1c:8d:08: 3f:ba:07:48:e0:f8:b5:da:58:68:6e:c9:51:18:17:60: a6:ce:9e:60:04:02:a7:69:cf:33:af:a1:c1:15:e8:57: b6:d5:d2:be:fc:e9:ab:e8:da:1f:d0:5b:90:e4:12:19: 96:74:c6:ee:2d:34:f8:2d:ee:64:98:cf:43:34:e1:b7: 0b:01:33:d8:d3:44:f0:f9:fd:23:2d:62:f6:4b:99:41: 04:bd:f9:0c:bd:4d:ce:2d:4b:9b:b9:8f:16:27:e0:c8: 3b:35:2b:db:bf:3e:9e:3e:f8:38:f3:1b:05:ff:0d:cf: b9:c6:66:63:15:cb:c1:1d:64:99:ad:94:50:7d:ce:36: d8:48:a6:f9:b8:1e:5e:45:4a:d1:bf:cc:51:93:91:f4: 81:81:20:62:71:ea:04:7f:5f:54:06:22:14:43:c2:01: 9e:22:c7:e9:3f:d0:19:45:dd:df:b2:16:8f:4b:47:1d: d4:55:ad:51:35:f4:32:05:ef:62:ed:0b:5b:82:75:8a: 8f:27:8e:64:20:68:39:82:eb:cc:a9:64:89:69:fa:f0: f6:cd:64:c9:22:d4:92:88:bf:a3:62:e9:98:b9:c9:83: c4:02:68:4d:09:bc:48:f9:a8:bd:7f:8e:b1:14:15:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:7a:85:1d:d8:85:8d:01:8f:30:6d:ec:e3:f1:ea:e9: 8d:c4:41:39:48:f5:4c:13:74:bf:be:18:d4:4c:21:2b: 79:1f:9a:44:c1:f5:86:63:70:52:6f:82:c5:5f:6a:cc: a7:f7:b4:19:83:4e:7c:cd:9c:49:ff:9b:ef:ab:09:6e: 72:34:00:5e:ac:9f:75:18:b9:5e:50:f5:69:80:cf:fb: 7f:41:2a:e4:01:20:72:c6:41:b2:b4:aa:70:5d:4c:68: 1c:c2:cc:15:c1:4b:a5:d9:51:9e:2d:1f:41:4e:5f:25: 6f:5d:37:52:2c:26:cf:0b:17:54:0a:0a:be:8f:ee:6a: 3a:14:90:63:ae:c6:ae:e7:9d:fd:79:ee:ba:54:39:55: 32:f8:c2:ba:37:1d:5e:ff:49:ac:e3:b0:19:c0:33:b6: 0b:72:d6:15:d1:de:e0:6c:13:a7:ba:95:07:9a:e6:95: dd:50:a1:94:60:6f:c3:72:9d:30:af:af:95:41:07:c4: 66:47:c8:63:59:cf:39:71:5f:39:d1:12:ac:c3:85:25: c9:26:d2:65:e7:68:7e:ac:36:01:4f:88:42:16:62:8b: 97:e9:33:cd:a3:6f:e2:fd:a7:13:e0:2a:99:ac:b3:dc: f9:25:d7:10:80:e0:0e:a2:4a:6b:8e:2c:15:73:8d:43 Fingerprint (SHA-256): 19:5C:AE:80:1E:F4:B6:31:DE:26:73:9F:02:BF:34:8D:39:7F:71:E5:F4:A0:D4:CD:E9:98:B9:A5:E5:A2:BB:69 Fingerprint (SHA1): E8:57:C6:97:C6:A4:3E:57:1F:30:15:BB:81:7C:28:D7:F4:CA:22:B8 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14014: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14015: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195633 (0x13bda4f1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 20:06:18 2017 Not After : Thu Mar 31 20:06:18 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:3f:02:1a:10:41:4a:c9:c4:0a:8b:3d:32:8b:53:f9: 75:a0:17:99:47:91:25:71:46:ef:29:74:48:27:f7:39: c3:1a:85:c2:83:7c:7c:bb:b1:71:33:4d:23:3c:27:6f: a3:d5:9a:58:b9:5e:7f:b8:a8:e0:f7:04:d5:8e:01:78: a7:2a:cb:df:6a:54:6f:a7:4a:fa:5b:bc:63:6a:81:e8: a9:7a:80:06:e9:d5:47:7d:e0:8f:1d:6b:fa:df:06:3d: d3:2a:13:33:d2:fa:c3:cb:cb:13:a3:ba:49:7d:18:c3: 95:98:d2:8f:30:2c:78:f8:6d:54:17:97:a5:5d:c8:b2: e8:91:07:d5:66:f1:8c:d4:76:b4:e3:18:a0:9d:b3:2c: a4:df:ed:22:2a:9f:b2:78:9c:8e:96:7a:85:e1:72:5d: 86:c5:d6:01:59:b7:d9:56:57:49:64:da:a6:6c:c4:d1: 1a:58:e9:4d:fe:06:d3:22:74:90:6b:7d:8b:6c:be:90: 00:c8:de:dc:b0:bf:cd:ab:aa:4d:ba:4d:c8:15:a6:95: 51:be:be:88:2c:ff:25:96:6c:d3:10:c5:d2:d6:5d:e7: c3:94:c7:c7:24:05:91:00:7f:ee:d2:87:b8:d6:2e:57: 73:3e:a3:92:d7:b6:37:60:75:05:df:66:c6:97:4f:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:c5:c2:c8:47:be:32:ab:c7:ca:e2:ce:78:0b:4c:4f: dc:e3:17:04:50:34:e9:9a:50:ee:b0:68:7f:76:b8:8b: e7:53:e1:d3:9f:2f:98:7e:e1:a4:26:d9:05:cb:4d:ea: 66:70:9e:cb:3f:2a:51:b0:0a:b0:da:79:79:5d:7a:91: 0d:ff:62:8d:39:7d:91:e3:27:2e:da:49:74:62:0d:68: b3:72:4a:41:ca:e9:16:5e:6e:84:47:49:4b:c3:79:d3: bf:10:8c:3e:c2:60:df:66:d9:4c:23:2a:c1:1b:ff:01: bb:a1:98:26:a9:ab:90:d2:27:6d:fb:8a:6f:30:3e:50: bc:4f:5f:6a:2f:90:be:2f:13:db:cc:74:46:93:44:96: ab:6d:18:d0:51:3b:09:ab:57:d2:b5:bc:82:c4:b6:b7: 42:70:ca:43:dd:75:94:a9:97:d8:72:bc:1f:7d:fb:b8: 24:3f:c6:bd:be:64:61:7c:7b:e7:4d:d4:8d:09:1d:ec: 01:90:e0:9c:c3:0b:8a:e3:75:3d:8d:00:3b:db:4d:2b: b6:14:45:07:e1:83:36:4f:ea:31:7b:5a:7f:e3:5b:64: bf:7f:d6:14:ee:f5:5a:79:2e:ee:79:65:bf:fd:99:38: 39:c1:30:10:43:a4:b4:0b:a8:24:a5:24:5a:e7:0d:d2 Fingerprint (SHA-256): C2:B0:B7:05:48:4C:A6:88:F3:1A:19:70:76:72:CB:FC:42:56:89:16:B6:1E:02:BA:5F:CC:E4:91:45:A2:A0:58 Fingerprint (SHA1): C6:E0:65:1B:69:12:52:38:36:E0:54:74:ED:D2:BC:AE:C0:3F:38:22 Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #14016: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14017: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #14018: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #14019: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #14020: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195631 (0x13bda4ef) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:05:58 2017 Not After : Thu Mar 31 20:05:58 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:58:e7:45:73:46:89:55:b7:e8:1e:9f:74:7d:8f:45: 12:98:43:8f:f6:f2:56:91:60:19:09:dd:d1:1d:e6:bf: 97:66:6f:ec:1b:c0:df:ae:83:fc:f3:13:7f:38:c7:fe: 21:d4:60:3e:66:7d:18:71:7d:1b:40:87:d9:33:65:bf: 04:3b:ee:ca:b4:03:8b:ae:32:4c:68:ef:f5:57:86:08: 67:f8:29:5e:f2:a7:6b:fe:92:18:c1:e3:d5:6d:03:42: 4d:86:98:d7:ed:9e:31:20:6f:7f:e4:5a:4a:72:40:bf: 07:bd:14:cd:24:3a:c9:4d:9d:d8:bf:cc:47:3e:c5:5d: da:ef:8e:a1:23:16:fd:35:db:4d:66:cb:ca:8c:07:bd: d0:41:9d:4e:40:5d:20:ed:49:d1:e4:bc:9d:f9:46:dc: 77:b7:79:77:75:db:c3:89:3e:0c:ca:91:84:7c:af:8c: 09:1f:0b:d8:e7:0f:2f:6f:56:0e:85:bd:45:f4:2d:87: a2:aa:b2:73:4e:84:18:3f:0e:10:18:57:2f:e2:af:40: bc:6e:fd:57:a0:8a:01:02:12:13:58:ad:4d:21:fe:75: 7d:9b:62:80:a5:25:9b:43:1d:87:88:60:44:e8:f9:0b: 2c:80:91:95:ef:e8:76:c8:f8:32:d7:e3:c1:b5:ac:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:8f:52:48:c6:ca:4b:e5:4d:e7:da:50:0b:44:f6:08: 63:ab:3e:7e:27:0b:e9:a2:f7:27:71:1d:7f:88:5c:7d: 4c:e6:98:aa:d7:59:61:f3:9e:e4:45:17:ab:c1:31:85: ba:da:aa:0f:8e:70:27:a1:43:d2:64:b2:37:9d:b2:f6: ef:bd:8e:be:b3:92:06:bc:ae:6b:f1:77:c7:4a:f2:6a: ba:9f:e3:b1:90:1f:58:3c:31:df:7d:87:67:15:e0:e2: 2a:11:79:6d:59:23:27:6d:00:c9:6d:9c:bf:f1:f2:41: 70:c5:cb:09:42:69:3c:52:e4:38:ee:99:cd:ad:fe:ba: 7b:3a:78:30:ab:33:71:53:73:5b:b1:29:79:54:e1:15: 92:63:6a:b9:f2:37:51:c8:63:70:a6:ab:ad:5e:b1:30: 82:b9:dd:8c:e9:16:ec:02:dc:d3:a3:61:7a:5f:58:db: 91:fc:3d:f4:64:89:64:7c:8f:d3:56:67:ce:01:31:d2: 6f:1b:f7:db:76:1b:ac:cd:7b:7b:c0:50:10:7d:fb:34: 87:19:5a:3e:d7:0c:8e:09:a9:54:76:cd:33:26:8e:e3: b4:d2:c0:8f:27:6c:6d:7c:67:44:33:c2:ce:85:7a:f2: 53:b0:91:c1:35:f0:2b:54:07:a3:f8:98:b7:74:62:b8 Fingerprint (SHA-256): 99:DD:99:12:99:E9:77:A0:38:21:24:32:28:3D:6B:9E:F3:39:AB:F3:FB:00:F2:7B:53:14:79:97:8F:7A:4A:A4 Fingerprint (SHA1): 44:E1:5E:AF:63:1F:06:DD:3A:6D:1C:E3:38:95:C2:A7:BF:F9:A4:D8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14021: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14022: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195632 (0x13bda4f0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:06:11 2017 Not After : Thu Mar 31 20:06:11 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:6b:dd:77:1c:8d:64:84:3b:84:7f:73:60:1c:8d:08: 3f:ba:07:48:e0:f8:b5:da:58:68:6e:c9:51:18:17:60: a6:ce:9e:60:04:02:a7:69:cf:33:af:a1:c1:15:e8:57: b6:d5:d2:be:fc:e9:ab:e8:da:1f:d0:5b:90:e4:12:19: 96:74:c6:ee:2d:34:f8:2d:ee:64:98:cf:43:34:e1:b7: 0b:01:33:d8:d3:44:f0:f9:fd:23:2d:62:f6:4b:99:41: 04:bd:f9:0c:bd:4d:ce:2d:4b:9b:b9:8f:16:27:e0:c8: 3b:35:2b:db:bf:3e:9e:3e:f8:38:f3:1b:05:ff:0d:cf: b9:c6:66:63:15:cb:c1:1d:64:99:ad:94:50:7d:ce:36: d8:48:a6:f9:b8:1e:5e:45:4a:d1:bf:cc:51:93:91:f4: 81:81:20:62:71:ea:04:7f:5f:54:06:22:14:43:c2:01: 9e:22:c7:e9:3f:d0:19:45:dd:df:b2:16:8f:4b:47:1d: d4:55:ad:51:35:f4:32:05:ef:62:ed:0b:5b:82:75:8a: 8f:27:8e:64:20:68:39:82:eb:cc:a9:64:89:69:fa:f0: f6:cd:64:c9:22:d4:92:88:bf:a3:62:e9:98:b9:c9:83: c4:02:68:4d:09:bc:48:f9:a8:bd:7f:8e:b1:14:15:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:7a:85:1d:d8:85:8d:01:8f:30:6d:ec:e3:f1:ea:e9: 8d:c4:41:39:48:f5:4c:13:74:bf:be:18:d4:4c:21:2b: 79:1f:9a:44:c1:f5:86:63:70:52:6f:82:c5:5f:6a:cc: a7:f7:b4:19:83:4e:7c:cd:9c:49:ff:9b:ef:ab:09:6e: 72:34:00:5e:ac:9f:75:18:b9:5e:50:f5:69:80:cf:fb: 7f:41:2a:e4:01:20:72:c6:41:b2:b4:aa:70:5d:4c:68: 1c:c2:cc:15:c1:4b:a5:d9:51:9e:2d:1f:41:4e:5f:25: 6f:5d:37:52:2c:26:cf:0b:17:54:0a:0a:be:8f:ee:6a: 3a:14:90:63:ae:c6:ae:e7:9d:fd:79:ee:ba:54:39:55: 32:f8:c2:ba:37:1d:5e:ff:49:ac:e3:b0:19:c0:33:b6: 0b:72:d6:15:d1:de:e0:6c:13:a7:ba:95:07:9a:e6:95: dd:50:a1:94:60:6f:c3:72:9d:30:af:af:95:41:07:c4: 66:47:c8:63:59:cf:39:71:5f:39:d1:12:ac:c3:85:25: c9:26:d2:65:e7:68:7e:ac:36:01:4f:88:42:16:62:8b: 97:e9:33:cd:a3:6f:e2:fd:a7:13:e0:2a:99:ac:b3:dc: f9:25:d7:10:80:e0:0e:a2:4a:6b:8e:2c:15:73:8d:43 Fingerprint (SHA-256): 19:5C:AE:80:1E:F4:B6:31:DE:26:73:9F:02:BF:34:8D:39:7F:71:E5:F4:A0:D4:CD:E9:98:B9:A5:E5:A2:BB:69 Fingerprint (SHA1): E8:57:C6:97:C6:A4:3E:57:1F:30:15:BB:81:7C:28:D7:F4:CA:22:B8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14023: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14024: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195633 (0x13bda4f1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 20:06:18 2017 Not After : Thu Mar 31 20:06:18 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:3f:02:1a:10:41:4a:c9:c4:0a:8b:3d:32:8b:53:f9: 75:a0:17:99:47:91:25:71:46:ef:29:74:48:27:f7:39: c3:1a:85:c2:83:7c:7c:bb:b1:71:33:4d:23:3c:27:6f: a3:d5:9a:58:b9:5e:7f:b8:a8:e0:f7:04:d5:8e:01:78: a7:2a:cb:df:6a:54:6f:a7:4a:fa:5b:bc:63:6a:81:e8: a9:7a:80:06:e9:d5:47:7d:e0:8f:1d:6b:fa:df:06:3d: d3:2a:13:33:d2:fa:c3:cb:cb:13:a3:ba:49:7d:18:c3: 95:98:d2:8f:30:2c:78:f8:6d:54:17:97:a5:5d:c8:b2: e8:91:07:d5:66:f1:8c:d4:76:b4:e3:18:a0:9d:b3:2c: a4:df:ed:22:2a:9f:b2:78:9c:8e:96:7a:85:e1:72:5d: 86:c5:d6:01:59:b7:d9:56:57:49:64:da:a6:6c:c4:d1: 1a:58:e9:4d:fe:06:d3:22:74:90:6b:7d:8b:6c:be:90: 00:c8:de:dc:b0:bf:cd:ab:aa:4d:ba:4d:c8:15:a6:95: 51:be:be:88:2c:ff:25:96:6c:d3:10:c5:d2:d6:5d:e7: c3:94:c7:c7:24:05:91:00:7f:ee:d2:87:b8:d6:2e:57: 73:3e:a3:92:d7:b6:37:60:75:05:df:66:c6:97:4f:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:c5:c2:c8:47:be:32:ab:c7:ca:e2:ce:78:0b:4c:4f: dc:e3:17:04:50:34:e9:9a:50:ee:b0:68:7f:76:b8:8b: e7:53:e1:d3:9f:2f:98:7e:e1:a4:26:d9:05:cb:4d:ea: 66:70:9e:cb:3f:2a:51:b0:0a:b0:da:79:79:5d:7a:91: 0d:ff:62:8d:39:7d:91:e3:27:2e:da:49:74:62:0d:68: b3:72:4a:41:ca:e9:16:5e:6e:84:47:49:4b:c3:79:d3: bf:10:8c:3e:c2:60:df:66:d9:4c:23:2a:c1:1b:ff:01: bb:a1:98:26:a9:ab:90:d2:27:6d:fb:8a:6f:30:3e:50: bc:4f:5f:6a:2f:90:be:2f:13:db:cc:74:46:93:44:96: ab:6d:18:d0:51:3b:09:ab:57:d2:b5:bc:82:c4:b6:b7: 42:70:ca:43:dd:75:94:a9:97:d8:72:bc:1f:7d:fb:b8: 24:3f:c6:bd:be:64:61:7c:7b:e7:4d:d4:8d:09:1d:ec: 01:90:e0:9c:c3:0b:8a:e3:75:3d:8d:00:3b:db:4d:2b: b6:14:45:07:e1:83:36:4f:ea:31:7b:5a:7f:e3:5b:64: bf:7f:d6:14:ee:f5:5a:79:2e:ee:79:65:bf:fd:99:38: 39:c1:30:10:43:a4:b4:0b:a8:24:a5:24:5a:e7:0d:d2 Fingerprint (SHA-256): C2:B0:B7:05:48:4C:A6:88:F3:1A:19:70:76:72:CB:FC:42:56:89:16:B6:1E:02:BA:5F:CC:E4:91:45:A2:A0:58 Fingerprint (SHA1): C6:E0:65:1B:69:12:52:38:36:E0:54:74:ED:D2:BC:AE:C0:3F:38:22 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #14025: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14026: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14027: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195635 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14028: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14029: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14030: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14031: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331195636 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14032: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14033: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14034: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14035: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331195637 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14036: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14037: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #14038: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14039: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 331195638 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14040: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14041: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #14042: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14043: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 331195639 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14044: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14045: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14046: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195635 (0x13bda4f3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:06:47 2017 Not After : Thu Mar 31 20:06:47 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:31:4e:94:68:8e:f8:15:f9:d3:e4:90:68:88:a2:95: 66:7b:72:55:91:ee:91:42:8c:ed:d3:46:90:97:93:4d: fe:6a:a6:d6:f2:64:ed:70:34:c9:12:55:ca:25:dc:e8: fe:71:66:57:a6:67:69:6a:83:c6:03:c7:24:b3:14:03: 39:e9:c1:e3:a4:7e:a8:36:d7:15:a5:db:53:57:7a:f1: a4:47:df:19:da:62:16:23:8c:42:dc:90:3b:12:73:68: 70:3c:73:91:8f:fb:21:7e:bc:e0:3e:d9:24:0e:0a:50: b5:fe:4c:29:0b:7a:5f:29:47:d4:70:79:49:e1:15:3b: 97:4b:fb:6f:54:86:df:61:34:13:b5:18:bb:36:bb:b7: 45:f2:95:3a:5c:9e:22:bc:6d:1f:36:b0:3e:59:bb:3a: b2:7f:1c:44:7d:8c:08:21:85:71:31:41:29:02:8a:f0: ba:71:dc:2d:4b:d1:8b:d6:b8:ac:1d:97:5c:27:1e:ef: a4:37:22:f2:59:61:9c:6d:7c:49:94:5d:eb:6e:d8:cf: 23:d7:93:a2:88:7d:6c:09:b5:78:e2:b7:22:2e:a4:1d: ea:60:c1:4f:42:b5:f8:c2:1c:05:f8:fe:0f:9b:be:dc: 84:be:e3:3e:30:24:ca:bc:70:79:ca:ae:fd:ee:25:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:d2:c4:f2:80:03:85:44:cb:4c:ac:9e:3a:a2:e6:1a: 32:53:5e:51:3b:fa:91:1f:97:2f:52:7a:bd:2d:7f:57: 5d:56:c3:c5:66:f4:1d:df:2a:e9:ff:01:3a:ce:bb:f5: bd:1e:ff:99:f0:99:36:bc:bc:cf:93:02:b4:63:c9:10: 0d:3c:35:f6:eb:32:8a:09:e9:1d:fe:84:20:d5:21:b2: f2:0f:58:71:3e:39:bf:85:e2:32:b4:ed:c2:a5:c0:99: 24:20:7e:1c:cf:42:0d:2e:1d:42:51:70:df:ee:7a:cb: f7:f3:80:a7:ef:46:35:fc:ff:00:8a:3a:a3:28:d6:26: 76:5c:52:d1:dd:6d:1f:b7:89:ce:a9:44:2a:6a:82:69: f4:d0:05:12:f1:01:fa:f0:48:ad:87:06:f6:1a:d2:07: 7c:5e:03:a8:44:42:12:d0:c2:7e:ba:91:b0:18:65:c3: f4:06:17:e8:9a:56:d9:2a:6d:10:e0:00:9b:0e:ba:f3: 56:dc:ea:77:dd:98:6b:c1:e2:8d:df:4c:73:16:de:6f: 15:80:0c:eb:99:31:4c:af:d6:12:6f:3a:43:cb:7e:7b: 11:64:ff:4d:88:2c:2c:ab:ae:46:c0:78:7f:a4:ba:eb: 27:d8:9c:9d:41:49:b2:a8:54:74:00:b1:b8:f9:8b:b1 Fingerprint (SHA-256): 6B:BA:85:9B:D5:16:60:90:B3:B5:04:3B:68:81:CF:E7:A0:CB:78:75:83:59:46:33:80:35:C2:97:36:95:4A:05 Fingerprint (SHA1): 2E:F8:27:5F:98:EE:C7:8D:B3:F4:48:54:4F:BA:DD:4E:51:DB:0A:80 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14047: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14048: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195636 (0x13bda4f4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:07:15 2017 Not After : Thu Mar 31 20:07:15 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:16:41:bb:10:29:f7:43:e4:40:ca:ce:53:a2:34:ca: 64:39:79:4e:47:82:d9:0f:64:64:38:b9:86:cb:bc:40: 49:d3:41:dc:1c:ad:0d:46:5b:18:86:bb:56:c2:e5:6a: 63:b1:b2:83:ae:86:48:9f:95:21:b9:16:00:de:dc:91: b9:e1:5c:24:4b:ad:2f:d3:fe:42:ed:f5:03:b9:bf:07: 4c:2c:39:c1:5a:63:9f:f5:18:2b:71:ed:8e:49:3d:58: 48:99:ea:23:3f:d5:ae:b6:95:de:83:32:2c:47:c9:5a: df:01:32:de:5d:72:46:27:ce:e8:89:59:be:31:5b:28: ef:b3:d8:7c:28:19:7f:01:8b:f6:88:bc:21:1e:46:df: ef:af:40:96:4a:91:4f:62:e1:1a:92:ed:48:03:56:6b: 76:2e:4b:77:15:f9:0a:e6:49:0b:d0:83:67:87:23:70: e8:c9:78:54:f3:a1:0f:66:ea:8d:91:4d:32:a5:b6:64: 2a:98:20:2b:8a:1b:9d:56:16:1a:3f:f6:fc:4c:f4:b5: 3e:bd:71:3d:be:13:35:a5:48:d8:ee:5f:b9:cc:4b:ba: 01:17:b9:52:13:ad:bd:54:91:cb:5b:cc:05:57:20:46: 3f:08:7c:70:ab:74:de:d1:51:0e:e2:e1:6b:d8:30:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:e7:25:0d:05:7f:e4:3f:14:12:a0:7a:98:45:76:49: ad:95:ce:b4:17:34:61:83:8a:e8:d6:bc:75:04:03:14: d7:ad:f1:5f:d5:a1:b5:ea:37:38:22:ae:0f:96:48:f9: 6d:1e:ef:a8:60:10:45:9d:fd:48:d8:21:4d:de:46:4e: 8c:d5:29:92:10:5e:68:55:c8:5e:a5:5b:ad:bf:5e:65: 37:d0:fc:eb:46:ef:7e:70:d0:b4:76:07:5a:ed:28:16: d7:5e:af:04:87:e0:20:04:e9:11:fb:c6:88:9e:25:2f: bd:66:c9:15:33:82:8b:09:3a:6a:09:d7:42:1b:04:ca: a4:9b:92:dc:96:dc:de:df:8e:85:4e:f4:6c:33:a6:25: 17:56:39:44:dd:30:a5:fc:ef:39:8a:92:a5:48:01:8e: f8:a8:1d:31:4c:f6:a1:6c:af:39:2a:a0:81:2e:81:1b: ec:57:d6:27:18:f7:fb:35:f2:c1:60:ed:1c:77:75:ed: 70:36:22:d2:12:2f:15:66:8d:1f:91:8c:dd:22:34:2c: 45:a5:82:2a:74:96:6f:68:6e:61:21:6a:27:e4:a4:74: 88:30:64:a0:a9:d1:ca:ae:65:58:30:fe:09:11:54:57: 1b:6b:a1:84:01:8f:4b:81:2d:d2:7b:b5:3d:fa:25:88 Fingerprint (SHA-256): B4:4F:47:80:04:56:A6:8B:85:4B:0B:FE:FF:9B:52:6B:0F:37:35:D7:68:99:7C:0B:13:3F:00:A3:50:F3:3F:72 Fingerprint (SHA1): F8:29:50:C5:FE:95:9D:55:DD:28:87:57:1B:66:C3:54:98:D9:CD:E9 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14049: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14050: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195637 (0x13bda4f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 20:07:35 2017 Not After : Thu Mar 31 20:07:35 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:f9:2a:c7:28:f5:80:a2:82:09:be:34:f3:d2:51:ae: cf:86:cd:5a:94:f2:94:1f:59:38:af:ae:a8:4f:2a:96: 89:b2:b0:d4:fa:75:f5:6c:e4:3c:2a:82:ed:44:3d:42: 50:ed:85:63:0d:5a:63:ed:5e:a2:84:12:dc:e3:bd:fb: ac:c0:97:d9:42:1b:08:2e:3e:d4:66:cd:1e:16:1a:c9: 56:1f:75:9f:c2:75:54:7b:5b:cb:21:ba:52:43:b5:c4: 6c:5e:ed:e8:18:87:f2:80:5e:ee:a9:ed:af:f5:80:67: d6:83:54:2a:e9:fa:f2:60:d2:4a:22:81:50:fa:db:d2: cb:d2:9d:cb:24:c9:3b:ba:97:8b:17:f3:7f:2e:64:66: 49:c9:a4:a4:db:75:db:83:a5:73:d7:8c:22:9f:ce:d8: d7:4c:f2:75:ae:67:9b:64:8a:57:4e:e4:84:61:a7:81: 1f:ea:bf:07:84:b3:97:17:fc:09:f0:36:d4:d8:9b:82: 91:2e:c6:45:2b:7b:a0:89:c5:b9:86:3f:05:c9:c7:0c: 55:68:60:db:e5:9c:05:db:d1:77:7f:c4:2a:46:92:da: 8a:7c:d5:82:3e:cc:fe:41:98:01:9e:0b:81:c4:ed:b3: ae:e1:e3:08:84:61:7f:a8:f2:a4:81:90:39:2f:a0:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:06:c6:eb:e0:45:6e:4a:d0:f8:91:f2:7b:ef:93:f0: 02:fd:54:72:06:42:e1:da:68:ff:d8:01:c9:60:cc:8c: a8:26:48:2c:dc:ea:cd:66:23:49:20:fa:ad:94:77:46: e8:70:e0:e8:7d:41:3a:6d:15:f2:6e:26:19:3d:22:77: 99:f9:f5:bc:fc:24:45:ce:5b:57:89:65:bc:a1:6e:6c: 64:e6:a9:f0:79:f4:a9:a3:50:f6:f6:e0:ba:4f:4a:55: da:5a:74:33:6d:24:83:f6:c9:45:4a:36:e4:2c:7b:2f: 52:c7:37:a6:d1:fa:76:19:53:98:92:14:99:6d:0c:63: 7d:d3:7f:19:9a:df:54:5f:ff:60:00:28:d8:b9:d4:f9: a9:43:0f:b7:00:66:7d:d8:c9:8f:a9:2f:a4:65:01:3b: 41:ce:87:ee:84:e5:36:b5:fc:a9:c6:1c:16:c9:99:af: e4:1f:01:87:f8:9c:73:c4:40:70:5a:9d:9a:6e:de:0f: 95:09:88:d4:c9:06:91:78:b1:b0:4d:9a:25:d0:d0:5c: f6:d5:eb:e9:8c:aa:39:69:8c:ad:96:5c:8d:21:12:5f: 47:9e:58:d1:19:c9:33:7e:7e:1c:35:21:b6:4b:b3:a8: a7:95:91:62:a9:97:ed:7c:2f:59:e6:fb:37:17:6e:15 Fingerprint (SHA-256): E1:1D:AD:40:54:94:D3:11:6A:13:05:82:60:15:18:DA:45:0C:19:C4:7D:F1:D5:C0:7E:B6:4C:78:35:DF:EE:95 Fingerprint (SHA1): 03:87:91:CC:31:60:25:08:39:7B:AD:72:0B:17:64:D0:BE:BF:AA:75 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #14051: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14052: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #14053: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #14054: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #14055: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195635 (0x13bda4f3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:06:47 2017 Not After : Thu Mar 31 20:06:47 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:31:4e:94:68:8e:f8:15:f9:d3:e4:90:68:88:a2:95: 66:7b:72:55:91:ee:91:42:8c:ed:d3:46:90:97:93:4d: fe:6a:a6:d6:f2:64:ed:70:34:c9:12:55:ca:25:dc:e8: fe:71:66:57:a6:67:69:6a:83:c6:03:c7:24:b3:14:03: 39:e9:c1:e3:a4:7e:a8:36:d7:15:a5:db:53:57:7a:f1: a4:47:df:19:da:62:16:23:8c:42:dc:90:3b:12:73:68: 70:3c:73:91:8f:fb:21:7e:bc:e0:3e:d9:24:0e:0a:50: b5:fe:4c:29:0b:7a:5f:29:47:d4:70:79:49:e1:15:3b: 97:4b:fb:6f:54:86:df:61:34:13:b5:18:bb:36:bb:b7: 45:f2:95:3a:5c:9e:22:bc:6d:1f:36:b0:3e:59:bb:3a: b2:7f:1c:44:7d:8c:08:21:85:71:31:41:29:02:8a:f0: ba:71:dc:2d:4b:d1:8b:d6:b8:ac:1d:97:5c:27:1e:ef: a4:37:22:f2:59:61:9c:6d:7c:49:94:5d:eb:6e:d8:cf: 23:d7:93:a2:88:7d:6c:09:b5:78:e2:b7:22:2e:a4:1d: ea:60:c1:4f:42:b5:f8:c2:1c:05:f8:fe:0f:9b:be:dc: 84:be:e3:3e:30:24:ca:bc:70:79:ca:ae:fd:ee:25:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:d2:c4:f2:80:03:85:44:cb:4c:ac:9e:3a:a2:e6:1a: 32:53:5e:51:3b:fa:91:1f:97:2f:52:7a:bd:2d:7f:57: 5d:56:c3:c5:66:f4:1d:df:2a:e9:ff:01:3a:ce:bb:f5: bd:1e:ff:99:f0:99:36:bc:bc:cf:93:02:b4:63:c9:10: 0d:3c:35:f6:eb:32:8a:09:e9:1d:fe:84:20:d5:21:b2: f2:0f:58:71:3e:39:bf:85:e2:32:b4:ed:c2:a5:c0:99: 24:20:7e:1c:cf:42:0d:2e:1d:42:51:70:df:ee:7a:cb: f7:f3:80:a7:ef:46:35:fc:ff:00:8a:3a:a3:28:d6:26: 76:5c:52:d1:dd:6d:1f:b7:89:ce:a9:44:2a:6a:82:69: f4:d0:05:12:f1:01:fa:f0:48:ad:87:06:f6:1a:d2:07: 7c:5e:03:a8:44:42:12:d0:c2:7e:ba:91:b0:18:65:c3: f4:06:17:e8:9a:56:d9:2a:6d:10:e0:00:9b:0e:ba:f3: 56:dc:ea:77:dd:98:6b:c1:e2:8d:df:4c:73:16:de:6f: 15:80:0c:eb:99:31:4c:af:d6:12:6f:3a:43:cb:7e:7b: 11:64:ff:4d:88:2c:2c:ab:ae:46:c0:78:7f:a4:ba:eb: 27:d8:9c:9d:41:49:b2:a8:54:74:00:b1:b8:f9:8b:b1 Fingerprint (SHA-256): 6B:BA:85:9B:D5:16:60:90:B3:B5:04:3B:68:81:CF:E7:A0:CB:78:75:83:59:46:33:80:35:C2:97:36:95:4A:05 Fingerprint (SHA1): 2E:F8:27:5F:98:EE:C7:8D:B3:F4:48:54:4F:BA:DD:4E:51:DB:0A:80 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14056: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14057: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195636 (0x13bda4f4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:07:15 2017 Not After : Thu Mar 31 20:07:15 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:16:41:bb:10:29:f7:43:e4:40:ca:ce:53:a2:34:ca: 64:39:79:4e:47:82:d9:0f:64:64:38:b9:86:cb:bc:40: 49:d3:41:dc:1c:ad:0d:46:5b:18:86:bb:56:c2:e5:6a: 63:b1:b2:83:ae:86:48:9f:95:21:b9:16:00:de:dc:91: b9:e1:5c:24:4b:ad:2f:d3:fe:42:ed:f5:03:b9:bf:07: 4c:2c:39:c1:5a:63:9f:f5:18:2b:71:ed:8e:49:3d:58: 48:99:ea:23:3f:d5:ae:b6:95:de:83:32:2c:47:c9:5a: df:01:32:de:5d:72:46:27:ce:e8:89:59:be:31:5b:28: ef:b3:d8:7c:28:19:7f:01:8b:f6:88:bc:21:1e:46:df: ef:af:40:96:4a:91:4f:62:e1:1a:92:ed:48:03:56:6b: 76:2e:4b:77:15:f9:0a:e6:49:0b:d0:83:67:87:23:70: e8:c9:78:54:f3:a1:0f:66:ea:8d:91:4d:32:a5:b6:64: 2a:98:20:2b:8a:1b:9d:56:16:1a:3f:f6:fc:4c:f4:b5: 3e:bd:71:3d:be:13:35:a5:48:d8:ee:5f:b9:cc:4b:ba: 01:17:b9:52:13:ad:bd:54:91:cb:5b:cc:05:57:20:46: 3f:08:7c:70:ab:74:de:d1:51:0e:e2:e1:6b:d8:30:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:e7:25:0d:05:7f:e4:3f:14:12:a0:7a:98:45:76:49: ad:95:ce:b4:17:34:61:83:8a:e8:d6:bc:75:04:03:14: d7:ad:f1:5f:d5:a1:b5:ea:37:38:22:ae:0f:96:48:f9: 6d:1e:ef:a8:60:10:45:9d:fd:48:d8:21:4d:de:46:4e: 8c:d5:29:92:10:5e:68:55:c8:5e:a5:5b:ad:bf:5e:65: 37:d0:fc:eb:46:ef:7e:70:d0:b4:76:07:5a:ed:28:16: d7:5e:af:04:87:e0:20:04:e9:11:fb:c6:88:9e:25:2f: bd:66:c9:15:33:82:8b:09:3a:6a:09:d7:42:1b:04:ca: a4:9b:92:dc:96:dc:de:df:8e:85:4e:f4:6c:33:a6:25: 17:56:39:44:dd:30:a5:fc:ef:39:8a:92:a5:48:01:8e: f8:a8:1d:31:4c:f6:a1:6c:af:39:2a:a0:81:2e:81:1b: ec:57:d6:27:18:f7:fb:35:f2:c1:60:ed:1c:77:75:ed: 70:36:22:d2:12:2f:15:66:8d:1f:91:8c:dd:22:34:2c: 45:a5:82:2a:74:96:6f:68:6e:61:21:6a:27:e4:a4:74: 88:30:64:a0:a9:d1:ca:ae:65:58:30:fe:09:11:54:57: 1b:6b:a1:84:01:8f:4b:81:2d:d2:7b:b5:3d:fa:25:88 Fingerprint (SHA-256): B4:4F:47:80:04:56:A6:8B:85:4B:0B:FE:FF:9B:52:6B:0F:37:35:D7:68:99:7C:0B:13:3F:00:A3:50:F3:3F:72 Fingerprint (SHA1): F8:29:50:C5:FE:95:9D:55:DD:28:87:57:1B:66:C3:54:98:D9:CD:E9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14058: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14059: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195637 (0x13bda4f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 20:07:35 2017 Not After : Thu Mar 31 20:07:35 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:f9:2a:c7:28:f5:80:a2:82:09:be:34:f3:d2:51:ae: cf:86:cd:5a:94:f2:94:1f:59:38:af:ae:a8:4f:2a:96: 89:b2:b0:d4:fa:75:f5:6c:e4:3c:2a:82:ed:44:3d:42: 50:ed:85:63:0d:5a:63:ed:5e:a2:84:12:dc:e3:bd:fb: ac:c0:97:d9:42:1b:08:2e:3e:d4:66:cd:1e:16:1a:c9: 56:1f:75:9f:c2:75:54:7b:5b:cb:21:ba:52:43:b5:c4: 6c:5e:ed:e8:18:87:f2:80:5e:ee:a9:ed:af:f5:80:67: d6:83:54:2a:e9:fa:f2:60:d2:4a:22:81:50:fa:db:d2: cb:d2:9d:cb:24:c9:3b:ba:97:8b:17:f3:7f:2e:64:66: 49:c9:a4:a4:db:75:db:83:a5:73:d7:8c:22:9f:ce:d8: d7:4c:f2:75:ae:67:9b:64:8a:57:4e:e4:84:61:a7:81: 1f:ea:bf:07:84:b3:97:17:fc:09:f0:36:d4:d8:9b:82: 91:2e:c6:45:2b:7b:a0:89:c5:b9:86:3f:05:c9:c7:0c: 55:68:60:db:e5:9c:05:db:d1:77:7f:c4:2a:46:92:da: 8a:7c:d5:82:3e:cc:fe:41:98:01:9e:0b:81:c4:ed:b3: ae:e1:e3:08:84:61:7f:a8:f2:a4:81:90:39:2f:a0:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:06:c6:eb:e0:45:6e:4a:d0:f8:91:f2:7b:ef:93:f0: 02:fd:54:72:06:42:e1:da:68:ff:d8:01:c9:60:cc:8c: a8:26:48:2c:dc:ea:cd:66:23:49:20:fa:ad:94:77:46: e8:70:e0:e8:7d:41:3a:6d:15:f2:6e:26:19:3d:22:77: 99:f9:f5:bc:fc:24:45:ce:5b:57:89:65:bc:a1:6e:6c: 64:e6:a9:f0:79:f4:a9:a3:50:f6:f6:e0:ba:4f:4a:55: da:5a:74:33:6d:24:83:f6:c9:45:4a:36:e4:2c:7b:2f: 52:c7:37:a6:d1:fa:76:19:53:98:92:14:99:6d:0c:63: 7d:d3:7f:19:9a:df:54:5f:ff:60:00:28:d8:b9:d4:f9: a9:43:0f:b7:00:66:7d:d8:c9:8f:a9:2f:a4:65:01:3b: 41:ce:87:ee:84:e5:36:b5:fc:a9:c6:1c:16:c9:99:af: e4:1f:01:87:f8:9c:73:c4:40:70:5a:9d:9a:6e:de:0f: 95:09:88:d4:c9:06:91:78:b1:b0:4d:9a:25:d0:d0:5c: f6:d5:eb:e9:8c:aa:39:69:8c:ad:96:5c:8d:21:12:5f: 47:9e:58:d1:19:c9:33:7e:7e:1c:35:21:b6:4b:b3:a8: a7:95:91:62:a9:97:ed:7c:2f:59:e6:fb:37:17:6e:15 Fingerprint (SHA-256): E1:1D:AD:40:54:94:D3:11:6A:13:05:82:60:15:18:DA:45:0C:19:C4:7D:F1:D5:C0:7E:B6:4C:78:35:DF:EE:95 Fingerprint (SHA1): 03:87:91:CC:31:60:25:08:39:7B:AD:72:0B:17:64:D0:BE:BF:AA:75 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #14060: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14061: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195635 (0x13bda4f3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:06:47 2017 Not After : Thu Mar 31 20:06:47 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:31:4e:94:68:8e:f8:15:f9:d3:e4:90:68:88:a2:95: 66:7b:72:55:91:ee:91:42:8c:ed:d3:46:90:97:93:4d: fe:6a:a6:d6:f2:64:ed:70:34:c9:12:55:ca:25:dc:e8: fe:71:66:57:a6:67:69:6a:83:c6:03:c7:24:b3:14:03: 39:e9:c1:e3:a4:7e:a8:36:d7:15:a5:db:53:57:7a:f1: a4:47:df:19:da:62:16:23:8c:42:dc:90:3b:12:73:68: 70:3c:73:91:8f:fb:21:7e:bc:e0:3e:d9:24:0e:0a:50: b5:fe:4c:29:0b:7a:5f:29:47:d4:70:79:49:e1:15:3b: 97:4b:fb:6f:54:86:df:61:34:13:b5:18:bb:36:bb:b7: 45:f2:95:3a:5c:9e:22:bc:6d:1f:36:b0:3e:59:bb:3a: b2:7f:1c:44:7d:8c:08:21:85:71:31:41:29:02:8a:f0: ba:71:dc:2d:4b:d1:8b:d6:b8:ac:1d:97:5c:27:1e:ef: a4:37:22:f2:59:61:9c:6d:7c:49:94:5d:eb:6e:d8:cf: 23:d7:93:a2:88:7d:6c:09:b5:78:e2:b7:22:2e:a4:1d: ea:60:c1:4f:42:b5:f8:c2:1c:05:f8:fe:0f:9b:be:dc: 84:be:e3:3e:30:24:ca:bc:70:79:ca:ae:fd:ee:25:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:d2:c4:f2:80:03:85:44:cb:4c:ac:9e:3a:a2:e6:1a: 32:53:5e:51:3b:fa:91:1f:97:2f:52:7a:bd:2d:7f:57: 5d:56:c3:c5:66:f4:1d:df:2a:e9:ff:01:3a:ce:bb:f5: bd:1e:ff:99:f0:99:36:bc:bc:cf:93:02:b4:63:c9:10: 0d:3c:35:f6:eb:32:8a:09:e9:1d:fe:84:20:d5:21:b2: f2:0f:58:71:3e:39:bf:85:e2:32:b4:ed:c2:a5:c0:99: 24:20:7e:1c:cf:42:0d:2e:1d:42:51:70:df:ee:7a:cb: f7:f3:80:a7:ef:46:35:fc:ff:00:8a:3a:a3:28:d6:26: 76:5c:52:d1:dd:6d:1f:b7:89:ce:a9:44:2a:6a:82:69: f4:d0:05:12:f1:01:fa:f0:48:ad:87:06:f6:1a:d2:07: 7c:5e:03:a8:44:42:12:d0:c2:7e:ba:91:b0:18:65:c3: f4:06:17:e8:9a:56:d9:2a:6d:10:e0:00:9b:0e:ba:f3: 56:dc:ea:77:dd:98:6b:c1:e2:8d:df:4c:73:16:de:6f: 15:80:0c:eb:99:31:4c:af:d6:12:6f:3a:43:cb:7e:7b: 11:64:ff:4d:88:2c:2c:ab:ae:46:c0:78:7f:a4:ba:eb: 27:d8:9c:9d:41:49:b2:a8:54:74:00:b1:b8:f9:8b:b1 Fingerprint (SHA-256): 6B:BA:85:9B:D5:16:60:90:B3:B5:04:3B:68:81:CF:E7:A0:CB:78:75:83:59:46:33:80:35:C2:97:36:95:4A:05 Fingerprint (SHA1): 2E:F8:27:5F:98:EE:C7:8D:B3:F4:48:54:4F:BA:DD:4E:51:DB:0A:80 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14062: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195635 (0x13bda4f3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:06:47 2017 Not After : Thu Mar 31 20:06:47 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:31:4e:94:68:8e:f8:15:f9:d3:e4:90:68:88:a2:95: 66:7b:72:55:91:ee:91:42:8c:ed:d3:46:90:97:93:4d: fe:6a:a6:d6:f2:64:ed:70:34:c9:12:55:ca:25:dc:e8: fe:71:66:57:a6:67:69:6a:83:c6:03:c7:24:b3:14:03: 39:e9:c1:e3:a4:7e:a8:36:d7:15:a5:db:53:57:7a:f1: a4:47:df:19:da:62:16:23:8c:42:dc:90:3b:12:73:68: 70:3c:73:91:8f:fb:21:7e:bc:e0:3e:d9:24:0e:0a:50: b5:fe:4c:29:0b:7a:5f:29:47:d4:70:79:49:e1:15:3b: 97:4b:fb:6f:54:86:df:61:34:13:b5:18:bb:36:bb:b7: 45:f2:95:3a:5c:9e:22:bc:6d:1f:36:b0:3e:59:bb:3a: b2:7f:1c:44:7d:8c:08:21:85:71:31:41:29:02:8a:f0: ba:71:dc:2d:4b:d1:8b:d6:b8:ac:1d:97:5c:27:1e:ef: a4:37:22:f2:59:61:9c:6d:7c:49:94:5d:eb:6e:d8:cf: 23:d7:93:a2:88:7d:6c:09:b5:78:e2:b7:22:2e:a4:1d: ea:60:c1:4f:42:b5:f8:c2:1c:05:f8:fe:0f:9b:be:dc: 84:be:e3:3e:30:24:ca:bc:70:79:ca:ae:fd:ee:25:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:d2:c4:f2:80:03:85:44:cb:4c:ac:9e:3a:a2:e6:1a: 32:53:5e:51:3b:fa:91:1f:97:2f:52:7a:bd:2d:7f:57: 5d:56:c3:c5:66:f4:1d:df:2a:e9:ff:01:3a:ce:bb:f5: bd:1e:ff:99:f0:99:36:bc:bc:cf:93:02:b4:63:c9:10: 0d:3c:35:f6:eb:32:8a:09:e9:1d:fe:84:20:d5:21:b2: f2:0f:58:71:3e:39:bf:85:e2:32:b4:ed:c2:a5:c0:99: 24:20:7e:1c:cf:42:0d:2e:1d:42:51:70:df:ee:7a:cb: f7:f3:80:a7:ef:46:35:fc:ff:00:8a:3a:a3:28:d6:26: 76:5c:52:d1:dd:6d:1f:b7:89:ce:a9:44:2a:6a:82:69: f4:d0:05:12:f1:01:fa:f0:48:ad:87:06:f6:1a:d2:07: 7c:5e:03:a8:44:42:12:d0:c2:7e:ba:91:b0:18:65:c3: f4:06:17:e8:9a:56:d9:2a:6d:10:e0:00:9b:0e:ba:f3: 56:dc:ea:77:dd:98:6b:c1:e2:8d:df:4c:73:16:de:6f: 15:80:0c:eb:99:31:4c:af:d6:12:6f:3a:43:cb:7e:7b: 11:64:ff:4d:88:2c:2c:ab:ae:46:c0:78:7f:a4:ba:eb: 27:d8:9c:9d:41:49:b2:a8:54:74:00:b1:b8:f9:8b:b1 Fingerprint (SHA-256): 6B:BA:85:9B:D5:16:60:90:B3:B5:04:3B:68:81:CF:E7:A0:CB:78:75:83:59:46:33:80:35:C2:97:36:95:4A:05 Fingerprint (SHA1): 2E:F8:27:5F:98:EE:C7:8D:B3:F4:48:54:4F:BA:DD:4E:51:DB:0A:80 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14063: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195636 (0x13bda4f4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:07:15 2017 Not After : Thu Mar 31 20:07:15 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:16:41:bb:10:29:f7:43:e4:40:ca:ce:53:a2:34:ca: 64:39:79:4e:47:82:d9:0f:64:64:38:b9:86:cb:bc:40: 49:d3:41:dc:1c:ad:0d:46:5b:18:86:bb:56:c2:e5:6a: 63:b1:b2:83:ae:86:48:9f:95:21:b9:16:00:de:dc:91: b9:e1:5c:24:4b:ad:2f:d3:fe:42:ed:f5:03:b9:bf:07: 4c:2c:39:c1:5a:63:9f:f5:18:2b:71:ed:8e:49:3d:58: 48:99:ea:23:3f:d5:ae:b6:95:de:83:32:2c:47:c9:5a: df:01:32:de:5d:72:46:27:ce:e8:89:59:be:31:5b:28: ef:b3:d8:7c:28:19:7f:01:8b:f6:88:bc:21:1e:46:df: ef:af:40:96:4a:91:4f:62:e1:1a:92:ed:48:03:56:6b: 76:2e:4b:77:15:f9:0a:e6:49:0b:d0:83:67:87:23:70: e8:c9:78:54:f3:a1:0f:66:ea:8d:91:4d:32:a5:b6:64: 2a:98:20:2b:8a:1b:9d:56:16:1a:3f:f6:fc:4c:f4:b5: 3e:bd:71:3d:be:13:35:a5:48:d8:ee:5f:b9:cc:4b:ba: 01:17:b9:52:13:ad:bd:54:91:cb:5b:cc:05:57:20:46: 3f:08:7c:70:ab:74:de:d1:51:0e:e2:e1:6b:d8:30:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:e7:25:0d:05:7f:e4:3f:14:12:a0:7a:98:45:76:49: ad:95:ce:b4:17:34:61:83:8a:e8:d6:bc:75:04:03:14: d7:ad:f1:5f:d5:a1:b5:ea:37:38:22:ae:0f:96:48:f9: 6d:1e:ef:a8:60:10:45:9d:fd:48:d8:21:4d:de:46:4e: 8c:d5:29:92:10:5e:68:55:c8:5e:a5:5b:ad:bf:5e:65: 37:d0:fc:eb:46:ef:7e:70:d0:b4:76:07:5a:ed:28:16: d7:5e:af:04:87:e0:20:04:e9:11:fb:c6:88:9e:25:2f: bd:66:c9:15:33:82:8b:09:3a:6a:09:d7:42:1b:04:ca: a4:9b:92:dc:96:dc:de:df:8e:85:4e:f4:6c:33:a6:25: 17:56:39:44:dd:30:a5:fc:ef:39:8a:92:a5:48:01:8e: f8:a8:1d:31:4c:f6:a1:6c:af:39:2a:a0:81:2e:81:1b: ec:57:d6:27:18:f7:fb:35:f2:c1:60:ed:1c:77:75:ed: 70:36:22:d2:12:2f:15:66:8d:1f:91:8c:dd:22:34:2c: 45:a5:82:2a:74:96:6f:68:6e:61:21:6a:27:e4:a4:74: 88:30:64:a0:a9:d1:ca:ae:65:58:30:fe:09:11:54:57: 1b:6b:a1:84:01:8f:4b:81:2d:d2:7b:b5:3d:fa:25:88 Fingerprint (SHA-256): B4:4F:47:80:04:56:A6:8B:85:4B:0B:FE:FF:9B:52:6B:0F:37:35:D7:68:99:7C:0B:13:3F:00:A3:50:F3:3F:72 Fingerprint (SHA1): F8:29:50:C5:FE:95:9D:55:DD:28:87:57:1B:66:C3:54:98:D9:CD:E9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14064: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195636 (0x13bda4f4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:07:15 2017 Not After : Thu Mar 31 20:07:15 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:16:41:bb:10:29:f7:43:e4:40:ca:ce:53:a2:34:ca: 64:39:79:4e:47:82:d9:0f:64:64:38:b9:86:cb:bc:40: 49:d3:41:dc:1c:ad:0d:46:5b:18:86:bb:56:c2:e5:6a: 63:b1:b2:83:ae:86:48:9f:95:21:b9:16:00:de:dc:91: b9:e1:5c:24:4b:ad:2f:d3:fe:42:ed:f5:03:b9:bf:07: 4c:2c:39:c1:5a:63:9f:f5:18:2b:71:ed:8e:49:3d:58: 48:99:ea:23:3f:d5:ae:b6:95:de:83:32:2c:47:c9:5a: df:01:32:de:5d:72:46:27:ce:e8:89:59:be:31:5b:28: ef:b3:d8:7c:28:19:7f:01:8b:f6:88:bc:21:1e:46:df: ef:af:40:96:4a:91:4f:62:e1:1a:92:ed:48:03:56:6b: 76:2e:4b:77:15:f9:0a:e6:49:0b:d0:83:67:87:23:70: e8:c9:78:54:f3:a1:0f:66:ea:8d:91:4d:32:a5:b6:64: 2a:98:20:2b:8a:1b:9d:56:16:1a:3f:f6:fc:4c:f4:b5: 3e:bd:71:3d:be:13:35:a5:48:d8:ee:5f:b9:cc:4b:ba: 01:17:b9:52:13:ad:bd:54:91:cb:5b:cc:05:57:20:46: 3f:08:7c:70:ab:74:de:d1:51:0e:e2:e1:6b:d8:30:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:e7:25:0d:05:7f:e4:3f:14:12:a0:7a:98:45:76:49: ad:95:ce:b4:17:34:61:83:8a:e8:d6:bc:75:04:03:14: d7:ad:f1:5f:d5:a1:b5:ea:37:38:22:ae:0f:96:48:f9: 6d:1e:ef:a8:60:10:45:9d:fd:48:d8:21:4d:de:46:4e: 8c:d5:29:92:10:5e:68:55:c8:5e:a5:5b:ad:bf:5e:65: 37:d0:fc:eb:46:ef:7e:70:d0:b4:76:07:5a:ed:28:16: d7:5e:af:04:87:e0:20:04:e9:11:fb:c6:88:9e:25:2f: bd:66:c9:15:33:82:8b:09:3a:6a:09:d7:42:1b:04:ca: a4:9b:92:dc:96:dc:de:df:8e:85:4e:f4:6c:33:a6:25: 17:56:39:44:dd:30:a5:fc:ef:39:8a:92:a5:48:01:8e: f8:a8:1d:31:4c:f6:a1:6c:af:39:2a:a0:81:2e:81:1b: ec:57:d6:27:18:f7:fb:35:f2:c1:60:ed:1c:77:75:ed: 70:36:22:d2:12:2f:15:66:8d:1f:91:8c:dd:22:34:2c: 45:a5:82:2a:74:96:6f:68:6e:61:21:6a:27:e4:a4:74: 88:30:64:a0:a9:d1:ca:ae:65:58:30:fe:09:11:54:57: 1b:6b:a1:84:01:8f:4b:81:2d:d2:7b:b5:3d:fa:25:88 Fingerprint (SHA-256): B4:4F:47:80:04:56:A6:8B:85:4B:0B:FE:FF:9B:52:6B:0F:37:35:D7:68:99:7C:0B:13:3F:00:A3:50:F3:3F:72 Fingerprint (SHA1): F8:29:50:C5:FE:95:9D:55:DD:28:87:57:1B:66:C3:54:98:D9:CD:E9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14065: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195637 (0x13bda4f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 20:07:35 2017 Not After : Thu Mar 31 20:07:35 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:f9:2a:c7:28:f5:80:a2:82:09:be:34:f3:d2:51:ae: cf:86:cd:5a:94:f2:94:1f:59:38:af:ae:a8:4f:2a:96: 89:b2:b0:d4:fa:75:f5:6c:e4:3c:2a:82:ed:44:3d:42: 50:ed:85:63:0d:5a:63:ed:5e:a2:84:12:dc:e3:bd:fb: ac:c0:97:d9:42:1b:08:2e:3e:d4:66:cd:1e:16:1a:c9: 56:1f:75:9f:c2:75:54:7b:5b:cb:21:ba:52:43:b5:c4: 6c:5e:ed:e8:18:87:f2:80:5e:ee:a9:ed:af:f5:80:67: d6:83:54:2a:e9:fa:f2:60:d2:4a:22:81:50:fa:db:d2: cb:d2:9d:cb:24:c9:3b:ba:97:8b:17:f3:7f:2e:64:66: 49:c9:a4:a4:db:75:db:83:a5:73:d7:8c:22:9f:ce:d8: d7:4c:f2:75:ae:67:9b:64:8a:57:4e:e4:84:61:a7:81: 1f:ea:bf:07:84:b3:97:17:fc:09:f0:36:d4:d8:9b:82: 91:2e:c6:45:2b:7b:a0:89:c5:b9:86:3f:05:c9:c7:0c: 55:68:60:db:e5:9c:05:db:d1:77:7f:c4:2a:46:92:da: 8a:7c:d5:82:3e:cc:fe:41:98:01:9e:0b:81:c4:ed:b3: ae:e1:e3:08:84:61:7f:a8:f2:a4:81:90:39:2f:a0:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:06:c6:eb:e0:45:6e:4a:d0:f8:91:f2:7b:ef:93:f0: 02:fd:54:72:06:42:e1:da:68:ff:d8:01:c9:60:cc:8c: a8:26:48:2c:dc:ea:cd:66:23:49:20:fa:ad:94:77:46: e8:70:e0:e8:7d:41:3a:6d:15:f2:6e:26:19:3d:22:77: 99:f9:f5:bc:fc:24:45:ce:5b:57:89:65:bc:a1:6e:6c: 64:e6:a9:f0:79:f4:a9:a3:50:f6:f6:e0:ba:4f:4a:55: da:5a:74:33:6d:24:83:f6:c9:45:4a:36:e4:2c:7b:2f: 52:c7:37:a6:d1:fa:76:19:53:98:92:14:99:6d:0c:63: 7d:d3:7f:19:9a:df:54:5f:ff:60:00:28:d8:b9:d4:f9: a9:43:0f:b7:00:66:7d:d8:c9:8f:a9:2f:a4:65:01:3b: 41:ce:87:ee:84:e5:36:b5:fc:a9:c6:1c:16:c9:99:af: e4:1f:01:87:f8:9c:73:c4:40:70:5a:9d:9a:6e:de:0f: 95:09:88:d4:c9:06:91:78:b1:b0:4d:9a:25:d0:d0:5c: f6:d5:eb:e9:8c:aa:39:69:8c:ad:96:5c:8d:21:12:5f: 47:9e:58:d1:19:c9:33:7e:7e:1c:35:21:b6:4b:b3:a8: a7:95:91:62:a9:97:ed:7c:2f:59:e6:fb:37:17:6e:15 Fingerprint (SHA-256): E1:1D:AD:40:54:94:D3:11:6A:13:05:82:60:15:18:DA:45:0C:19:C4:7D:F1:D5:C0:7E:B6:4C:78:35:DF:EE:95 Fingerprint (SHA1): 03:87:91:CC:31:60:25:08:39:7B:AD:72:0B:17:64:D0:BE:BF:AA:75 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #14066: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195637 (0x13bda4f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 20:07:35 2017 Not After : Thu Mar 31 20:07:35 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:f9:2a:c7:28:f5:80:a2:82:09:be:34:f3:d2:51:ae: cf:86:cd:5a:94:f2:94:1f:59:38:af:ae:a8:4f:2a:96: 89:b2:b0:d4:fa:75:f5:6c:e4:3c:2a:82:ed:44:3d:42: 50:ed:85:63:0d:5a:63:ed:5e:a2:84:12:dc:e3:bd:fb: ac:c0:97:d9:42:1b:08:2e:3e:d4:66:cd:1e:16:1a:c9: 56:1f:75:9f:c2:75:54:7b:5b:cb:21:ba:52:43:b5:c4: 6c:5e:ed:e8:18:87:f2:80:5e:ee:a9:ed:af:f5:80:67: d6:83:54:2a:e9:fa:f2:60:d2:4a:22:81:50:fa:db:d2: cb:d2:9d:cb:24:c9:3b:ba:97:8b:17:f3:7f:2e:64:66: 49:c9:a4:a4:db:75:db:83:a5:73:d7:8c:22:9f:ce:d8: d7:4c:f2:75:ae:67:9b:64:8a:57:4e:e4:84:61:a7:81: 1f:ea:bf:07:84:b3:97:17:fc:09:f0:36:d4:d8:9b:82: 91:2e:c6:45:2b:7b:a0:89:c5:b9:86:3f:05:c9:c7:0c: 55:68:60:db:e5:9c:05:db:d1:77:7f:c4:2a:46:92:da: 8a:7c:d5:82:3e:cc:fe:41:98:01:9e:0b:81:c4:ed:b3: ae:e1:e3:08:84:61:7f:a8:f2:a4:81:90:39:2f:a0:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:06:c6:eb:e0:45:6e:4a:d0:f8:91:f2:7b:ef:93:f0: 02:fd:54:72:06:42:e1:da:68:ff:d8:01:c9:60:cc:8c: a8:26:48:2c:dc:ea:cd:66:23:49:20:fa:ad:94:77:46: e8:70:e0:e8:7d:41:3a:6d:15:f2:6e:26:19:3d:22:77: 99:f9:f5:bc:fc:24:45:ce:5b:57:89:65:bc:a1:6e:6c: 64:e6:a9:f0:79:f4:a9:a3:50:f6:f6:e0:ba:4f:4a:55: da:5a:74:33:6d:24:83:f6:c9:45:4a:36:e4:2c:7b:2f: 52:c7:37:a6:d1:fa:76:19:53:98:92:14:99:6d:0c:63: 7d:d3:7f:19:9a:df:54:5f:ff:60:00:28:d8:b9:d4:f9: a9:43:0f:b7:00:66:7d:d8:c9:8f:a9:2f:a4:65:01:3b: 41:ce:87:ee:84:e5:36:b5:fc:a9:c6:1c:16:c9:99:af: e4:1f:01:87:f8:9c:73:c4:40:70:5a:9d:9a:6e:de:0f: 95:09:88:d4:c9:06:91:78:b1:b0:4d:9a:25:d0:d0:5c: f6:d5:eb:e9:8c:aa:39:69:8c:ad:96:5c:8d:21:12:5f: 47:9e:58:d1:19:c9:33:7e:7e:1c:35:21:b6:4b:b3:a8: a7:95:91:62:a9:97:ed:7c:2f:59:e6:fb:37:17:6e:15 Fingerprint (SHA-256): E1:1D:AD:40:54:94:D3:11:6A:13:05:82:60:15:18:DA:45:0C:19:C4:7D:F1:D5:C0:7E:B6:4C:78:35:DF:EE:95 Fingerprint (SHA1): 03:87:91:CC:31:60:25:08:39:7B:AD:72:0B:17:64:D0:BE:BF:AA:75 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #14067: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #14068: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195640 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14069: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #14070: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14071: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14072: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 331195641 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14073: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14074: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14075: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14076: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331195642 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14077: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14078: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #14079: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14080: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 331195643 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14081: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14082: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #14083: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14084: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 331195644 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14085: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14086: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #14087: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14088: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 331195645 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14089: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14090: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #14091: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14092: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 331195646 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14093: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14094: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14095: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #14096: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #14097: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #14098: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #14099: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195640 (0x13bda4f8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:08:20 2017 Not After : Thu Mar 31 20:08:20 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:6b:b7:e7:7d:e1:fc:15:14:6c:a8:61:17:90:68:4e: ba:56:c4:44:db:57:2d:19:b4:f3:07:0b:e8:58:48:30: 2a:32:37:f3:e5:70:2f:d4:c1:ac:88:c1:83:17:a1:a2: 8a:13:4e:e8:fb:2d:98:14:72:13:f7:41:90:27:34:69: dd:2a:06:ed:a4:44:12:a8:95:45:c2:ac:fe:e6:5a:e8: df:8e:dc:8a:d2:0b:cd:19:ec:64:cf:1d:23:f1:0c:d8: 40:61:6f:14:42:74:f7:4f:31:31:d0:cf:2a:a6:bf:07: 75:36:1f:78:23:d2:c7:61:c8:22:7c:e3:ed:65:79:89: c4:6d:5c:8e:7d:05:15:92:30:ae:c6:9b:d0:76:c9:c6: 23:e3:7d:1b:00:09:22:32:64:da:e9:99:3b:e4:6e:e6: 6a:7b:90:88:d5:e0:48:3d:51:6b:8c:09:eb:7b:91:20: 39:50:6f:f4:b6:61:59:be:d3:19:1f:c3:ea:0e:b4:7e: 3c:5b:97:73:bf:87:5e:6d:3c:49:8a:e1:43:91:cd:62: b8:91:ac:94:dc:81:c0:df:ad:7a:93:0f:df:b2:30:34: bc:ba:58:91:02:3c:ae:1b:cf:ff:b9:a5:10:fa:11:9e: 70:27:34:4e:95:5f:8b:29:90:f1:9f:5b:ca:2c:6c:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:8d:04:4c:24:30:4b:d7:34:d7:88:63:4d:06:64:66: 55:99:25:12:e0:e4:4a:ab:f2:5e:8e:23:b0:0d:8a:b3: dd:a2:49:e5:bf:ec:96:70:ce:e8:d2:47:92:a6:50:60: c6:bf:a7:33:8b:11:2c:36:2b:e7:8b:d2:1b:55:82:6f: 77:86:92:1b:64:f0:12:44:14:45:e5:87:4c:f7:5a:7e: 4b:32:fd:05:29:06:2e:9b:86:63:29:65:b9:33:d1:f1: 8f:b3:ea:b4:76:22:2c:35:c3:fa:4b:c2:a2:5e:48:34: a9:e3:38:08:f1:47:e4:a3:c0:39:73:af:9e:10:9a:78: 94:b8:54:2f:81:4a:b0:67:18:dd:b3:84:98:7e:7b:82: 4d:84:af:53:d9:fe:10:69:c0:89:fb:94:5c:3f:40:40: 6e:60:b7:45:42:1c:27:f1:d7:d9:43:a7:3f:c9:c3:16: 88:d9:f0:40:d4:2f:3d:0f:f1:61:b3:03:84:16:e0:c3: 66:5c:3e:de:9d:af:66:c8:e1:12:5d:6e:30:a4:40:68: c1:f1:79:4a:2b:c1:2f:ed:f6:75:87:6c:b1:46:ed:64: 1b:3e:0c:5c:bb:3e:ee:60:e8:28:3d:f8:82:45:49:44: 57:82:fe:63:ed:9e:4e:b6:6c:1a:18:06:14:6a:1d:96 Fingerprint (SHA-256): A6:59:58:39:D6:81:BB:D2:EF:52:80:7F:2D:64:CE:F2:6A:9F:88:8E:5A:0B:8F:F7:9E:AD:0F:14:31:65:F2:E7 Fingerprint (SHA1): 6F:45:55:74:F0:36:54:2E:0E:92:08:6A:BC:AF:DA:79:57:0A:1D:94 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14100: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14101: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14102: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14103: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195640 (0x13bda4f8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:08:20 2017 Not After : Thu Mar 31 20:08:20 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:6b:b7:e7:7d:e1:fc:15:14:6c:a8:61:17:90:68:4e: ba:56:c4:44:db:57:2d:19:b4:f3:07:0b:e8:58:48:30: 2a:32:37:f3:e5:70:2f:d4:c1:ac:88:c1:83:17:a1:a2: 8a:13:4e:e8:fb:2d:98:14:72:13:f7:41:90:27:34:69: dd:2a:06:ed:a4:44:12:a8:95:45:c2:ac:fe:e6:5a:e8: df:8e:dc:8a:d2:0b:cd:19:ec:64:cf:1d:23:f1:0c:d8: 40:61:6f:14:42:74:f7:4f:31:31:d0:cf:2a:a6:bf:07: 75:36:1f:78:23:d2:c7:61:c8:22:7c:e3:ed:65:79:89: c4:6d:5c:8e:7d:05:15:92:30:ae:c6:9b:d0:76:c9:c6: 23:e3:7d:1b:00:09:22:32:64:da:e9:99:3b:e4:6e:e6: 6a:7b:90:88:d5:e0:48:3d:51:6b:8c:09:eb:7b:91:20: 39:50:6f:f4:b6:61:59:be:d3:19:1f:c3:ea:0e:b4:7e: 3c:5b:97:73:bf:87:5e:6d:3c:49:8a:e1:43:91:cd:62: b8:91:ac:94:dc:81:c0:df:ad:7a:93:0f:df:b2:30:34: bc:ba:58:91:02:3c:ae:1b:cf:ff:b9:a5:10:fa:11:9e: 70:27:34:4e:95:5f:8b:29:90:f1:9f:5b:ca:2c:6c:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:8d:04:4c:24:30:4b:d7:34:d7:88:63:4d:06:64:66: 55:99:25:12:e0:e4:4a:ab:f2:5e:8e:23:b0:0d:8a:b3: dd:a2:49:e5:bf:ec:96:70:ce:e8:d2:47:92:a6:50:60: c6:bf:a7:33:8b:11:2c:36:2b:e7:8b:d2:1b:55:82:6f: 77:86:92:1b:64:f0:12:44:14:45:e5:87:4c:f7:5a:7e: 4b:32:fd:05:29:06:2e:9b:86:63:29:65:b9:33:d1:f1: 8f:b3:ea:b4:76:22:2c:35:c3:fa:4b:c2:a2:5e:48:34: a9:e3:38:08:f1:47:e4:a3:c0:39:73:af:9e:10:9a:78: 94:b8:54:2f:81:4a:b0:67:18:dd:b3:84:98:7e:7b:82: 4d:84:af:53:d9:fe:10:69:c0:89:fb:94:5c:3f:40:40: 6e:60:b7:45:42:1c:27:f1:d7:d9:43:a7:3f:c9:c3:16: 88:d9:f0:40:d4:2f:3d:0f:f1:61:b3:03:84:16:e0:c3: 66:5c:3e:de:9d:af:66:c8:e1:12:5d:6e:30:a4:40:68: c1:f1:79:4a:2b:c1:2f:ed:f6:75:87:6c:b1:46:ed:64: 1b:3e:0c:5c:bb:3e:ee:60:e8:28:3d:f8:82:45:49:44: 57:82:fe:63:ed:9e:4e:b6:6c:1a:18:06:14:6a:1d:96 Fingerprint (SHA-256): A6:59:58:39:D6:81:BB:D2:EF:52:80:7F:2D:64:CE:F2:6A:9F:88:8E:5A:0B:8F:F7:9E:AD:0F:14:31:65:F2:E7 Fingerprint (SHA1): 6F:45:55:74:F0:36:54:2E:0E:92:08:6A:BC:AF:DA:79:57:0A:1D:94 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14104: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14105: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #14106: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195647 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14107: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #14108: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14109: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14110: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 331195648 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14111: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14112: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #14113: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14114: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 331195649 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14115: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14116: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #14117: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14118: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 331195650 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14119: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14120: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14121: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14122: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 331195651 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14123: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14124: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #14125: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14126: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 331195652 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14127: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14128: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #14129: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14130: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 331195653 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14131: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14132: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14133: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14134: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 331195654 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14135: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14136: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #14137: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14138: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 331195655 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14139: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14140: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #14141: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14142: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 331195656 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14143: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14144: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #14145: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14146: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 331195657 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14147: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14148: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #14149: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14150: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 331195658 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14151: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14152: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #14153: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14154: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 331195659 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14155: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14156: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #14157: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14158: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 331195660 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14159: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14160: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #14161: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14162: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 331195661 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14163: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14164: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #14165: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14166: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 331195662 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14167: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14168: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #14169: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14170: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 331195663 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14171: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14172: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #14173: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14174: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 331195664 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14175: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14176: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #14177: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14178: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 331195665 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14179: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14180: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #14181: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14182: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 331195666 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14183: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14184: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #14185: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14186: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 331195667 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14187: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14188: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #14189: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14190: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 331195668 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14191: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14192: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #14193: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14194: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 331195669 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14195: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14196: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #14197: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14198: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 331195670 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14199: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14200: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #14201: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14202: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 331195671 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14203: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14204: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #14205: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14206: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 331195672 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14207: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14208: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #14209: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14210: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 331195673 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14211: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14212: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #14213: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14214: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 331195674 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14215: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14216: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #14217: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14218: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 331195675 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14219: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14220: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #14221: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14222: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 331195676 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14223: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14224: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14225: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195647 (0x13bda4ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:10:38 2017 Not After : Thu Mar 31 20:10:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:cc:d6:f8:16:6f:17:c0:1b:84:0f:1a:48:2f:f0:c6: 4c:ca:e2:f4:83:07:74:42:85:9e:b4:29:6c:d0:ce:63: 14:bb:bc:09:f0:73:ac:01:d5:6e:ce:d3:d0:2f:49:af: 7f:8e:5a:fd:18:1e:c5:ca:93:54:fb:4b:09:e3:c2:00: 91:56:8f:bd:82:14:ab:75:aa:c1:36:65:9b:0e:29:0a: 3d:5f:7e:d0:19:49:d7:fe:65:df:d8:03:fb:f4:ae:be: c5:a1:4b:cc:b8:93:48:d9:9b:ae:c3:ea:86:98:91:9e: 07:d1:a9:86:1d:6f:60:ba:d8:c7:c4:24:40:58:47:bb: 8f:fe:c5:18:77:1a:9a:52:c1:ec:ea:9c:f1:81:de:45: 63:e7:f8:05:7c:0c:e0:ed:f4:27:dd:22:f1:f7:fe:5e: 39:d2:d1:d9:48:a0:0b:f3:90:67:cf:2f:fe:fc:01:2c: cf:ea:0a:c4:96:8d:7b:5b:80:ae:2a:cd:0d:ed:0c:c0: 9d:a8:3b:df:50:27:94:ef:14:ea:77:66:8e:04:01:e9: b0:97:77:d3:87:54:7a:24:5f:91:e3:96:52:42:83:2d: de:a3:87:2c:cd:a5:ec:b2:86:15:19:6a:67:8a:b1:76: 6d:76:aa:92:1f:a3:de:93:ca:c0:50:e8:11:3c:1e:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:77:06:43:4d:fd:42:b1:92:92:ae:d6:5b:b1:a7:cd: bb:37:6d:42:fe:fe:fd:76:4e:13:74:5d:43:0c:46:43: 3b:2c:d8:89:1f:a6:b2:84:26:48:45:e7:67:b6:e0:92: 6c:9e:7a:b1:53:78:82:1e:34:53:1e:fd:f1:e8:a5:5a: 1e:73:19:c5:73:8a:7a:94:f7:f3:a1:60:d5:53:4e:c8: e8:47:e6:e4:bf:bf:37:62:05:a2:a1:55:fa:73:c9:9c: e4:d2:40:5b:a0:ad:0a:26:62:ad:5f:2d:d1:1c:8c:5c: 01:f9:f8:ff:52:2b:1c:30:00:62:74:49:3e:a0:b2:ff: 2f:29:e4:3a:35:7c:97:ca:a9:31:96:9e:c1:85:b2:19: 34:dc:cd:5a:de:37:82:d3:62:7d:aa:2f:ed:77:39:cc: 06:9c:cc:4c:a7:3f:af:69:30:c0:63:eb:f3:40:e6:25: e0:9b:e2:fa:4b:43:3d:f5:d5:12:cb:aa:14:e0:1d:e3: ba:72:7a:03:20:ce:fa:3e:e8:dc:f2:fe:04:97:fa:fd: 39:33:76:b4:b4:02:af:72:98:35:ed:d5:e7:6e:d2:1d: 0d:8a:9e:73:ce:1c:bb:00:19:0e:22:6a:9f:b5:41:ba: 12:ac:0e:12:b9:99:32:38:84:63:5a:e6:af:27:c9:fd Fingerprint (SHA-256): 3C:E9:1D:B7:23:20:C2:59:ED:A1:EB:8B:7F:0D:76:BC:FD:B6:F0:A5:7C:BC:37:28:02:89:F5:CB:23:18:3E:6E Fingerprint (SHA1): 1E:CB:4A:EF:33:32:37:08:AB:F5:30:4D:9B:DE:67:CD:F2:BA:C9:75 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14226: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14227: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195647 (0x13bda4ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:10:38 2017 Not After : Thu Mar 31 20:10:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:cc:d6:f8:16:6f:17:c0:1b:84:0f:1a:48:2f:f0:c6: 4c:ca:e2:f4:83:07:74:42:85:9e:b4:29:6c:d0:ce:63: 14:bb:bc:09:f0:73:ac:01:d5:6e:ce:d3:d0:2f:49:af: 7f:8e:5a:fd:18:1e:c5:ca:93:54:fb:4b:09:e3:c2:00: 91:56:8f:bd:82:14:ab:75:aa:c1:36:65:9b:0e:29:0a: 3d:5f:7e:d0:19:49:d7:fe:65:df:d8:03:fb:f4:ae:be: c5:a1:4b:cc:b8:93:48:d9:9b:ae:c3:ea:86:98:91:9e: 07:d1:a9:86:1d:6f:60:ba:d8:c7:c4:24:40:58:47:bb: 8f:fe:c5:18:77:1a:9a:52:c1:ec:ea:9c:f1:81:de:45: 63:e7:f8:05:7c:0c:e0:ed:f4:27:dd:22:f1:f7:fe:5e: 39:d2:d1:d9:48:a0:0b:f3:90:67:cf:2f:fe:fc:01:2c: cf:ea:0a:c4:96:8d:7b:5b:80:ae:2a:cd:0d:ed:0c:c0: 9d:a8:3b:df:50:27:94:ef:14:ea:77:66:8e:04:01:e9: b0:97:77:d3:87:54:7a:24:5f:91:e3:96:52:42:83:2d: de:a3:87:2c:cd:a5:ec:b2:86:15:19:6a:67:8a:b1:76: 6d:76:aa:92:1f:a3:de:93:ca:c0:50:e8:11:3c:1e:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:77:06:43:4d:fd:42:b1:92:92:ae:d6:5b:b1:a7:cd: bb:37:6d:42:fe:fe:fd:76:4e:13:74:5d:43:0c:46:43: 3b:2c:d8:89:1f:a6:b2:84:26:48:45:e7:67:b6:e0:92: 6c:9e:7a:b1:53:78:82:1e:34:53:1e:fd:f1:e8:a5:5a: 1e:73:19:c5:73:8a:7a:94:f7:f3:a1:60:d5:53:4e:c8: e8:47:e6:e4:bf:bf:37:62:05:a2:a1:55:fa:73:c9:9c: e4:d2:40:5b:a0:ad:0a:26:62:ad:5f:2d:d1:1c:8c:5c: 01:f9:f8:ff:52:2b:1c:30:00:62:74:49:3e:a0:b2:ff: 2f:29:e4:3a:35:7c:97:ca:a9:31:96:9e:c1:85:b2:19: 34:dc:cd:5a:de:37:82:d3:62:7d:aa:2f:ed:77:39:cc: 06:9c:cc:4c:a7:3f:af:69:30:c0:63:eb:f3:40:e6:25: e0:9b:e2:fa:4b:43:3d:f5:d5:12:cb:aa:14:e0:1d:e3: ba:72:7a:03:20:ce:fa:3e:e8:dc:f2:fe:04:97:fa:fd: 39:33:76:b4:b4:02:af:72:98:35:ed:d5:e7:6e:d2:1d: 0d:8a:9e:73:ce:1c:bb:00:19:0e:22:6a:9f:b5:41:ba: 12:ac:0e:12:b9:99:32:38:84:63:5a:e6:af:27:c9:fd Fingerprint (SHA-256): 3C:E9:1D:B7:23:20:C2:59:ED:A1:EB:8B:7F:0D:76:BC:FD:B6:F0:A5:7C:BC:37:28:02:89:F5:CB:23:18:3E:6E Fingerprint (SHA1): 1E:CB:4A:EF:33:32:37:08:AB:F5:30:4D:9B:DE:67:CD:F2:BA:C9:75 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14228: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14229: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14230: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14231: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195647 (0x13bda4ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:10:38 2017 Not After : Thu Mar 31 20:10:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:cc:d6:f8:16:6f:17:c0:1b:84:0f:1a:48:2f:f0:c6: 4c:ca:e2:f4:83:07:74:42:85:9e:b4:29:6c:d0:ce:63: 14:bb:bc:09:f0:73:ac:01:d5:6e:ce:d3:d0:2f:49:af: 7f:8e:5a:fd:18:1e:c5:ca:93:54:fb:4b:09:e3:c2:00: 91:56:8f:bd:82:14:ab:75:aa:c1:36:65:9b:0e:29:0a: 3d:5f:7e:d0:19:49:d7:fe:65:df:d8:03:fb:f4:ae:be: c5:a1:4b:cc:b8:93:48:d9:9b:ae:c3:ea:86:98:91:9e: 07:d1:a9:86:1d:6f:60:ba:d8:c7:c4:24:40:58:47:bb: 8f:fe:c5:18:77:1a:9a:52:c1:ec:ea:9c:f1:81:de:45: 63:e7:f8:05:7c:0c:e0:ed:f4:27:dd:22:f1:f7:fe:5e: 39:d2:d1:d9:48:a0:0b:f3:90:67:cf:2f:fe:fc:01:2c: cf:ea:0a:c4:96:8d:7b:5b:80:ae:2a:cd:0d:ed:0c:c0: 9d:a8:3b:df:50:27:94:ef:14:ea:77:66:8e:04:01:e9: b0:97:77:d3:87:54:7a:24:5f:91:e3:96:52:42:83:2d: de:a3:87:2c:cd:a5:ec:b2:86:15:19:6a:67:8a:b1:76: 6d:76:aa:92:1f:a3:de:93:ca:c0:50:e8:11:3c:1e:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:77:06:43:4d:fd:42:b1:92:92:ae:d6:5b:b1:a7:cd: bb:37:6d:42:fe:fe:fd:76:4e:13:74:5d:43:0c:46:43: 3b:2c:d8:89:1f:a6:b2:84:26:48:45:e7:67:b6:e0:92: 6c:9e:7a:b1:53:78:82:1e:34:53:1e:fd:f1:e8:a5:5a: 1e:73:19:c5:73:8a:7a:94:f7:f3:a1:60:d5:53:4e:c8: e8:47:e6:e4:bf:bf:37:62:05:a2:a1:55:fa:73:c9:9c: e4:d2:40:5b:a0:ad:0a:26:62:ad:5f:2d:d1:1c:8c:5c: 01:f9:f8:ff:52:2b:1c:30:00:62:74:49:3e:a0:b2:ff: 2f:29:e4:3a:35:7c:97:ca:a9:31:96:9e:c1:85:b2:19: 34:dc:cd:5a:de:37:82:d3:62:7d:aa:2f:ed:77:39:cc: 06:9c:cc:4c:a7:3f:af:69:30:c0:63:eb:f3:40:e6:25: e0:9b:e2:fa:4b:43:3d:f5:d5:12:cb:aa:14:e0:1d:e3: ba:72:7a:03:20:ce:fa:3e:e8:dc:f2:fe:04:97:fa:fd: 39:33:76:b4:b4:02:af:72:98:35:ed:d5:e7:6e:d2:1d: 0d:8a:9e:73:ce:1c:bb:00:19:0e:22:6a:9f:b5:41:ba: 12:ac:0e:12:b9:99:32:38:84:63:5a:e6:af:27:c9:fd Fingerprint (SHA-256): 3C:E9:1D:B7:23:20:C2:59:ED:A1:EB:8B:7F:0D:76:BC:FD:B6:F0:A5:7C:BC:37:28:02:89:F5:CB:23:18:3E:6E Fingerprint (SHA1): 1E:CB:4A:EF:33:32:37:08:AB:F5:30:4D:9B:DE:67:CD:F2:BA:C9:75 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14232: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14233: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14234: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14235: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195647 (0x13bda4ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:10:38 2017 Not After : Thu Mar 31 20:10:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:cc:d6:f8:16:6f:17:c0:1b:84:0f:1a:48:2f:f0:c6: 4c:ca:e2:f4:83:07:74:42:85:9e:b4:29:6c:d0:ce:63: 14:bb:bc:09:f0:73:ac:01:d5:6e:ce:d3:d0:2f:49:af: 7f:8e:5a:fd:18:1e:c5:ca:93:54:fb:4b:09:e3:c2:00: 91:56:8f:bd:82:14:ab:75:aa:c1:36:65:9b:0e:29:0a: 3d:5f:7e:d0:19:49:d7:fe:65:df:d8:03:fb:f4:ae:be: c5:a1:4b:cc:b8:93:48:d9:9b:ae:c3:ea:86:98:91:9e: 07:d1:a9:86:1d:6f:60:ba:d8:c7:c4:24:40:58:47:bb: 8f:fe:c5:18:77:1a:9a:52:c1:ec:ea:9c:f1:81:de:45: 63:e7:f8:05:7c:0c:e0:ed:f4:27:dd:22:f1:f7:fe:5e: 39:d2:d1:d9:48:a0:0b:f3:90:67:cf:2f:fe:fc:01:2c: cf:ea:0a:c4:96:8d:7b:5b:80:ae:2a:cd:0d:ed:0c:c0: 9d:a8:3b:df:50:27:94:ef:14:ea:77:66:8e:04:01:e9: b0:97:77:d3:87:54:7a:24:5f:91:e3:96:52:42:83:2d: de:a3:87:2c:cd:a5:ec:b2:86:15:19:6a:67:8a:b1:76: 6d:76:aa:92:1f:a3:de:93:ca:c0:50:e8:11:3c:1e:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:77:06:43:4d:fd:42:b1:92:92:ae:d6:5b:b1:a7:cd: bb:37:6d:42:fe:fe:fd:76:4e:13:74:5d:43:0c:46:43: 3b:2c:d8:89:1f:a6:b2:84:26:48:45:e7:67:b6:e0:92: 6c:9e:7a:b1:53:78:82:1e:34:53:1e:fd:f1:e8:a5:5a: 1e:73:19:c5:73:8a:7a:94:f7:f3:a1:60:d5:53:4e:c8: e8:47:e6:e4:bf:bf:37:62:05:a2:a1:55:fa:73:c9:9c: e4:d2:40:5b:a0:ad:0a:26:62:ad:5f:2d:d1:1c:8c:5c: 01:f9:f8:ff:52:2b:1c:30:00:62:74:49:3e:a0:b2:ff: 2f:29:e4:3a:35:7c:97:ca:a9:31:96:9e:c1:85:b2:19: 34:dc:cd:5a:de:37:82:d3:62:7d:aa:2f:ed:77:39:cc: 06:9c:cc:4c:a7:3f:af:69:30:c0:63:eb:f3:40:e6:25: e0:9b:e2:fa:4b:43:3d:f5:d5:12:cb:aa:14:e0:1d:e3: ba:72:7a:03:20:ce:fa:3e:e8:dc:f2:fe:04:97:fa:fd: 39:33:76:b4:b4:02:af:72:98:35:ed:d5:e7:6e:d2:1d: 0d:8a:9e:73:ce:1c:bb:00:19:0e:22:6a:9f:b5:41:ba: 12:ac:0e:12:b9:99:32:38:84:63:5a:e6:af:27:c9:fd Fingerprint (SHA-256): 3C:E9:1D:B7:23:20:C2:59:ED:A1:EB:8B:7F:0D:76:BC:FD:B6:F0:A5:7C:BC:37:28:02:89:F5:CB:23:18:3E:6E Fingerprint (SHA1): 1E:CB:4A:EF:33:32:37:08:AB:F5:30:4D:9B:DE:67:CD:F2:BA:C9:75 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14236: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195647 (0x13bda4ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:10:38 2017 Not After : Thu Mar 31 20:10:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:cc:d6:f8:16:6f:17:c0:1b:84:0f:1a:48:2f:f0:c6: 4c:ca:e2:f4:83:07:74:42:85:9e:b4:29:6c:d0:ce:63: 14:bb:bc:09:f0:73:ac:01:d5:6e:ce:d3:d0:2f:49:af: 7f:8e:5a:fd:18:1e:c5:ca:93:54:fb:4b:09:e3:c2:00: 91:56:8f:bd:82:14:ab:75:aa:c1:36:65:9b:0e:29:0a: 3d:5f:7e:d0:19:49:d7:fe:65:df:d8:03:fb:f4:ae:be: c5:a1:4b:cc:b8:93:48:d9:9b:ae:c3:ea:86:98:91:9e: 07:d1:a9:86:1d:6f:60:ba:d8:c7:c4:24:40:58:47:bb: 8f:fe:c5:18:77:1a:9a:52:c1:ec:ea:9c:f1:81:de:45: 63:e7:f8:05:7c:0c:e0:ed:f4:27:dd:22:f1:f7:fe:5e: 39:d2:d1:d9:48:a0:0b:f3:90:67:cf:2f:fe:fc:01:2c: cf:ea:0a:c4:96:8d:7b:5b:80:ae:2a:cd:0d:ed:0c:c0: 9d:a8:3b:df:50:27:94:ef:14:ea:77:66:8e:04:01:e9: b0:97:77:d3:87:54:7a:24:5f:91:e3:96:52:42:83:2d: de:a3:87:2c:cd:a5:ec:b2:86:15:19:6a:67:8a:b1:76: 6d:76:aa:92:1f:a3:de:93:ca:c0:50:e8:11:3c:1e:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:77:06:43:4d:fd:42:b1:92:92:ae:d6:5b:b1:a7:cd: bb:37:6d:42:fe:fe:fd:76:4e:13:74:5d:43:0c:46:43: 3b:2c:d8:89:1f:a6:b2:84:26:48:45:e7:67:b6:e0:92: 6c:9e:7a:b1:53:78:82:1e:34:53:1e:fd:f1:e8:a5:5a: 1e:73:19:c5:73:8a:7a:94:f7:f3:a1:60:d5:53:4e:c8: e8:47:e6:e4:bf:bf:37:62:05:a2:a1:55:fa:73:c9:9c: e4:d2:40:5b:a0:ad:0a:26:62:ad:5f:2d:d1:1c:8c:5c: 01:f9:f8:ff:52:2b:1c:30:00:62:74:49:3e:a0:b2:ff: 2f:29:e4:3a:35:7c:97:ca:a9:31:96:9e:c1:85:b2:19: 34:dc:cd:5a:de:37:82:d3:62:7d:aa:2f:ed:77:39:cc: 06:9c:cc:4c:a7:3f:af:69:30:c0:63:eb:f3:40:e6:25: e0:9b:e2:fa:4b:43:3d:f5:d5:12:cb:aa:14:e0:1d:e3: ba:72:7a:03:20:ce:fa:3e:e8:dc:f2:fe:04:97:fa:fd: 39:33:76:b4:b4:02:af:72:98:35:ed:d5:e7:6e:d2:1d: 0d:8a:9e:73:ce:1c:bb:00:19:0e:22:6a:9f:b5:41:ba: 12:ac:0e:12:b9:99:32:38:84:63:5a:e6:af:27:c9:fd Fingerprint (SHA-256): 3C:E9:1D:B7:23:20:C2:59:ED:A1:EB:8B:7F:0D:76:BC:FD:B6:F0:A5:7C:BC:37:28:02:89:F5:CB:23:18:3E:6E Fingerprint (SHA1): 1E:CB:4A:EF:33:32:37:08:AB:F5:30:4D:9B:DE:67:CD:F2:BA:C9:75 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14237: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14238: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195647 (0x13bda4ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:10:38 2017 Not After : Thu Mar 31 20:10:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:cc:d6:f8:16:6f:17:c0:1b:84:0f:1a:48:2f:f0:c6: 4c:ca:e2:f4:83:07:74:42:85:9e:b4:29:6c:d0:ce:63: 14:bb:bc:09:f0:73:ac:01:d5:6e:ce:d3:d0:2f:49:af: 7f:8e:5a:fd:18:1e:c5:ca:93:54:fb:4b:09:e3:c2:00: 91:56:8f:bd:82:14:ab:75:aa:c1:36:65:9b:0e:29:0a: 3d:5f:7e:d0:19:49:d7:fe:65:df:d8:03:fb:f4:ae:be: c5:a1:4b:cc:b8:93:48:d9:9b:ae:c3:ea:86:98:91:9e: 07:d1:a9:86:1d:6f:60:ba:d8:c7:c4:24:40:58:47:bb: 8f:fe:c5:18:77:1a:9a:52:c1:ec:ea:9c:f1:81:de:45: 63:e7:f8:05:7c:0c:e0:ed:f4:27:dd:22:f1:f7:fe:5e: 39:d2:d1:d9:48:a0:0b:f3:90:67:cf:2f:fe:fc:01:2c: cf:ea:0a:c4:96:8d:7b:5b:80:ae:2a:cd:0d:ed:0c:c0: 9d:a8:3b:df:50:27:94:ef:14:ea:77:66:8e:04:01:e9: b0:97:77:d3:87:54:7a:24:5f:91:e3:96:52:42:83:2d: de:a3:87:2c:cd:a5:ec:b2:86:15:19:6a:67:8a:b1:76: 6d:76:aa:92:1f:a3:de:93:ca:c0:50:e8:11:3c:1e:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:77:06:43:4d:fd:42:b1:92:92:ae:d6:5b:b1:a7:cd: bb:37:6d:42:fe:fe:fd:76:4e:13:74:5d:43:0c:46:43: 3b:2c:d8:89:1f:a6:b2:84:26:48:45:e7:67:b6:e0:92: 6c:9e:7a:b1:53:78:82:1e:34:53:1e:fd:f1:e8:a5:5a: 1e:73:19:c5:73:8a:7a:94:f7:f3:a1:60:d5:53:4e:c8: e8:47:e6:e4:bf:bf:37:62:05:a2:a1:55:fa:73:c9:9c: e4:d2:40:5b:a0:ad:0a:26:62:ad:5f:2d:d1:1c:8c:5c: 01:f9:f8:ff:52:2b:1c:30:00:62:74:49:3e:a0:b2:ff: 2f:29:e4:3a:35:7c:97:ca:a9:31:96:9e:c1:85:b2:19: 34:dc:cd:5a:de:37:82:d3:62:7d:aa:2f:ed:77:39:cc: 06:9c:cc:4c:a7:3f:af:69:30:c0:63:eb:f3:40:e6:25: e0:9b:e2:fa:4b:43:3d:f5:d5:12:cb:aa:14:e0:1d:e3: ba:72:7a:03:20:ce:fa:3e:e8:dc:f2:fe:04:97:fa:fd: 39:33:76:b4:b4:02:af:72:98:35:ed:d5:e7:6e:d2:1d: 0d:8a:9e:73:ce:1c:bb:00:19:0e:22:6a:9f:b5:41:ba: 12:ac:0e:12:b9:99:32:38:84:63:5a:e6:af:27:c9:fd Fingerprint (SHA-256): 3C:E9:1D:B7:23:20:C2:59:ED:A1:EB:8B:7F:0D:76:BC:FD:B6:F0:A5:7C:BC:37:28:02:89:F5:CB:23:18:3E:6E Fingerprint (SHA1): 1E:CB:4A:EF:33:32:37:08:AB:F5:30:4D:9B:DE:67:CD:F2:BA:C9:75 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14239: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14240: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14241: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14242: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195647 (0x13bda4ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:10:38 2017 Not After : Thu Mar 31 20:10:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:cc:d6:f8:16:6f:17:c0:1b:84:0f:1a:48:2f:f0:c6: 4c:ca:e2:f4:83:07:74:42:85:9e:b4:29:6c:d0:ce:63: 14:bb:bc:09:f0:73:ac:01:d5:6e:ce:d3:d0:2f:49:af: 7f:8e:5a:fd:18:1e:c5:ca:93:54:fb:4b:09:e3:c2:00: 91:56:8f:bd:82:14:ab:75:aa:c1:36:65:9b:0e:29:0a: 3d:5f:7e:d0:19:49:d7:fe:65:df:d8:03:fb:f4:ae:be: c5:a1:4b:cc:b8:93:48:d9:9b:ae:c3:ea:86:98:91:9e: 07:d1:a9:86:1d:6f:60:ba:d8:c7:c4:24:40:58:47:bb: 8f:fe:c5:18:77:1a:9a:52:c1:ec:ea:9c:f1:81:de:45: 63:e7:f8:05:7c:0c:e0:ed:f4:27:dd:22:f1:f7:fe:5e: 39:d2:d1:d9:48:a0:0b:f3:90:67:cf:2f:fe:fc:01:2c: cf:ea:0a:c4:96:8d:7b:5b:80:ae:2a:cd:0d:ed:0c:c0: 9d:a8:3b:df:50:27:94:ef:14:ea:77:66:8e:04:01:e9: b0:97:77:d3:87:54:7a:24:5f:91:e3:96:52:42:83:2d: de:a3:87:2c:cd:a5:ec:b2:86:15:19:6a:67:8a:b1:76: 6d:76:aa:92:1f:a3:de:93:ca:c0:50:e8:11:3c:1e:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:77:06:43:4d:fd:42:b1:92:92:ae:d6:5b:b1:a7:cd: bb:37:6d:42:fe:fe:fd:76:4e:13:74:5d:43:0c:46:43: 3b:2c:d8:89:1f:a6:b2:84:26:48:45:e7:67:b6:e0:92: 6c:9e:7a:b1:53:78:82:1e:34:53:1e:fd:f1:e8:a5:5a: 1e:73:19:c5:73:8a:7a:94:f7:f3:a1:60:d5:53:4e:c8: e8:47:e6:e4:bf:bf:37:62:05:a2:a1:55:fa:73:c9:9c: e4:d2:40:5b:a0:ad:0a:26:62:ad:5f:2d:d1:1c:8c:5c: 01:f9:f8:ff:52:2b:1c:30:00:62:74:49:3e:a0:b2:ff: 2f:29:e4:3a:35:7c:97:ca:a9:31:96:9e:c1:85:b2:19: 34:dc:cd:5a:de:37:82:d3:62:7d:aa:2f:ed:77:39:cc: 06:9c:cc:4c:a7:3f:af:69:30:c0:63:eb:f3:40:e6:25: e0:9b:e2:fa:4b:43:3d:f5:d5:12:cb:aa:14:e0:1d:e3: ba:72:7a:03:20:ce:fa:3e:e8:dc:f2:fe:04:97:fa:fd: 39:33:76:b4:b4:02:af:72:98:35:ed:d5:e7:6e:d2:1d: 0d:8a:9e:73:ce:1c:bb:00:19:0e:22:6a:9f:b5:41:ba: 12:ac:0e:12:b9:99:32:38:84:63:5a:e6:af:27:c9:fd Fingerprint (SHA-256): 3C:E9:1D:B7:23:20:C2:59:ED:A1:EB:8B:7F:0D:76:BC:FD:B6:F0:A5:7C:BC:37:28:02:89:F5:CB:23:18:3E:6E Fingerprint (SHA1): 1E:CB:4A:EF:33:32:37:08:AB:F5:30:4D:9B:DE:67:CD:F2:BA:C9:75 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14243: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195647 (0x13bda4ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:10:38 2017 Not After : Thu Mar 31 20:10:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:cc:d6:f8:16:6f:17:c0:1b:84:0f:1a:48:2f:f0:c6: 4c:ca:e2:f4:83:07:74:42:85:9e:b4:29:6c:d0:ce:63: 14:bb:bc:09:f0:73:ac:01:d5:6e:ce:d3:d0:2f:49:af: 7f:8e:5a:fd:18:1e:c5:ca:93:54:fb:4b:09:e3:c2:00: 91:56:8f:bd:82:14:ab:75:aa:c1:36:65:9b:0e:29:0a: 3d:5f:7e:d0:19:49:d7:fe:65:df:d8:03:fb:f4:ae:be: c5:a1:4b:cc:b8:93:48:d9:9b:ae:c3:ea:86:98:91:9e: 07:d1:a9:86:1d:6f:60:ba:d8:c7:c4:24:40:58:47:bb: 8f:fe:c5:18:77:1a:9a:52:c1:ec:ea:9c:f1:81:de:45: 63:e7:f8:05:7c:0c:e0:ed:f4:27:dd:22:f1:f7:fe:5e: 39:d2:d1:d9:48:a0:0b:f3:90:67:cf:2f:fe:fc:01:2c: cf:ea:0a:c4:96:8d:7b:5b:80:ae:2a:cd:0d:ed:0c:c0: 9d:a8:3b:df:50:27:94:ef:14:ea:77:66:8e:04:01:e9: b0:97:77:d3:87:54:7a:24:5f:91:e3:96:52:42:83:2d: de:a3:87:2c:cd:a5:ec:b2:86:15:19:6a:67:8a:b1:76: 6d:76:aa:92:1f:a3:de:93:ca:c0:50:e8:11:3c:1e:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:77:06:43:4d:fd:42:b1:92:92:ae:d6:5b:b1:a7:cd: bb:37:6d:42:fe:fe:fd:76:4e:13:74:5d:43:0c:46:43: 3b:2c:d8:89:1f:a6:b2:84:26:48:45:e7:67:b6:e0:92: 6c:9e:7a:b1:53:78:82:1e:34:53:1e:fd:f1:e8:a5:5a: 1e:73:19:c5:73:8a:7a:94:f7:f3:a1:60:d5:53:4e:c8: e8:47:e6:e4:bf:bf:37:62:05:a2:a1:55:fa:73:c9:9c: e4:d2:40:5b:a0:ad:0a:26:62:ad:5f:2d:d1:1c:8c:5c: 01:f9:f8:ff:52:2b:1c:30:00:62:74:49:3e:a0:b2:ff: 2f:29:e4:3a:35:7c:97:ca:a9:31:96:9e:c1:85:b2:19: 34:dc:cd:5a:de:37:82:d3:62:7d:aa:2f:ed:77:39:cc: 06:9c:cc:4c:a7:3f:af:69:30:c0:63:eb:f3:40:e6:25: e0:9b:e2:fa:4b:43:3d:f5:d5:12:cb:aa:14:e0:1d:e3: ba:72:7a:03:20:ce:fa:3e:e8:dc:f2:fe:04:97:fa:fd: 39:33:76:b4:b4:02:af:72:98:35:ed:d5:e7:6e:d2:1d: 0d:8a:9e:73:ce:1c:bb:00:19:0e:22:6a:9f:b5:41:ba: 12:ac:0e:12:b9:99:32:38:84:63:5a:e6:af:27:c9:fd Fingerprint (SHA-256): 3C:E9:1D:B7:23:20:C2:59:ED:A1:EB:8B:7F:0D:76:BC:FD:B6:F0:A5:7C:BC:37:28:02:89:F5:CB:23:18:3E:6E Fingerprint (SHA1): 1E:CB:4A:EF:33:32:37:08:AB:F5:30:4D:9B:DE:67:CD:F2:BA:C9:75 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14244: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195647 (0x13bda4ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:10:38 2017 Not After : Thu Mar 31 20:10:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:cc:d6:f8:16:6f:17:c0:1b:84:0f:1a:48:2f:f0:c6: 4c:ca:e2:f4:83:07:74:42:85:9e:b4:29:6c:d0:ce:63: 14:bb:bc:09:f0:73:ac:01:d5:6e:ce:d3:d0:2f:49:af: 7f:8e:5a:fd:18:1e:c5:ca:93:54:fb:4b:09:e3:c2:00: 91:56:8f:bd:82:14:ab:75:aa:c1:36:65:9b:0e:29:0a: 3d:5f:7e:d0:19:49:d7:fe:65:df:d8:03:fb:f4:ae:be: c5:a1:4b:cc:b8:93:48:d9:9b:ae:c3:ea:86:98:91:9e: 07:d1:a9:86:1d:6f:60:ba:d8:c7:c4:24:40:58:47:bb: 8f:fe:c5:18:77:1a:9a:52:c1:ec:ea:9c:f1:81:de:45: 63:e7:f8:05:7c:0c:e0:ed:f4:27:dd:22:f1:f7:fe:5e: 39:d2:d1:d9:48:a0:0b:f3:90:67:cf:2f:fe:fc:01:2c: cf:ea:0a:c4:96:8d:7b:5b:80:ae:2a:cd:0d:ed:0c:c0: 9d:a8:3b:df:50:27:94:ef:14:ea:77:66:8e:04:01:e9: b0:97:77:d3:87:54:7a:24:5f:91:e3:96:52:42:83:2d: de:a3:87:2c:cd:a5:ec:b2:86:15:19:6a:67:8a:b1:76: 6d:76:aa:92:1f:a3:de:93:ca:c0:50:e8:11:3c:1e:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:77:06:43:4d:fd:42:b1:92:92:ae:d6:5b:b1:a7:cd: bb:37:6d:42:fe:fe:fd:76:4e:13:74:5d:43:0c:46:43: 3b:2c:d8:89:1f:a6:b2:84:26:48:45:e7:67:b6:e0:92: 6c:9e:7a:b1:53:78:82:1e:34:53:1e:fd:f1:e8:a5:5a: 1e:73:19:c5:73:8a:7a:94:f7:f3:a1:60:d5:53:4e:c8: e8:47:e6:e4:bf:bf:37:62:05:a2:a1:55:fa:73:c9:9c: e4:d2:40:5b:a0:ad:0a:26:62:ad:5f:2d:d1:1c:8c:5c: 01:f9:f8:ff:52:2b:1c:30:00:62:74:49:3e:a0:b2:ff: 2f:29:e4:3a:35:7c:97:ca:a9:31:96:9e:c1:85:b2:19: 34:dc:cd:5a:de:37:82:d3:62:7d:aa:2f:ed:77:39:cc: 06:9c:cc:4c:a7:3f:af:69:30:c0:63:eb:f3:40:e6:25: e0:9b:e2:fa:4b:43:3d:f5:d5:12:cb:aa:14:e0:1d:e3: ba:72:7a:03:20:ce:fa:3e:e8:dc:f2:fe:04:97:fa:fd: 39:33:76:b4:b4:02:af:72:98:35:ed:d5:e7:6e:d2:1d: 0d:8a:9e:73:ce:1c:bb:00:19:0e:22:6a:9f:b5:41:ba: 12:ac:0e:12:b9:99:32:38:84:63:5a:e6:af:27:c9:fd Fingerprint (SHA-256): 3C:E9:1D:B7:23:20:C2:59:ED:A1:EB:8B:7F:0D:76:BC:FD:B6:F0:A5:7C:BC:37:28:02:89:F5:CB:23:18:3E:6E Fingerprint (SHA1): 1E:CB:4A:EF:33:32:37:08:AB:F5:30:4D:9B:DE:67:CD:F2:BA:C9:75 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14245: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195647 (0x13bda4ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:10:38 2017 Not After : Thu Mar 31 20:10:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:cc:d6:f8:16:6f:17:c0:1b:84:0f:1a:48:2f:f0:c6: 4c:ca:e2:f4:83:07:74:42:85:9e:b4:29:6c:d0:ce:63: 14:bb:bc:09:f0:73:ac:01:d5:6e:ce:d3:d0:2f:49:af: 7f:8e:5a:fd:18:1e:c5:ca:93:54:fb:4b:09:e3:c2:00: 91:56:8f:bd:82:14:ab:75:aa:c1:36:65:9b:0e:29:0a: 3d:5f:7e:d0:19:49:d7:fe:65:df:d8:03:fb:f4:ae:be: c5:a1:4b:cc:b8:93:48:d9:9b:ae:c3:ea:86:98:91:9e: 07:d1:a9:86:1d:6f:60:ba:d8:c7:c4:24:40:58:47:bb: 8f:fe:c5:18:77:1a:9a:52:c1:ec:ea:9c:f1:81:de:45: 63:e7:f8:05:7c:0c:e0:ed:f4:27:dd:22:f1:f7:fe:5e: 39:d2:d1:d9:48:a0:0b:f3:90:67:cf:2f:fe:fc:01:2c: cf:ea:0a:c4:96:8d:7b:5b:80:ae:2a:cd:0d:ed:0c:c0: 9d:a8:3b:df:50:27:94:ef:14:ea:77:66:8e:04:01:e9: b0:97:77:d3:87:54:7a:24:5f:91:e3:96:52:42:83:2d: de:a3:87:2c:cd:a5:ec:b2:86:15:19:6a:67:8a:b1:76: 6d:76:aa:92:1f:a3:de:93:ca:c0:50:e8:11:3c:1e:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:77:06:43:4d:fd:42:b1:92:92:ae:d6:5b:b1:a7:cd: bb:37:6d:42:fe:fe:fd:76:4e:13:74:5d:43:0c:46:43: 3b:2c:d8:89:1f:a6:b2:84:26:48:45:e7:67:b6:e0:92: 6c:9e:7a:b1:53:78:82:1e:34:53:1e:fd:f1:e8:a5:5a: 1e:73:19:c5:73:8a:7a:94:f7:f3:a1:60:d5:53:4e:c8: e8:47:e6:e4:bf:bf:37:62:05:a2:a1:55:fa:73:c9:9c: e4:d2:40:5b:a0:ad:0a:26:62:ad:5f:2d:d1:1c:8c:5c: 01:f9:f8:ff:52:2b:1c:30:00:62:74:49:3e:a0:b2:ff: 2f:29:e4:3a:35:7c:97:ca:a9:31:96:9e:c1:85:b2:19: 34:dc:cd:5a:de:37:82:d3:62:7d:aa:2f:ed:77:39:cc: 06:9c:cc:4c:a7:3f:af:69:30:c0:63:eb:f3:40:e6:25: e0:9b:e2:fa:4b:43:3d:f5:d5:12:cb:aa:14:e0:1d:e3: ba:72:7a:03:20:ce:fa:3e:e8:dc:f2:fe:04:97:fa:fd: 39:33:76:b4:b4:02:af:72:98:35:ed:d5:e7:6e:d2:1d: 0d:8a:9e:73:ce:1c:bb:00:19:0e:22:6a:9f:b5:41:ba: 12:ac:0e:12:b9:99:32:38:84:63:5a:e6:af:27:c9:fd Fingerprint (SHA-256): 3C:E9:1D:B7:23:20:C2:59:ED:A1:EB:8B:7F:0D:76:BC:FD:B6:F0:A5:7C:BC:37:28:02:89:F5:CB:23:18:3E:6E Fingerprint (SHA1): 1E:CB:4A:EF:33:32:37:08:AB:F5:30:4D:9B:DE:67:CD:F2:BA:C9:75 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14246: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195647 (0x13bda4ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:10:38 2017 Not After : Thu Mar 31 20:10:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:cc:d6:f8:16:6f:17:c0:1b:84:0f:1a:48:2f:f0:c6: 4c:ca:e2:f4:83:07:74:42:85:9e:b4:29:6c:d0:ce:63: 14:bb:bc:09:f0:73:ac:01:d5:6e:ce:d3:d0:2f:49:af: 7f:8e:5a:fd:18:1e:c5:ca:93:54:fb:4b:09:e3:c2:00: 91:56:8f:bd:82:14:ab:75:aa:c1:36:65:9b:0e:29:0a: 3d:5f:7e:d0:19:49:d7:fe:65:df:d8:03:fb:f4:ae:be: c5:a1:4b:cc:b8:93:48:d9:9b:ae:c3:ea:86:98:91:9e: 07:d1:a9:86:1d:6f:60:ba:d8:c7:c4:24:40:58:47:bb: 8f:fe:c5:18:77:1a:9a:52:c1:ec:ea:9c:f1:81:de:45: 63:e7:f8:05:7c:0c:e0:ed:f4:27:dd:22:f1:f7:fe:5e: 39:d2:d1:d9:48:a0:0b:f3:90:67:cf:2f:fe:fc:01:2c: cf:ea:0a:c4:96:8d:7b:5b:80:ae:2a:cd:0d:ed:0c:c0: 9d:a8:3b:df:50:27:94:ef:14:ea:77:66:8e:04:01:e9: b0:97:77:d3:87:54:7a:24:5f:91:e3:96:52:42:83:2d: de:a3:87:2c:cd:a5:ec:b2:86:15:19:6a:67:8a:b1:76: 6d:76:aa:92:1f:a3:de:93:ca:c0:50:e8:11:3c:1e:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:77:06:43:4d:fd:42:b1:92:92:ae:d6:5b:b1:a7:cd: bb:37:6d:42:fe:fe:fd:76:4e:13:74:5d:43:0c:46:43: 3b:2c:d8:89:1f:a6:b2:84:26:48:45:e7:67:b6:e0:92: 6c:9e:7a:b1:53:78:82:1e:34:53:1e:fd:f1:e8:a5:5a: 1e:73:19:c5:73:8a:7a:94:f7:f3:a1:60:d5:53:4e:c8: e8:47:e6:e4:bf:bf:37:62:05:a2:a1:55:fa:73:c9:9c: e4:d2:40:5b:a0:ad:0a:26:62:ad:5f:2d:d1:1c:8c:5c: 01:f9:f8:ff:52:2b:1c:30:00:62:74:49:3e:a0:b2:ff: 2f:29:e4:3a:35:7c:97:ca:a9:31:96:9e:c1:85:b2:19: 34:dc:cd:5a:de:37:82:d3:62:7d:aa:2f:ed:77:39:cc: 06:9c:cc:4c:a7:3f:af:69:30:c0:63:eb:f3:40:e6:25: e0:9b:e2:fa:4b:43:3d:f5:d5:12:cb:aa:14:e0:1d:e3: ba:72:7a:03:20:ce:fa:3e:e8:dc:f2:fe:04:97:fa:fd: 39:33:76:b4:b4:02:af:72:98:35:ed:d5:e7:6e:d2:1d: 0d:8a:9e:73:ce:1c:bb:00:19:0e:22:6a:9f:b5:41:ba: 12:ac:0e:12:b9:99:32:38:84:63:5a:e6:af:27:c9:fd Fingerprint (SHA-256): 3C:E9:1D:B7:23:20:C2:59:ED:A1:EB:8B:7F:0D:76:BC:FD:B6:F0:A5:7C:BC:37:28:02:89:F5:CB:23:18:3E:6E Fingerprint (SHA1): 1E:CB:4A:EF:33:32:37:08:AB:F5:30:4D:9B:DE:67:CD:F2:BA:C9:75 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14247: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195647 (0x13bda4ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:10:38 2017 Not After : Thu Mar 31 20:10:38 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:cc:d6:f8:16:6f:17:c0:1b:84:0f:1a:48:2f:f0:c6: 4c:ca:e2:f4:83:07:74:42:85:9e:b4:29:6c:d0:ce:63: 14:bb:bc:09:f0:73:ac:01:d5:6e:ce:d3:d0:2f:49:af: 7f:8e:5a:fd:18:1e:c5:ca:93:54:fb:4b:09:e3:c2:00: 91:56:8f:bd:82:14:ab:75:aa:c1:36:65:9b:0e:29:0a: 3d:5f:7e:d0:19:49:d7:fe:65:df:d8:03:fb:f4:ae:be: c5:a1:4b:cc:b8:93:48:d9:9b:ae:c3:ea:86:98:91:9e: 07:d1:a9:86:1d:6f:60:ba:d8:c7:c4:24:40:58:47:bb: 8f:fe:c5:18:77:1a:9a:52:c1:ec:ea:9c:f1:81:de:45: 63:e7:f8:05:7c:0c:e0:ed:f4:27:dd:22:f1:f7:fe:5e: 39:d2:d1:d9:48:a0:0b:f3:90:67:cf:2f:fe:fc:01:2c: cf:ea:0a:c4:96:8d:7b:5b:80:ae:2a:cd:0d:ed:0c:c0: 9d:a8:3b:df:50:27:94:ef:14:ea:77:66:8e:04:01:e9: b0:97:77:d3:87:54:7a:24:5f:91:e3:96:52:42:83:2d: de:a3:87:2c:cd:a5:ec:b2:86:15:19:6a:67:8a:b1:76: 6d:76:aa:92:1f:a3:de:93:ca:c0:50:e8:11:3c:1e:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:77:06:43:4d:fd:42:b1:92:92:ae:d6:5b:b1:a7:cd: bb:37:6d:42:fe:fe:fd:76:4e:13:74:5d:43:0c:46:43: 3b:2c:d8:89:1f:a6:b2:84:26:48:45:e7:67:b6:e0:92: 6c:9e:7a:b1:53:78:82:1e:34:53:1e:fd:f1:e8:a5:5a: 1e:73:19:c5:73:8a:7a:94:f7:f3:a1:60:d5:53:4e:c8: e8:47:e6:e4:bf:bf:37:62:05:a2:a1:55:fa:73:c9:9c: e4:d2:40:5b:a0:ad:0a:26:62:ad:5f:2d:d1:1c:8c:5c: 01:f9:f8:ff:52:2b:1c:30:00:62:74:49:3e:a0:b2:ff: 2f:29:e4:3a:35:7c:97:ca:a9:31:96:9e:c1:85:b2:19: 34:dc:cd:5a:de:37:82:d3:62:7d:aa:2f:ed:77:39:cc: 06:9c:cc:4c:a7:3f:af:69:30:c0:63:eb:f3:40:e6:25: e0:9b:e2:fa:4b:43:3d:f5:d5:12:cb:aa:14:e0:1d:e3: ba:72:7a:03:20:ce:fa:3e:e8:dc:f2:fe:04:97:fa:fd: 39:33:76:b4:b4:02:af:72:98:35:ed:d5:e7:6e:d2:1d: 0d:8a:9e:73:ce:1c:bb:00:19:0e:22:6a:9f:b5:41:ba: 12:ac:0e:12:b9:99:32:38:84:63:5a:e6:af:27:c9:fd Fingerprint (SHA-256): 3C:E9:1D:B7:23:20:C2:59:ED:A1:EB:8B:7F:0D:76:BC:FD:B6:F0:A5:7C:BC:37:28:02:89:F5:CB:23:18:3E:6E Fingerprint (SHA1): 1E:CB:4A:EF:33:32:37:08:AB:F5:30:4D:9B:DE:67:CD:F2:BA:C9:75 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #14248: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14249: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14250: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195677 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14251: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14252: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #14253: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14254: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 331195678 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14255: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14256: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #14257: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14258: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 331195679 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14259: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14260: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #14261: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14262: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 331195680 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14263: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14264: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #14265: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14266: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 331195681 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14267: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14268: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #14269: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14270: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 331195682 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14271: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14272: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #14273: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14274: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 331195683 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14275: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14276: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14277: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195677 (0x13bda51d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:17:55 2017 Not After : Thu Mar 31 20:17:55 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:19:06:e7:7f:0e:39:1b:7d:0b:22:7e:0c:ee:d3:02: c4:b0:8e:19:cb:34:13:b3:14:5c:7b:94:5a:f8:a7:3a: e7:de:a5:0e:05:a3:f2:dc:f4:4f:96:91:ba:00:6f:80: 62:33:33:9a:65:56:da:c4:af:15:dc:2a:c5:58:a0:0b: f1:ca:99:e9:a4:1b:63:78:23:02:d7:4a:cd:69:de:3f: 46:94:33:65:8d:cb:ca:de:e3:da:f1:e1:b9:3f:ef:03: ea:b7:21:ef:c4:cd:12:56:93:c9:f9:e6:ab:b6:20:96: b1:86:83:82:fc:7a:58:c2:d0:7c:48:73:6f:f6:0a:c4: 17:51:a6:d7:e2:b5:45:36:26:b2:57:b0:99:a9:ff:ec: c6:35:f5:66:27:d0:9d:19:0e:84:3a:6c:67:5b:5c:90: f3:bd:75:6d:a1:8c:34:02:e6:d0:49:97:48:aa:c8:c3: 04:50:a9:c7:35:80:f0:4d:7a:0b:85:db:83:6b:6c:1f: 03:0a:17:37:65:7b:a7:d6:82:ed:30:71:af:20:dd:6e: f1:50:1f:6f:3c:54:ac:7f:2a:f3:42:bd:03:97:6d:ef: 2b:aa:41:67:40:ec:c9:37:37:f0:35:70:57:2b:75:b6: d1:1b:9d:5d:60:21:81:74:5a:1d:6d:dd:95:72:94:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:87:30:af:07:fd:7b:57:d7:ed:28:d2:ab:d2:f4:ca: 1f:c5:a4:27:3f:84:2c:02:7c:d5:50:1b:33:20:fd:16: 7a:1a:dd:fb:f5:72:7a:1b:32:12:a9:6c:0d:5c:f0:91: 56:c6:d0:03:24:60:f9:a3:c3:20:b3:5a:fd:a4:1b:4a: 73:eb:9f:64:a1:9e:81:f9:c9:73:e8:9d:f1:fd:aa:d6: 06:07:6c:2b:56:fc:76:45:a2:5a:40:18:ca:41:5d:d0: 94:47:ad:23:64:e1:3a:dc:c2:52:c2:9e:15:8b:6d:ea: 31:98:6f:67:78:cf:c7:a2:d2:25:8c:43:c1:02:fe:75: c3:56:e1:d4:ab:ec:06:bd:7d:53:70:01:19:87:cb:8d: 56:86:6b:70:cf:0e:d7:d2:60:22:a4:8a:1c:84:12:a5: 32:f6:55:18:6a:f5:de:92:61:c6:f6:84:b6:41:2e:20: d2:df:6e:a3:06:b8:9d:17:e1:2a:b2:b8:86:9e:92:5c: 48:91:9f:5e:cf:63:85:d4:29:ba:80:be:a9:73:ed:05: 51:bb:5f:b9:1b:e4:7b:02:0f:e9:28:ec:70:dd:eb:da: cb:4f:67:07:a4:66:6d:e9:16:d0:84:59:e4:c9:59:00: a6:06:63:84:6b:71:e3:9c:49:2b:66:48:1b:f2:93:70 Fingerprint (SHA-256): 5C:A5:4E:81:DE:66:0D:B1:B4:0A:96:25:63:7E:3F:23:03:A5:43:7A:00:D8:B9:2C:48:DE:7D:35:0D:8A:DD:0C Fingerprint (SHA1): 01:D8:22:97:F4:BB:7E:79:AA:8F:3B:BC:93:75:16:6E:30:2F:8B:4C Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #14278: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14279: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14280: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #14281: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195677 (0x13bda51d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:17:55 2017 Not After : Thu Mar 31 20:17:55 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:19:06:e7:7f:0e:39:1b:7d:0b:22:7e:0c:ee:d3:02: c4:b0:8e:19:cb:34:13:b3:14:5c:7b:94:5a:f8:a7:3a: e7:de:a5:0e:05:a3:f2:dc:f4:4f:96:91:ba:00:6f:80: 62:33:33:9a:65:56:da:c4:af:15:dc:2a:c5:58:a0:0b: f1:ca:99:e9:a4:1b:63:78:23:02:d7:4a:cd:69:de:3f: 46:94:33:65:8d:cb:ca:de:e3:da:f1:e1:b9:3f:ef:03: ea:b7:21:ef:c4:cd:12:56:93:c9:f9:e6:ab:b6:20:96: b1:86:83:82:fc:7a:58:c2:d0:7c:48:73:6f:f6:0a:c4: 17:51:a6:d7:e2:b5:45:36:26:b2:57:b0:99:a9:ff:ec: c6:35:f5:66:27:d0:9d:19:0e:84:3a:6c:67:5b:5c:90: f3:bd:75:6d:a1:8c:34:02:e6:d0:49:97:48:aa:c8:c3: 04:50:a9:c7:35:80:f0:4d:7a:0b:85:db:83:6b:6c:1f: 03:0a:17:37:65:7b:a7:d6:82:ed:30:71:af:20:dd:6e: f1:50:1f:6f:3c:54:ac:7f:2a:f3:42:bd:03:97:6d:ef: 2b:aa:41:67:40:ec:c9:37:37:f0:35:70:57:2b:75:b6: d1:1b:9d:5d:60:21:81:74:5a:1d:6d:dd:95:72:94:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:87:30:af:07:fd:7b:57:d7:ed:28:d2:ab:d2:f4:ca: 1f:c5:a4:27:3f:84:2c:02:7c:d5:50:1b:33:20:fd:16: 7a:1a:dd:fb:f5:72:7a:1b:32:12:a9:6c:0d:5c:f0:91: 56:c6:d0:03:24:60:f9:a3:c3:20:b3:5a:fd:a4:1b:4a: 73:eb:9f:64:a1:9e:81:f9:c9:73:e8:9d:f1:fd:aa:d6: 06:07:6c:2b:56:fc:76:45:a2:5a:40:18:ca:41:5d:d0: 94:47:ad:23:64:e1:3a:dc:c2:52:c2:9e:15:8b:6d:ea: 31:98:6f:67:78:cf:c7:a2:d2:25:8c:43:c1:02:fe:75: c3:56:e1:d4:ab:ec:06:bd:7d:53:70:01:19:87:cb:8d: 56:86:6b:70:cf:0e:d7:d2:60:22:a4:8a:1c:84:12:a5: 32:f6:55:18:6a:f5:de:92:61:c6:f6:84:b6:41:2e:20: d2:df:6e:a3:06:b8:9d:17:e1:2a:b2:b8:86:9e:92:5c: 48:91:9f:5e:cf:63:85:d4:29:ba:80:be:a9:73:ed:05: 51:bb:5f:b9:1b:e4:7b:02:0f:e9:28:ec:70:dd:eb:da: cb:4f:67:07:a4:66:6d:e9:16:d0:84:59:e4:c9:59:00: a6:06:63:84:6b:71:e3:9c:49:2b:66:48:1b:f2:93:70 Fingerprint (SHA-256): 5C:A5:4E:81:DE:66:0D:B1:B4:0A:96:25:63:7E:3F:23:03:A5:43:7A:00:D8:B9:2C:48:DE:7D:35:0D:8A:DD:0C Fingerprint (SHA1): 01:D8:22:97:F4:BB:7E:79:AA:8F:3B:BC:93:75:16:6E:30:2F:8B:4C Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #14282: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14283: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14284: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14285: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195684 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14286: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14287: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14288: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14289: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331195685 --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #14290: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14291: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14292: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14293: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331195686 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14294: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14295: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #14296: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14297: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 331195687 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14298: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14299: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14300: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #14301: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #14302: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #14303: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195684 (0x13bda524) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:19:43 2017 Not After : Thu Mar 31 20:19:43 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:b9:ff:64:06:a5:4f:d7:e0:e9:77:21:4d:e9:87:4d: e7:23:23:81:bc:95:1e:70:ca:32:6f:51:1b:b7:79:3a: fb:29:f3:d4:fa:18:b1:9f:5d:cf:25:d6:64:65:77:7a: 60:e4:52:a3:ae:fc:cb:76:23:14:4c:80:03:91:13:47: f1:df:7c:17:66:9f:cb:22:37:b4:75:5e:3e:43:db:f3: 68:d1:cb:86:8b:4d:d6:d4:41:98:a6:b7:cd:89:38:90: 7d:89:8e:22:2a:b0:72:71:52:36:23:d9:ec:24:c4:db: 98:12:2e:fa:3c:54:34:8c:62:80:d2:4d:58:8b:0a:ea: 03:a0:68:96:c7:50:dc:c2:17:23:6b:51:e4:c5:54:46: 44:2b:63:b3:f0:91:01:5f:f0:07:3b:42:a0:19:f0:32: 8a:bf:8b:3a:0a:a9:91:b8:a6:e1:e9:63:d6:4c:aa:ea: ec:57:c4:03:c1:25:b6:cb:0f:6c:cf:2f:30:e5:ec:83: d1:de:54:be:0d:b5:d7:73:90:6c:59:81:e1:86:ae:19: 81:79:d9:cd:75:a5:65:e5:e2:86:b4:78:12:ac:5a:e4: 36:db:39:b4:29:b8:3f:3a:3d:93:b1:9c:c5:d2:1c:86: e5:25:57:98:56:52:80:68:bd:50:72:69:72:e4:5a:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:a0:81:89:7e:2e:03:53:cd:f8:45:10:62:36:e6:02: ff:64:1a:e4:3e:0d:51:49:a8:3e:43:78:59:0d:bd:fb: b1:db:3f:a2:82:46:df:02:50:20:aa:57:e9:11:9c:e3: 3c:df:de:22:1e:1a:4a:18:4a:e2:ea:80:b3:bd:b9:a8: fb:5c:85:9a:4a:53:3d:6a:7e:f7:57:91:d3:a5:2c:d5: c0:8c:7c:56:92:b5:ae:e6:dd:bf:de:0e:fc:b9:39:86: 1d:11:76:5c:a3:b9:a8:d2:51:06:f0:97:56:1f:2b:8a: 89:e8:d9:d6:2a:fb:b8:e9:3a:9f:75:5f:35:08:c7:69: 65:e9:2a:13:c2:58:16:bc:48:ca:91:3c:61:03:10:e4: 95:50:b5:d0:cd:93:63:d0:2a:5c:40:e8:14:a8:82:49: 96:54:b2:72:aa:17:8a:ba:34:af:1a:80:9c:bd:40:2d: 74:8b:cb:fe:7c:5f:10:3d:0a:b4:52:e9:3a:ed:79:2d: cd:7f:c9:d0:4b:00:10:8e:50:1d:59:1b:0f:72:4d:4a: f1:03:dc:e4:29:c7:ee:15:c3:de:d2:65:14:83:3c:98: 82:98:1a:b2:af:ea:70:15:91:26:13:5c:03:98:f9:e8: 4d:10:6c:a7:5a:83:46:94:f6:35:14:38:bf:85:53:01 Fingerprint (SHA-256): A9:90:D0:A0:54:21:B6:7F:F9:E4:54:C1:6D:41:B6:81:C7:17:0B:DA:32:01:00:6E:AF:B9:CA:17:E6:69:F9:65 Fingerprint (SHA1): 36:B9:EA:D7:F9:65:C2:90:80:3E:8B:C4:DD:67:CB:FD:CA:4B:7F:B3 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14304: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14305: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14306: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195685 (0x13bda525) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:19:53 2017 Not After : Thu Mar 31 20:19:53 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:8b:04:0d:17:ce:fd:69:ba:0e:99:e4:94:0f:7c:86: 03:74:0e:ee:ed:5d:ce:07:37:6c:3b:07:76:ba:f8:96: bb:cd:0f:c9:57:47:d3:49:79:85:be:20:59:03:90:ac: b3:49:22:f8:a2:e2:17:9d:40:85:57:d9:a3:e0:11:89: 96:65:f1:4c:c4:e3:87:18:6f:15:63:27:ba:7f:d7:89: d2:0b:18:a2:b2:62:d4:44:ad:1f:26:5f:3f:3a:e2:88: 1f:6b:db:bc:0b:9e:b6:45:d3:ce:0e:c2:ec:0a:0b:51: a6:b9:c5:86:17:b0:15:8e:44:fa:0f:87:56:d0:66:01: 3f:59:4a:ec:60:dd:13:fe:3e:20:94:d5:d1:ba:59:52: d7:24:bb:5d:8f:db:d6:f3:b9:15:ef:2a:c7:47:b9:cc: b6:3e:e4:2b:4b:08:bc:c2:7a:f5:0b:f0:cc:3d:1f:c2: f4:01:aa:15:4b:2a:af:a6:b1:0f:da:fa:67:79:41:c8: 52:b0:93:87:60:73:de:15:fc:d2:4d:3b:a8:9f:77:15: 42:bd:50:86:2b:77:a3:eb:79:5d:8c:b7:dc:97:8c:e2: 4a:0a:c0:f0:dd:40:d4:03:3d:c6:78:34:58:df:ee:82: 40:b6:5f:53:23:f9:fc:1d:94:2a:4e:ca:8b:46:ba:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:a8:aa:bc:8d:6b:49:29:f9:c6:5f:63:37:87:ca:34: 1c:34:64:a8:da:8f:e6:3a:f4:2d:2a:2d:e7:99:1d:55: 08:6c:31:97:64:18:81:31:c2:42:ea:5a:9c:d0:eb:2a: e5:1e:02:9f:0b:0a:40:6a:b6:12:81:95:04:a8:70:d3: 02:6a:98:fa:a6:f2:b5:fd:35:fa:59:5d:d8:65:c0:84: 83:8b:92:58:3c:2a:90:de:d3:00:39:56:72:d5:54:9e: bc:41:f1:a7:7b:19:26:5f:77:f1:3a:06:e8:db:5a:6e: 13:17:6c:a3:bd:50:a3:e7:f9:05:19:04:30:d8:bd:68: f9:f6:99:b3:c7:f5:f6:e7:3a:c8:b7:ed:64:bf:9a:1c: 07:f6:f1:9b:e0:50:20:d5:16:2a:7f:b3:59:da:ad:af: 06:73:90:6d:7f:70:7b:2f:9d:50:01:99:b8:15:cf:e0: 7a:29:94:f1:7b:ce:b8:34:25:0a:84:54:8a:86:21:89: 75:7a:3b:3b:67:e9:65:30:18:e9:47:b5:12:aa:1d:25: 21:4a:d8:c8:e7:6c:ba:6f:49:79:b4:26:78:76:07:ed: 3e:73:d6:a6:09:17:bf:80:0b:74:16:f3:cb:2c:b2:b5: d8:d4:0d:87:0a:ad:bc:2a:b3:f8:f1:b7:2e:a3:6b:11 Fingerprint (SHA-256): 77:79:CC:63:A3:F3:23:51:A3:3D:D4:33:A1:FF:8A:97:CE:CC:FA:54:F4:64:CE:74:52:F8:A2:93:4C:F2:3F:CD Fingerprint (SHA1): C9:F7:29:01:0C:D9:0E:E4:F0:2A:4C:B7:1A:C3:0A:DE:B5:3C:B2:2A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14307: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14308: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195686 (0x13bda526) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 20:20:05 2017 Not After : Thu Mar 31 20:20:05 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:cc:a2:e7:01:e6:84:bd:51:33:9f:ca:8c:fe:cf:e6: cf:21:9e:f2:a1:88:85:e3:4b:13:07:09:5e:25:0d:51: f7:e2:f9:11:2a:4d:76:dc:b9:20:8d:73:8a:c9:ac:6e: aa:3d:ab:5a:a7:60:14:36:7c:09:a6:68:24:9c:28:bf: 38:9b:03:10:dc:e5:49:92:eb:c2:0e:4f:7d:7c:38:3f: ac:89:77:34:fc:b8:f4:09:c7:7c:c0:17:bb:ef:46:1d: b0:95:d6:d5:1a:23:ef:a3:41:08:c3:07:b5:49:83:1c: 76:3b:f2:25:3d:65:6f:fc:d5:41:38:80:7f:c7:7a:1d: 05:5c:c5:ad:cd:f8:c9:cb:bb:a1:75:9a:0b:19:e7:f8: 1e:71:f0:63:fb:2e:6f:5f:e3:ef:a4:e8:b1:b2:4d:13: 26:bf:35:8b:58:91:70:8a:f7:10:33:99:51:9d:cf:ee: f0:98:a1:0b:88:34:b7:df:ad:40:e2:09:5e:af:c3:c1: 67:67:68:b4:65:15:16:e4:26:4d:5b:90:6f:ba:aa:bc: e2:af:b3:17:3f:d1:7b:ae:6d:6b:8e:d2:18:1f:83:fe: c3:75:ec:0e:9e:98:2e:09:fc:7d:91:8a:89:33:a6:03: 0e:03:62:9c:92:03:0e:b8:db:da:2f:37:75:e9:e6:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 21:87:2e:4a:ca:74:a5:2f:69:3f:64:60:55:8d:59:1b: 6e:43:fc:f8:b2:be:c2:fa:8d:3b:a9:38:db:df:69:ec: 3b:de:77:b1:d8:b6:7e:d7:8e:19:63:0d:11:fb:87:d1: d8:c7:6e:77:13:d1:a1:a9:07:8f:ce:bc:d0:d7:b0:92: 99:99:4e:c1:97:bd:79:bf:c8:2a:af:74:12:be:ce:b9: 1c:82:af:fd:3f:4d:e4:1a:df:b1:3d:8a:4f:b7:55:d1: 0e:83:cf:47:aa:32:ef:8e:9c:b0:5d:6a:55:5e:13:13: 61:29:9e:1f:6d:33:a9:5e:24:ef:74:ab:7c:ee:19:05: c4:29:9c:97:f8:52:6b:b9:f1:f2:a7:f3:c1:51:57:75: 82:d5:09:ea:3d:79:07:53:27:a7:9e:ce:d7:fe:fa:60: d8:96:d3:aa:8a:c7:3a:a6:0e:82:d7:83:c4:f8:bc:ac: 63:75:4d:f3:0f:d4:d5:3d:5b:a9:55:44:c8:c1:52:f7: 37:06:7c:d8:6b:c5:34:9a:00:c4:72:a9:91:e1:ff:d6: 6f:52:39:9a:ab:f3:aa:18:fc:81:5c:55:41:f9:b5:25: 2b:11:22:b4:5d:fc:e5:a5:c7:e9:e2:ff:46:6c:63:11: fb:39:58:f1:00:da:af:33:a0:b3:73:2f:d9:de:70:50 Fingerprint (SHA-256): FA:8A:73:85:1C:05:5D:AC:58:D7:A7:CC:A4:19:24:E9:7C:FB:DC:FC:9B:7D:9E:15:95:83:62:FD:F3:FC:CD:61 Fingerprint (SHA1): F5:21:5E:F9:D9:AE:42:7F:6E:0F:B7:C7:FA:8E:13:44:7E:48:5D:FF Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #14309: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14310: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195688 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14311: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14312: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14313: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14314: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331195689 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14315: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14316: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14317: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14318: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331195690 --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #14319: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14320: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #14321: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14322: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 331195691 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14323: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14324: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #14325: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14326: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 331195692 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14327: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14328: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14329: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #14330: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #14331: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #14332: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #14333: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195688 (0x13bda528) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:20:33 2017 Not After : Thu Mar 31 20:20:33 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:da:0c:75:d0:6a:e8:06:13:88:6b:34:d1:5f:45:96: 45:2c:77:de:08:22:a2:22:2e:20:87:ee:32:73:f4:32: 3f:45:1f:c0:80:25:56:88:db:2f:c3:0c:3f:f1:4d:c0: 3e:9a:2e:b3:99:68:db:0a:0b:cd:49:9c:77:e4:d6:44: c8:fc:ed:39:f2:cd:24:cf:40:23:2e:36:64:1b:e6:47: 90:00:e4:f7:e8:9a:94:2e:0c:56:c2:41:d3:94:96:90: 7e:7e:d0:f4:9f:33:0d:bc:83:ae:a1:ea:09:e2:21:44: 79:b8:44:db:d6:53:1e:15:76:92:01:1f:a9:ea:67:5b: 08:7a:f0:d5:d8:f6:5c:d8:8b:01:a8:df:21:08:c7:76: 66:03:69:e2:46:92:bd:e6:31:55:3b:23:11:a5:26:b5: d7:9e:4b:b7:aa:fd:0f:02:57:20:52:55:b0:6c:9b:f9: 28:22:26:30:fe:04:76:68:c4:0e:86:47:28:af:a5:21: 04:f0:d0:fe:3e:2f:38:23:1a:e7:8c:58:79:d1:2f:bf: 9e:b7:bd:51:e7:d5:c4:d7:40:1f:40:e9:7d:d5:a7:8d: c3:a3:e1:bf:63:5e:e0:79:39:c7:94:95:58:3d:3a:f5: c9:91:49:61:24:a3:cc:26:03:c0:01:d7:06:f8:63:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ab:9f:e2:76:f9:5d:dc:45:52:bf:f4:c8:a2:8c:3c: 4b:8c:6e:17:07:2a:ec:94:9d:de:c7:d8:79:0f:36:73: ea:b6:92:cb:d1:e5:40:19:df:67:13:78:d8:1b:28:25: c5:5f:de:be:ed:b7:fe:15:b6:ca:81:7b:8a:99:41:95: 16:dc:62:79:c6:f2:6e:b1:5c:5b:56:e9:0d:ea:d7:5c: de:4e:44:35:be:11:5f:0b:16:a6:5c:19:b5:b2:00:5a: 51:16:b1:3e:47:fa:cf:2d:8f:05:7d:1c:84:b9:e7:d2: 27:a8:2f:f7:50:cb:df:38:2c:5c:89:5a:ea:98:4b:ac: 94:a3:cd:6d:ac:c0:60:3f:07:fa:a2:30:34:3d:1d:3c: 29:07:bf:b7:70:73:cc:2b:9f:54:7d:06:6b:1b:53:5b: 25:a8:5b:a7:0a:c0:0c:52:62:f4:11:0d:61:c4:ea:8a: a1:1f:2c:93:43:50:d9:ce:fe:5b:38:f2:46:df:d2:ca: 20:87:cf:95:14:94:2a:09:a4:c8:51:96:e7:95:5f:a7: 2f:b5:64:0b:ca:08:67:17:d8:88:4a:e7:56:ca:05:18: 26:13:81:ae:11:a4:31:fb:18:a7:08:75:49:f4:24:47: d0:be:84:69:70:6d:fb:44:63:db:48:4a:9c:b3:53:83 Fingerprint (SHA-256): 44:6B:18:0F:3A:35:60:1B:0F:82:BA:95:DA:A3:28:9F:94:68:D2:AE:5C:90:BA:73:28:85:80:67:6B:BC:44:3C Fingerprint (SHA1): 09:8F:5D:BF:2A:70:DB:4C:B4:AB:89:38:5A:49:9A:38:99:78:C3:F0 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14334: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14335: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195689 (0x13bda529) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:20:46 2017 Not After : Thu Mar 31 20:20:46 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:eb:f5:34:b6:69:93:41:6a:ff:f7:0c:4c:8f:93:f2: 77:0b:f5:92:0f:b4:d7:e1:08:44:1d:ed:2a:80:0b:f9: 8e:19:05:37:7b:f3:48:b7:7d:10:34:0d:05:8c:88:7b: 83:b1:f3:da:e0:e4:c7:a4:a9:28:6a:d9:78:49:6f:b9: 88:f8:ce:33:d4:f3:a4:28:b6:d9:36:0f:f0:75:b8:15: 3a:f5:42:d8:39:c1:ee:2a:11:9f:43:cb:47:17:91:46: 95:52:16:14:79:69:62:2b:50:ba:98:e1:5b:a7:aa:2b: 1c:eb:4f:ec:ef:57:ca:b1:a2:f1:aa:8f:a6:5f:58:4f: 20:f8:7a:67:fb:6a:d7:a0:d6:ec:dc:34:da:03:46:d1: 2f:ac:b5:1c:fa:96:d8:dc:4a:59:92:d9:9e:93:90:0d: a1:18:f1:73:8a:5a:20:82:9b:f6:bc:9d:21:cc:f4:b4: 4c:8e:f7:b9:1e:4b:a8:82:b6:bb:bd:b0:94:bb:3f:e2: 48:97:5c:1f:a6:3c:9e:7b:60:67:b2:8d:bd:60:7e:08: 98:e6:8e:63:0d:8a:11:9a:fd:50:14:2c:e3:9b:ac:b7: 31:f4:16:1c:b6:8b:46:51:c2:f7:4a:b3:2c:9f:ff:b3: f1:8b:c4:ac:2d:5d:1e:a2:29:97:2e:77:45:72:16:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:5c:aa:ed:f5:94:58:aa:9a:b0:52:95:3b:b4:e9:52: 57:30:cd:c3:2c:c9:f8:b1:98:e0:fe:b5:b1:6d:20:a4: 50:4c:a0:d4:67:3e:55:f8:01:9f:24:8b:dc:49:2c:82: 24:ae:5f:0e:f5:ad:40:0d:a7:f5:9f:31:4d:60:64:9a: b4:1d:94:c3:fb:90:9f:8a:37:82:f3:ce:bc:b9:4c:64: 19:43:c2:8b:9a:fb:95:a2:1c:5e:ca:9e:77:04:de:81: 91:19:fa:6e:69:86:9a:db:86:2b:54:a9:5c:5d:b9:d7: 9d:c6:f9:42:92:eb:ec:48:de:13:3d:d7:d8:aa:d5:3d: 48:2b:e4:cd:80:e9:e2:1f:da:45:a4:b8:a5:54:a5:57: d6:75:f5:8f:61:b2:46:9a:d0:a5:f3:cb:27:c3:db:08: c5:0c:d2:92:32:e5:95:de:0e:90:af:34:7f:2d:8b:89: b0:49:8d:3d:3f:33:1b:40:8c:02:99:87:7f:6e:09:ba: 88:a5:4e:72:6d:19:1f:7f:66:88:a8:b9:3e:5d:f0:40: 2d:3a:cc:56:b8:64:e5:8a:bf:c7:2a:e9:e4:0e:29:90: 8c:03:5a:6a:df:34:51:ea:52:44:e9:37:b2:71:63:b9: 9d:82:f0:2c:eb:1b:8e:8a:cf:f4:56:a5:3e:cf:c9:1b Fingerprint (SHA-256): 48:E8:18:70:F7:33:3C:D4:9A:43:D9:AD:1B:1F:C6:21:0C:47:1D:E8:BE:4B:FF:64:63:86:8C:BD:3A:07:B3:88 Fingerprint (SHA1): 37:BC:D9:44:3A:66:55:DC:67:B6:E6:BE:5F:9A:EE:89:FB:CC:E8:51 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14336: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14337: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14338: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195690 (0x13bda52a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 20:21:07 2017 Not After : Thu Mar 31 20:21:07 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:cb:b3:a9:95:2d:61:36:af:b1:cf:a6:db:d5:91:50: 03:c2:c1:0f:b8:70:a6:75:20:c4:00:ef:86:2e:76:41: 87:02:4f:a3:7a:bc:da:8b:b3:96:c5:b4:b4:4c:0b:67: 05:ff:ab:87:32:aa:0d:e0:f4:19:f2:17:52:a5:df:03: 18:82:ab:6b:f3:a4:5e:b5:7a:08:e1:2b:96:4b:37:80: 36:1d:df:eb:e3:0e:6f:61:76:07:c8:d4:4f:df:fd:98: 9d:4e:82:16:0c:4e:c4:ab:0d:d4:3f:14:5c:c8:7e:2a: 3d:4c:c6:e9:7f:ad:c9:77:fe:b9:32:03:74:89:01:77: e4:f8:f3:98:d8:6c:e0:ff:08:a7:f3:a2:23:bb:30:69: 96:31:c5:f9:b3:0d:01:f9:4f:79:df:bf:10:18:cc:ed: f0:8b:61:48:78:a7:e9:8c:4f:78:20:16:0b:e8:0a:6b: 74:65:60:9c:d1:4d:85:48:c0:6f:0f:34:ca:4c:a3:c0: fd:9b:33:1e:3b:7c:e8:96:db:b4:24:77:f8:c9:a3:ff: c6:18:6f:25:03:7d:15:45:ef:a3:ee:51:0d:c7:1b:47: da:bf:3f:f9:f3:6c:77:b4:2f:e4:15:72:40:dc:d8:44: 4a:4e:87:3d:a4:cb:1e:69:28:f5:5d:2d:0f:7c:41:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:8d:92:e0:0c:2f:74:f8:0d:ae:98:c5:2b:26:f7:58: d6:1b:54:fd:0c:6d:91:87:8f:6a:39:d3:41:30:eb:ab: 3d:1b:ac:b2:15:2a:2d:0c:69:db:a4:11:02:71:b4:0d: aa:04:75:10:8d:cd:68:7a:74:32:bd:88:11:d0:79:3a: de:a5:dc:e6:01:d4:44:60:8b:84:f7:3b:5e:4f:e9:76: ea:94:35:d5:af:4d:ef:68:4b:b9:b4:da:32:ed:90:45: c8:2e:da:f1:e6:65:7f:03:77:46:25:59:c8:36:fd:aa: 2f:9b:a2:9e:48:d4:c8:49:f5:fa:9c:4d:f4:60:00:f0: 4e:69:4b:53:d1:de:ae:c1:04:83:c6:b6:92:24:69:2a: ab:3d:ab:fa:c9:39:37:9a:17:48:37:ff:49:0e:94:9c: b2:b7:e0:7c:54:0c:88:25:35:22:a0:00:d5:cd:a3:4e: 5a:29:a0:9c:45:b0:93:50:10:c6:1b:63:f3:2f:9c:33: ea:dc:3c:a9:da:da:28:cf:9d:6b:37:63:de:21:5e:c2: 36:5f:4f:3b:f4:38:62:ae:7f:4d:21:7e:01:f9:99:ee: 48:05:4f:c7:c0:8c:2d:52:99:35:7b:0f:db:95:16:82: 79:6e:e3:8a:a0:44:6f:87:d6:48:c4:5c:f0:2d:75:85 Fingerprint (SHA-256): B2:60:4A:20:EE:C6:E8:CE:71:61:5D:1E:19:FF:19:95:86:36:8C:63:49:38:0A:3E:2C:B8:FE:2D:7D:8A:78:E1 Fingerprint (SHA1): CF:20:A8:5D:8F:40:8F:C2:81:AA:5C:58:00:51:7D:9C:21:57:0E:15 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #14339: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14340: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195693 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14341: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14342: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14343: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14344: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331195694 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14345: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14346: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14347: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14348: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331195695 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA1Root-331195602.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14349: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14350: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #14351: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14352: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 331195696 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14353: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14354: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #14355: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195693 (0x13bda52d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:22:08 2017 Not After : Thu Mar 31 20:22:08 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:5f:aa:ed:55:7e:71:5e:f8:db:6d:dc:36:85:eb:83: b6:25:bb:60:9f:00:66:54:cb:85:ca:70:d0:0b:06:36: 0d:b4:08:2f:65:53:b0:a9:87:ed:67:cd:ed:a6:23:3b: 0b:0b:2e:18:fe:fd:01:d8:99:57:a8:32:8e:d9:06:30: 3d:6c:80:86:d1:d1:33:72:0e:2d:17:77:87:79:ec:37: 6c:4a:aa:2b:2f:a2:1d:eb:32:43:77:73:c9:61:10:e4: 9c:59:4d:1f:29:30:59:fe:99:e3:1d:9c:35:60:1b:cd: c0:8f:a8:f2:76:f8:37:b1:dd:f2:5d:3f:e4:6c:b4:ff: 4f:c4:a7:55:07:64:98:c3:e2:20:1f:0c:d4:55:0a:a8: 44:ab:d1:55:cd:f2:ff:fd:43:e7:72:87:77:13:11:b8: 66:f4:55:f3:a1:5c:f7:ef:38:aa:96:c0:2b:d1:21:13: 33:11:d4:a4:45:5d:1a:c1:df:1c:12:55:91:87:cf:6d: 89:b7:91:64:76:fe:26:6b:28:69:06:7a:1d:7f:75:a8: 18:f0:f7:0d:52:da:c8:77:b7:72:5c:73:c7:6d:90:28: 08:3a:bf:88:d4:a6:44:04:9d:2e:59:08:d3:8e:80:c4: 67:51:b7:96:04:ce:91:53:4f:eb:c0:bf:08:5e:64:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:84:71:1b:a0:4f:ed:43:65:00:38:f0:4e:d0:66:fd: d5:ff:cc:23:3c:af:2b:f4:89:0c:e8:73:17:64:28:80: 57:08:6a:5d:d8:a4:93:62:7e:8c:b8:04:9c:1a:e3:5b: da:64:c0:b5:96:46:66:05:2c:cc:df:c2:f5:36:04:d6: f4:30:63:f1:75:98:9a:c9:80:6c:cd:d4:44:a2:47:c1: 48:5c:68:cb:b9:ae:5a:6e:ef:0a:11:96:26:b6:a9:d2: 02:15:9a:bc:a1:10:36:4f:21:90:2d:d6:3d:62:3f:4d: de:47:ea:31:2c:cb:88:5b:66:65:ef:7e:19:db:93:9f: ed:6a:be:1f:61:4b:c0:c9:f2:8d:93:da:27:1c:6d:f9: 18:76:5e:55:fd:a4:d0:22:f5:fa:cc:ae:2a:01:38:9f: f9:43:ab:b8:c9:46:a8:98:c6:d8:c9:12:51:0b:b5:09: ad:92:bd:7e:12:a6:1f:a8:48:aa:ef:e9:bd:68:af:5b: 32:a1:38:2d:b0:f7:13:f8:a4:7c:5a:e1:01:56:ba:44: 49:a3:a7:99:a5:1b:d2:2f:9c:8e:61:ef:5b:6b:42:b2: c9:2e:a5:61:03:ef:dc:07:cf:81:64:cd:e4:6e:f0:3e: 5c:6d:50:d5:3f:40:75:58:31:d6:6f:e2:89:28:0a:11 Fingerprint (SHA-256): 0F:44:0B:01:6E:39:AA:A6:AE:AA:89:FA:15:E5:E1:E4:CB:F6:FE:33:36:E4:D7:05:DA:E2:8D:BB:8D:2B:BB:06 Fingerprint (SHA1): 35:89:00:43:EC:21:3C:C9:8C:30:66:CA:A9:C7:F0:9D:32:9C:AB:75 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14356: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #14357: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195697 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14358: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #14359: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #14360: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195698 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14361: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #14362: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #14363: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14364: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 331195699 -7 Bridge@Army < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14365: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14366: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 331195700 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14367: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14368: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #14369: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14370: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14371: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 331195701 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-Bridge-331195603.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14372: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14373: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14374: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14375: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331195702 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14376: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14377: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #14378: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195697 (0x13bda531) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 20:22:41 2017 Not After : Thu Mar 31 20:22:41 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:07:0b:4b:38:42:14:be:4e:50:01:6d:8b:48:c9:0b: 53:65:80:c1:0f:97:8e:46:30:ea:73:21:d2:c0:ee:29: a3:28:bb:36:5a:ff:d6:29:84:d8:67:97:bc:82:7b:d5: cd:bf:a1:0b:dc:9d:dd:d0:a4:90:7e:61:c1:65:6f:44: e4:db:4e:94:9f:db:8c:f7:6b:5b:10:98:c8:a1:f8:a4: d3:ad:89:7c:2e:25:11:51:20:56:28:f7:7c:00:27:10: d0:9b:aa:f3:82:80:60:f4:0b:a2:a9:0f:99:59:00:26: a1:3b:d0:ed:e7:d2:85:ce:01:fc:e0:82:7d:4d:b5:28: 04:69:63:f9:1b:c1:00:f9:e3:63:0d:9a:de:e0:01:15: fd:cc:b2:fc:78:d5:37:3d:b0:16:c7:27:49:35:76:29: e2:dd:d9:77:29:d5:9e:df:d6:93:2f:dc:c2:d0:8c:47: 97:b0:0d:e2:a8:9d:c6:03:b9:8c:48:91:51:e6:e8:e3: fa:28:f8:f7:7c:de:29:97:b3:8c:80:00:c7:ca:fe:cc: fd:b6:40:4b:5b:0d:b3:5c:66:d3:dd:ca:ac:49:50:0a: a5:bd:2b:60:09:6e:a6:59:8b:f8:f6:2e:12:b4:15:99: 16:14:af:f4:96:ab:a6:4c:19:68:41:b9:f9:7c:a7:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:5b:47:75:c4:08:a8:61:65:e6:8c:39:e6:da:21:0d: 75:f3:d4:e9:9c:b8:bc:67:36:33:49:85:47:b9:c2:c9: 4f:11:16:68:c1:53:3d:af:22:98:45:6a:b2:93:d0:9a: fc:88:b0:ec:86:c8:2e:d7:e6:c7:e1:5b:ad:84:74:0e: 31:ef:1e:a3:28:a4:45:ec:31:c5:79:c2:d5:8a:e0:88: b3:fb:ab:62:b9:c0:cd:cc:ec:1b:fa:a3:36:cf:9d:64: 1a:39:fd:ef:c4:aa:ad:cd:5b:b2:52:7a:7f:90:24:5e: 9b:29:91:89:e4:bc:de:07:0b:88:8a:60:6b:f8:1c:04: ac:dd:91:25:8e:1b:51:e6:b7:40:97:69:f8:89:0d:77: fc:70:76:59:eb:f1:fe:3c:af:ba:d7:67:b2:58:fc:4a: 98:9b:bb:bb:5a:37:7b:6a:d3:2a:3d:6a:c3:21:0b:29: 1c:d4:e6:89:03:93:dd:80:05:76:5e:61:ff:31:1d:c5: 46:1a:a8:d7:68:84:ce:4b:18:c6:37:2b:4b:f4:71:d0: b3:ad:d5:0d:79:74:31:a5:b5:fd:bc:db:95:12:d8:d6: 02:10:bf:3f:96:b2:a6:52:93:50:6e:65:f3:20:c5:5d: 5e:bd:c5:4d:89:40:33:3c:17:ac:91:79:a1:66:52:07 Fingerprint (SHA-256): F0:98:D0:5B:3E:D4:C0:67:6D:53:FD:A4:EC:0D:1A:E6:01:64:74:EF:9F:D1:90:AB:3A:75:34:2E:F6:EE:81:A7 Fingerprint (SHA1): 44:92:68:FB:D2:A3:C4:E8:CE:14:62:0C:76:9D:BC:68:6E:76:2C:F5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14379: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195698 (0x13bda532) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:23:06 2017 Not After : Thu Mar 31 20:23:06 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:75:15:ac:74:3b:19:82:02:6d:b3:dd:5d:7b:97:d7: 18:2e:81:3d:70:94:fb:04:d1:51:7b:95:43:5b:ca:9c: 82:e2:8d:ad:09:05:13:91:96:d5:84:88:87:75:eb:49: 4c:c0:10:d4:d6:79:0a:16:14:5e:65:44:6c:5a:2f:30: 88:61:37:18:c7:6d:02:9f:6b:25:3c:f5:a3:59:8b:d2: 24:05:bc:c2:d9:9f:1f:94:1f:f8:4d:57:9b:a3:79:dc: 19:8e:7e:25:68:a8:38:99:45:fe:b6:5a:40:c5:49:ff: 0b:74:93:ea:f2:a1:ea:ba:5e:f8:94:05:c0:41:f7:96: fd:7c:95:7b:3b:cf:a2:4a:94:39:91:5a:62:5f:4f:18: 49:8e:8a:d1:ad:2f:4e:08:f7:f4:12:6c:01:57:15:2e: 6a:16:36:b2:8f:d6:fb:86:02:29:68:ec:17:35:10:60: f9:07:65:aa:0c:2f:39:e5:28:dc:83:04:0c:4c:cd:a0: 29:1c:71:7a:a5:97:27:9c:8a:e8:7e:70:d9:c1:19:f6: 97:de:e4:0b:92:c9:d4:3c:8a:73:81:40:0e:30:fa:d8: 3e:e2:a7:72:96:21:94:78:3a:c3:a7:4f:61:4f:1b:20: e1:48:e7:d4:be:5b:1c:0e:9e:4f:34:5f:35:60:e1:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:3a:4f:0a:cd:2e:24:6c:0a:fd:d0:94:4b:4f:4a:42: ce:81:dc:a6:a2:f5:9a:75:59:b6:fc:fc:1c:e5:a6:57: 3c:d9:75:b9:7c:85:da:91:9e:9e:1e:59:05:41:9b:48: d9:8c:a5:3f:04:01:d6:36:a7:c7:c6:90:43:f2:81:36: 7a:ec:e2:58:a5:f6:d9:84:88:ce:6a:9c:b3:49:0a:85: 29:4a:c8:af:67:77:e7:3a:ee:50:a4:83:70:c4:5f:64: 26:67:5f:49:a5:03:85:43:1e:ce:58:5e:0f:17:3a:6f: 01:70:ab:30:dc:14:02:79:c2:36:c6:12:c6:a5:18:6f: 7c:27:59:e2:a7:33:f7:2a:4c:77:c2:d2:95:89:fc:c4: d2:1b:c8:71:d4:b6:bd:a2:e9:21:f8:37:66:ef:fa:fb: d4:11:b5:90:ed:72:aa:92:63:14:5d:23:0d:36:73:4f: 21:c4:b4:24:8a:be:95:2a:2c:13:49:d4:fd:f5:7b:51: 82:b4:cb:da:86:5d:f0:f1:17:21:d8:92:ad:1d:4d:da: 4d:9d:db:46:2d:88:97:b6:71:72:f0:eb:e2:f0:00:e2: fa:87:31:d4:d1:f0:fa:a7:98:1f:36:34:1d:77:8a:4c: 0a:30:ae:3a:2c:f2:71:c6:0f:8b:5a:8b:27:c3:28:bc Fingerprint (SHA-256): C4:60:D0:3B:94:0D:A8:92:33:86:89:0D:30:F1:D4:62:9A:EB:DE:31:40:44:E7:8A:F5:A1:C1:F3:AD:DB:18:EA Fingerprint (SHA1): DC:1F:81:9A:AC:77:B7:DC:58:1A:C3:85:F7:D3:B9:49:7F:FA:A9:C4 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14380: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195698 (0x13bda532) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:23:06 2017 Not After : Thu Mar 31 20:23:06 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:75:15:ac:74:3b:19:82:02:6d:b3:dd:5d:7b:97:d7: 18:2e:81:3d:70:94:fb:04:d1:51:7b:95:43:5b:ca:9c: 82:e2:8d:ad:09:05:13:91:96:d5:84:88:87:75:eb:49: 4c:c0:10:d4:d6:79:0a:16:14:5e:65:44:6c:5a:2f:30: 88:61:37:18:c7:6d:02:9f:6b:25:3c:f5:a3:59:8b:d2: 24:05:bc:c2:d9:9f:1f:94:1f:f8:4d:57:9b:a3:79:dc: 19:8e:7e:25:68:a8:38:99:45:fe:b6:5a:40:c5:49:ff: 0b:74:93:ea:f2:a1:ea:ba:5e:f8:94:05:c0:41:f7:96: fd:7c:95:7b:3b:cf:a2:4a:94:39:91:5a:62:5f:4f:18: 49:8e:8a:d1:ad:2f:4e:08:f7:f4:12:6c:01:57:15:2e: 6a:16:36:b2:8f:d6:fb:86:02:29:68:ec:17:35:10:60: f9:07:65:aa:0c:2f:39:e5:28:dc:83:04:0c:4c:cd:a0: 29:1c:71:7a:a5:97:27:9c:8a:e8:7e:70:d9:c1:19:f6: 97:de:e4:0b:92:c9:d4:3c:8a:73:81:40:0e:30:fa:d8: 3e:e2:a7:72:96:21:94:78:3a:c3:a7:4f:61:4f:1b:20: e1:48:e7:d4:be:5b:1c:0e:9e:4f:34:5f:35:60:e1:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:3a:4f:0a:cd:2e:24:6c:0a:fd:d0:94:4b:4f:4a:42: ce:81:dc:a6:a2:f5:9a:75:59:b6:fc:fc:1c:e5:a6:57: 3c:d9:75:b9:7c:85:da:91:9e:9e:1e:59:05:41:9b:48: d9:8c:a5:3f:04:01:d6:36:a7:c7:c6:90:43:f2:81:36: 7a:ec:e2:58:a5:f6:d9:84:88:ce:6a:9c:b3:49:0a:85: 29:4a:c8:af:67:77:e7:3a:ee:50:a4:83:70:c4:5f:64: 26:67:5f:49:a5:03:85:43:1e:ce:58:5e:0f:17:3a:6f: 01:70:ab:30:dc:14:02:79:c2:36:c6:12:c6:a5:18:6f: 7c:27:59:e2:a7:33:f7:2a:4c:77:c2:d2:95:89:fc:c4: d2:1b:c8:71:d4:b6:bd:a2:e9:21:f8:37:66:ef:fa:fb: d4:11:b5:90:ed:72:aa:92:63:14:5d:23:0d:36:73:4f: 21:c4:b4:24:8a:be:95:2a:2c:13:49:d4:fd:f5:7b:51: 82:b4:cb:da:86:5d:f0:f1:17:21:d8:92:ad:1d:4d:da: 4d:9d:db:46:2d:88:97:b6:71:72:f0:eb:e2:f0:00:e2: fa:87:31:d4:d1:f0:fa:a7:98:1f:36:34:1d:77:8a:4c: 0a:30:ae:3a:2c:f2:71:c6:0f:8b:5a:8b:27:c3:28:bc Fingerprint (SHA-256): C4:60:D0:3B:94:0D:A8:92:33:86:89:0D:30:F1:D4:62:9A:EB:DE:31:40:44:E7:8A:F5:A1:C1:F3:AD:DB:18:EA Fingerprint (SHA1): DC:1F:81:9A:AC:77:B7:DC:58:1A:C3:85:F7:D3:B9:49:7F:FA:A9:C4 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14381: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #14382: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195703 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14383: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #14384: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #14385: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195704 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14386: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #14387: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #14388: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14389: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 331195705 -7 Bridge@Army < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14390: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14391: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 331195706 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14392: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14393: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #14394: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14395: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14396: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 331195707 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-Bridge-331195604.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14397: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14398: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14399: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14400: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331195708 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14401: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14402: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14403: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14404: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 331195709 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-BridgeNavy-331195605.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14405: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14406: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14407: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14408: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 331195710 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14409: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14410: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #14411: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195703 (0x13bda537) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 20:24:05 2017 Not After : Thu Mar 31 20:24:05 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:1c:a4:27:d2:f1:51:1a:1e:18:c7:8a:87:08:b7:a2: 5a:71:a7:d5:34:b6:c5:74:ca:39:ef:8b:8f:76:ae:eb: 16:c7:38:82:77:c9:0e:75:5c:98:d9:74:27:50:d8:92: eb:25:2a:ac:4b:59:1a:bc:16:94:8b:d1:95:77:82:ac: 7d:dc:65:e8:4f:bf:b4:98:c6:1f:b5:03:44:2c:42:37: 95:c7:62:90:40:2b:b7:8f:ad:77:d1:72:fc:0e:e1:8b: 4e:01:30:64:07:d7:f0:5e:87:a7:02:97:74:f7:fe:c1: 02:8f:88:af:6b:71:22:19:08:ca:6b:e5:ba:d4:d4:ea: ef:0f:59:f4:c0:a5:cc:d6:75:f5:45:10:6c:0f:9e:7a: 9f:55:bb:b3:c1:d0:b3:85:fd:3f:91:09:5c:cf:ed:bf: bb:f9:57:11:66:0b:fe:1e:8e:f5:2c:b4:f0:08:15:fe: 68:fb:51:e0:a6:fe:03:00:5a:fb:44:f6:db:c7:c2:d2: 0a:c0:2b:31:9b:9a:d7:2b:73:96:3c:64:ba:f0:46:26: 1e:25:85:ab:ff:aa:c4:b8:39:e1:14:e0:33:d8:d7:2a: 13:c1:71:04:e5:b6:ca:7b:67:5b:e8:25:b9:6c:9c:e2: 82:cf:09:7d:8d:36:1c:57:06:97:1e:c7:4c:c2:43:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:db:b8:d0:c3:ea:43:63:b6:32:47:39:a8:f5:6e:d3: 51:ee:c9:4a:5b:2e:ca:34:66:9e:53:4b:2f:68:23:61: ad:35:70:7c:30:cd:cd:49:e6:e4:9b:95:bb:2f:f3:12: a4:c9:e4:cb:14:18:42:09:48:a3:66:27:d1:fa:83:fb: 28:09:00:80:85:9a:7b:f3:01:10:2c:90:33:02:91:d8: b3:46:bd:35:12:01:15:a4:3a:e5:c4:49:3f:08:85:54: 98:0c:15:49:80:8f:e4:f7:c6:45:08:d2:3b:1f:1b:2b: 3b:de:1b:46:c1:01:03:d7:bd:5d:c3:ac:4a:fb:ed:61: 6f:8b:cf:f2:c8:5e:4e:88:4d:b2:af:93:e6:04:83:2e: 09:19:87:6e:47:89:39:7e:25:e0:2a:3f:8e:38:59:80: 18:4a:a7:22:4f:97:25:00:bf:21:9f:bb:a2:6a:b9:59: 2d:b6:ee:59:df:a8:86:e1:58:9c:9a:4b:e7:f8:75:16: 98:1f:bf:4e:fa:d9:02:55:43:0d:17:e9:4b:11:39:80: cf:7e:73:b3:12:6f:63:19:13:98:01:d2:62:8d:ad:20: dc:71:d0:22:2d:aa:92:2a:89:d2:b5:81:db:d9:b9:2e: 47:b3:ec:c1:d1:a5:91:f0:c4:e2:66:00:89:4f:12:34 Fingerprint (SHA-256): 08:5D:DC:B1:28:B0:6F:33:7D:57:27:7A:49:A6:F5:99:BC:F3:03:19:13:40:4C:83:A3:AB:8C:AC:21:84:67:70 Fingerprint (SHA1): C2:3B:DC:CD:86:FB:33:AC:98:86:D5:E9:F0:34:39:38:7D:EB:84:2E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14412: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195704 (0x13bda538) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:24:21 2017 Not After : Thu Mar 31 20:24:21 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:6d:63:be:ab:35:41:52:36:85:d8:f1:09:26:da:ae: 09:35:75:d5:d3:ce:31:f8:d4:cb:3e:af:2c:4f:38:4f: a3:6a:70:a8:f8:44:35:65:35:24:8e:2a:67:e6:fd:09: aa:7f:b9:33:98:92:7f:db:c3:b0:e4:9e:83:52:0f:3e: 52:67:76:c1:eb:b1:63:0a:19:1f:9f:6e:2f:66:0b:7b: 2c:8a:e2:de:18:44:0b:c3:c3:f9:c5:1c:59:fa:df:03: 04:e5:bf:4c:eb:2f:30:46:17:7f:23:63:48:8f:9a:6c: 19:a8:18:07:e2:15:7f:18:02:ac:c0:30:d7:3e:fc:2a: 98:12:16:fa:67:12:d1:18:3a:94:3f:47:57:b2:b1:32: fe:ac:1f:a6:ae:4b:03:cc:5c:da:10:c2:1c:48:99:9b: 4b:77:06:59:d8:51:f7:d6:cd:fa:09:14:d3:b3:01:5f: 95:8e:d7:97:86:a4:4f:13:4b:ee:65:83:58:08:2b:09: 57:2b:14:be:bd:38:d8:96:ab:12:14:d8:d2:8a:9e:6e: f7:df:f5:d9:81:e9:d0:28:ea:df:2c:51:9a:06:2d:c0: 7e:9b:35:8a:27:1a:bd:67:58:1d:d9:c9:d3:c9:85:11: 60:1e:fc:ad:85:a8:40:23:5d:98:a7:35:d9:e3:1d:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:57:d2:4f:ce:98:3c:11:79:3f:29:c6:cf:8e:e1:c2: 5a:25:89:a7:82:ee:d8:8f:08:86:67:2e:35:82:47:c7: af:ea:ab:4f:77:dc:94:7c:28:29:b7:c4:bd:d6:0f:7b: 05:6f:71:e1:10:a2:ec:65:93:f7:83:b5:52:9d:2f:72: cf:70:08:3a:f1:4b:97:41:bc:1f:bf:e2:55:87:43:94: a2:d3:92:86:72:18:bb:47:22:3a:9e:f3:35:0f:22:2d: 77:2a:14:e9:74:49:f7:e7:72:3c:6a:7c:fc:46:73:34: 9b:b2:31:98:61:cb:65:31:37:65:bc:7f:e4:62:80:7a: 7c:8b:c1:86:7c:ab:db:72:d5:8f:95:df:46:20:f1:33: 42:86:85:76:d0:65:50:27:e4:43:66:68:85:e7:9a:ec: ac:bb:a2:32:2f:df:43:9d:5a:63:1c:ad:1c:06:7f:d6: 0b:a6:e8:cc:df:23:f3:58:cc:81:8a:96:b1:b7:9a:26: 0a:25:db:91:90:59:2a:ac:e3:d7:bc:a8:60:37:c7:e7: 29:3c:a3:30:a4:ac:da:d7:3c:e8:61:78:a8:56:b3:53: 9c:7d:eb:f1:83:2b:30:5e:bb:7b:9d:23:0f:85:88:3a: cb:6e:88:d7:7c:92:eb:96:7a:4f:46:38:d9:9a:bc:e4 Fingerprint (SHA-256): 18:64:68:7D:5E:DB:6C:E7:AE:E1:39:DE:C2:56:57:E1:F6:B1:74:C6:75:F7:10:1D:23:60:25:92:27:1F:B1:79 Fingerprint (SHA1): D3:A3:FA:07:23:FF:B2:66:76:46:5D:31:26:CA:10:B0:0B:94:06:F1 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14413: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195704 (0x13bda538) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:24:21 2017 Not After : Thu Mar 31 20:24:21 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:6d:63:be:ab:35:41:52:36:85:d8:f1:09:26:da:ae: 09:35:75:d5:d3:ce:31:f8:d4:cb:3e:af:2c:4f:38:4f: a3:6a:70:a8:f8:44:35:65:35:24:8e:2a:67:e6:fd:09: aa:7f:b9:33:98:92:7f:db:c3:b0:e4:9e:83:52:0f:3e: 52:67:76:c1:eb:b1:63:0a:19:1f:9f:6e:2f:66:0b:7b: 2c:8a:e2:de:18:44:0b:c3:c3:f9:c5:1c:59:fa:df:03: 04:e5:bf:4c:eb:2f:30:46:17:7f:23:63:48:8f:9a:6c: 19:a8:18:07:e2:15:7f:18:02:ac:c0:30:d7:3e:fc:2a: 98:12:16:fa:67:12:d1:18:3a:94:3f:47:57:b2:b1:32: fe:ac:1f:a6:ae:4b:03:cc:5c:da:10:c2:1c:48:99:9b: 4b:77:06:59:d8:51:f7:d6:cd:fa:09:14:d3:b3:01:5f: 95:8e:d7:97:86:a4:4f:13:4b:ee:65:83:58:08:2b:09: 57:2b:14:be:bd:38:d8:96:ab:12:14:d8:d2:8a:9e:6e: f7:df:f5:d9:81:e9:d0:28:ea:df:2c:51:9a:06:2d:c0: 7e:9b:35:8a:27:1a:bd:67:58:1d:d9:c9:d3:c9:85:11: 60:1e:fc:ad:85:a8:40:23:5d:98:a7:35:d9:e3:1d:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:57:d2:4f:ce:98:3c:11:79:3f:29:c6:cf:8e:e1:c2: 5a:25:89:a7:82:ee:d8:8f:08:86:67:2e:35:82:47:c7: af:ea:ab:4f:77:dc:94:7c:28:29:b7:c4:bd:d6:0f:7b: 05:6f:71:e1:10:a2:ec:65:93:f7:83:b5:52:9d:2f:72: cf:70:08:3a:f1:4b:97:41:bc:1f:bf:e2:55:87:43:94: a2:d3:92:86:72:18:bb:47:22:3a:9e:f3:35:0f:22:2d: 77:2a:14:e9:74:49:f7:e7:72:3c:6a:7c:fc:46:73:34: 9b:b2:31:98:61:cb:65:31:37:65:bc:7f:e4:62:80:7a: 7c:8b:c1:86:7c:ab:db:72:d5:8f:95:df:46:20:f1:33: 42:86:85:76:d0:65:50:27:e4:43:66:68:85:e7:9a:ec: ac:bb:a2:32:2f:df:43:9d:5a:63:1c:ad:1c:06:7f:d6: 0b:a6:e8:cc:df:23:f3:58:cc:81:8a:96:b1:b7:9a:26: 0a:25:db:91:90:59:2a:ac:e3:d7:bc:a8:60:37:c7:e7: 29:3c:a3:30:a4:ac:da:d7:3c:e8:61:78:a8:56:b3:53: 9c:7d:eb:f1:83:2b:30:5e:bb:7b:9d:23:0f:85:88:3a: cb:6e:88:d7:7c:92:eb:96:7a:4f:46:38:d9:9a:bc:e4 Fingerprint (SHA-256): 18:64:68:7D:5E:DB:6C:E7:AE:E1:39:DE:C2:56:57:E1:F6:B1:74:C6:75:F7:10:1D:23:60:25:92:27:1F:B1:79 Fingerprint (SHA1): D3:A3:FA:07:23:FF:B2:66:76:46:5D:31:26:CA:10:B0:0B:94:06:F1 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14414: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #14415: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195703 (0x13bda537) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 20:24:05 2017 Not After : Thu Mar 31 20:24:05 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:1c:a4:27:d2:f1:51:1a:1e:18:c7:8a:87:08:b7:a2: 5a:71:a7:d5:34:b6:c5:74:ca:39:ef:8b:8f:76:ae:eb: 16:c7:38:82:77:c9:0e:75:5c:98:d9:74:27:50:d8:92: eb:25:2a:ac:4b:59:1a:bc:16:94:8b:d1:95:77:82:ac: 7d:dc:65:e8:4f:bf:b4:98:c6:1f:b5:03:44:2c:42:37: 95:c7:62:90:40:2b:b7:8f:ad:77:d1:72:fc:0e:e1:8b: 4e:01:30:64:07:d7:f0:5e:87:a7:02:97:74:f7:fe:c1: 02:8f:88:af:6b:71:22:19:08:ca:6b:e5:ba:d4:d4:ea: ef:0f:59:f4:c0:a5:cc:d6:75:f5:45:10:6c:0f:9e:7a: 9f:55:bb:b3:c1:d0:b3:85:fd:3f:91:09:5c:cf:ed:bf: bb:f9:57:11:66:0b:fe:1e:8e:f5:2c:b4:f0:08:15:fe: 68:fb:51:e0:a6:fe:03:00:5a:fb:44:f6:db:c7:c2:d2: 0a:c0:2b:31:9b:9a:d7:2b:73:96:3c:64:ba:f0:46:26: 1e:25:85:ab:ff:aa:c4:b8:39:e1:14:e0:33:d8:d7:2a: 13:c1:71:04:e5:b6:ca:7b:67:5b:e8:25:b9:6c:9c:e2: 82:cf:09:7d:8d:36:1c:57:06:97:1e:c7:4c:c2:43:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:db:b8:d0:c3:ea:43:63:b6:32:47:39:a8:f5:6e:d3: 51:ee:c9:4a:5b:2e:ca:34:66:9e:53:4b:2f:68:23:61: ad:35:70:7c:30:cd:cd:49:e6:e4:9b:95:bb:2f:f3:12: a4:c9:e4:cb:14:18:42:09:48:a3:66:27:d1:fa:83:fb: 28:09:00:80:85:9a:7b:f3:01:10:2c:90:33:02:91:d8: b3:46:bd:35:12:01:15:a4:3a:e5:c4:49:3f:08:85:54: 98:0c:15:49:80:8f:e4:f7:c6:45:08:d2:3b:1f:1b:2b: 3b:de:1b:46:c1:01:03:d7:bd:5d:c3:ac:4a:fb:ed:61: 6f:8b:cf:f2:c8:5e:4e:88:4d:b2:af:93:e6:04:83:2e: 09:19:87:6e:47:89:39:7e:25:e0:2a:3f:8e:38:59:80: 18:4a:a7:22:4f:97:25:00:bf:21:9f:bb:a2:6a:b9:59: 2d:b6:ee:59:df:a8:86:e1:58:9c:9a:4b:e7:f8:75:16: 98:1f:bf:4e:fa:d9:02:55:43:0d:17:e9:4b:11:39:80: cf:7e:73:b3:12:6f:63:19:13:98:01:d2:62:8d:ad:20: dc:71:d0:22:2d:aa:92:2a:89:d2:b5:81:db:d9:b9:2e: 47:b3:ec:c1:d1:a5:91:f0:c4:e2:66:00:89:4f:12:34 Fingerprint (SHA-256): 08:5D:DC:B1:28:B0:6F:33:7D:57:27:7A:49:A6:F5:99:BC:F3:03:19:13:40:4C:83:A3:AB:8C:AC:21:84:67:70 Fingerprint (SHA1): C2:3B:DC:CD:86:FB:33:AC:98:86:D5:E9:F0:34:39:38:7D:EB:84:2E Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14416: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195704 (0x13bda538) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:24:21 2017 Not After : Thu Mar 31 20:24:21 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:6d:63:be:ab:35:41:52:36:85:d8:f1:09:26:da:ae: 09:35:75:d5:d3:ce:31:f8:d4:cb:3e:af:2c:4f:38:4f: a3:6a:70:a8:f8:44:35:65:35:24:8e:2a:67:e6:fd:09: aa:7f:b9:33:98:92:7f:db:c3:b0:e4:9e:83:52:0f:3e: 52:67:76:c1:eb:b1:63:0a:19:1f:9f:6e:2f:66:0b:7b: 2c:8a:e2:de:18:44:0b:c3:c3:f9:c5:1c:59:fa:df:03: 04:e5:bf:4c:eb:2f:30:46:17:7f:23:63:48:8f:9a:6c: 19:a8:18:07:e2:15:7f:18:02:ac:c0:30:d7:3e:fc:2a: 98:12:16:fa:67:12:d1:18:3a:94:3f:47:57:b2:b1:32: fe:ac:1f:a6:ae:4b:03:cc:5c:da:10:c2:1c:48:99:9b: 4b:77:06:59:d8:51:f7:d6:cd:fa:09:14:d3:b3:01:5f: 95:8e:d7:97:86:a4:4f:13:4b:ee:65:83:58:08:2b:09: 57:2b:14:be:bd:38:d8:96:ab:12:14:d8:d2:8a:9e:6e: f7:df:f5:d9:81:e9:d0:28:ea:df:2c:51:9a:06:2d:c0: 7e:9b:35:8a:27:1a:bd:67:58:1d:d9:c9:d3:c9:85:11: 60:1e:fc:ad:85:a8:40:23:5d:98:a7:35:d9:e3:1d:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:57:d2:4f:ce:98:3c:11:79:3f:29:c6:cf:8e:e1:c2: 5a:25:89:a7:82:ee:d8:8f:08:86:67:2e:35:82:47:c7: af:ea:ab:4f:77:dc:94:7c:28:29:b7:c4:bd:d6:0f:7b: 05:6f:71:e1:10:a2:ec:65:93:f7:83:b5:52:9d:2f:72: cf:70:08:3a:f1:4b:97:41:bc:1f:bf:e2:55:87:43:94: a2:d3:92:86:72:18:bb:47:22:3a:9e:f3:35:0f:22:2d: 77:2a:14:e9:74:49:f7:e7:72:3c:6a:7c:fc:46:73:34: 9b:b2:31:98:61:cb:65:31:37:65:bc:7f:e4:62:80:7a: 7c:8b:c1:86:7c:ab:db:72:d5:8f:95:df:46:20:f1:33: 42:86:85:76:d0:65:50:27:e4:43:66:68:85:e7:9a:ec: ac:bb:a2:32:2f:df:43:9d:5a:63:1c:ad:1c:06:7f:d6: 0b:a6:e8:cc:df:23:f3:58:cc:81:8a:96:b1:b7:9a:26: 0a:25:db:91:90:59:2a:ac:e3:d7:bc:a8:60:37:c7:e7: 29:3c:a3:30:a4:ac:da:d7:3c:e8:61:78:a8:56:b3:53: 9c:7d:eb:f1:83:2b:30:5e:bb:7b:9d:23:0f:85:88:3a: cb:6e:88:d7:7c:92:eb:96:7a:4f:46:38:d9:9a:bc:e4 Fingerprint (SHA-256): 18:64:68:7D:5E:DB:6C:E7:AE:E1:39:DE:C2:56:57:E1:F6:B1:74:C6:75:F7:10:1D:23:60:25:92:27:1F:B1:79 Fingerprint (SHA1): D3:A3:FA:07:23:FF:B2:66:76:46:5D:31:26:CA:10:B0:0B:94:06:F1 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14417: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195704 (0x13bda538) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:24:21 2017 Not After : Thu Mar 31 20:24:21 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:6d:63:be:ab:35:41:52:36:85:d8:f1:09:26:da:ae: 09:35:75:d5:d3:ce:31:f8:d4:cb:3e:af:2c:4f:38:4f: a3:6a:70:a8:f8:44:35:65:35:24:8e:2a:67:e6:fd:09: aa:7f:b9:33:98:92:7f:db:c3:b0:e4:9e:83:52:0f:3e: 52:67:76:c1:eb:b1:63:0a:19:1f:9f:6e:2f:66:0b:7b: 2c:8a:e2:de:18:44:0b:c3:c3:f9:c5:1c:59:fa:df:03: 04:e5:bf:4c:eb:2f:30:46:17:7f:23:63:48:8f:9a:6c: 19:a8:18:07:e2:15:7f:18:02:ac:c0:30:d7:3e:fc:2a: 98:12:16:fa:67:12:d1:18:3a:94:3f:47:57:b2:b1:32: fe:ac:1f:a6:ae:4b:03:cc:5c:da:10:c2:1c:48:99:9b: 4b:77:06:59:d8:51:f7:d6:cd:fa:09:14:d3:b3:01:5f: 95:8e:d7:97:86:a4:4f:13:4b:ee:65:83:58:08:2b:09: 57:2b:14:be:bd:38:d8:96:ab:12:14:d8:d2:8a:9e:6e: f7:df:f5:d9:81:e9:d0:28:ea:df:2c:51:9a:06:2d:c0: 7e:9b:35:8a:27:1a:bd:67:58:1d:d9:c9:d3:c9:85:11: 60:1e:fc:ad:85:a8:40:23:5d:98:a7:35:d9:e3:1d:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:57:d2:4f:ce:98:3c:11:79:3f:29:c6:cf:8e:e1:c2: 5a:25:89:a7:82:ee:d8:8f:08:86:67:2e:35:82:47:c7: af:ea:ab:4f:77:dc:94:7c:28:29:b7:c4:bd:d6:0f:7b: 05:6f:71:e1:10:a2:ec:65:93:f7:83:b5:52:9d:2f:72: cf:70:08:3a:f1:4b:97:41:bc:1f:bf:e2:55:87:43:94: a2:d3:92:86:72:18:bb:47:22:3a:9e:f3:35:0f:22:2d: 77:2a:14:e9:74:49:f7:e7:72:3c:6a:7c:fc:46:73:34: 9b:b2:31:98:61:cb:65:31:37:65:bc:7f:e4:62:80:7a: 7c:8b:c1:86:7c:ab:db:72:d5:8f:95:df:46:20:f1:33: 42:86:85:76:d0:65:50:27:e4:43:66:68:85:e7:9a:ec: ac:bb:a2:32:2f:df:43:9d:5a:63:1c:ad:1c:06:7f:d6: 0b:a6:e8:cc:df:23:f3:58:cc:81:8a:96:b1:b7:9a:26: 0a:25:db:91:90:59:2a:ac:e3:d7:bc:a8:60:37:c7:e7: 29:3c:a3:30:a4:ac:da:d7:3c:e8:61:78:a8:56:b3:53: 9c:7d:eb:f1:83:2b:30:5e:bb:7b:9d:23:0f:85:88:3a: cb:6e:88:d7:7c:92:eb:96:7a:4f:46:38:d9:9a:bc:e4 Fingerprint (SHA-256): 18:64:68:7D:5E:DB:6C:E7:AE:E1:39:DE:C2:56:57:E1:F6:B1:74:C6:75:F7:10:1D:23:60:25:92:27:1F:B1:79 Fingerprint (SHA1): D3:A3:FA:07:23:FF:B2:66:76:46:5D:31:26:CA:10:B0:0B:94:06:F1 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14418: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #14419: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195711 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14420: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #14421: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #14422: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195712 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14423: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #14424: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #14425: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14426: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 331195713 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14427: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14428: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #14429: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14430: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 331195714 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14431: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14432: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #14433: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14434: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 331195715 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #14435: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14436: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 331195716 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #14437: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14438: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #14439: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14440: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14441: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 331195717 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14442: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14443: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14444: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14445: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 331195718 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14446: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14447: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14448: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14449: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331195719 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14450: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14451: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14452: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14453: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 331195720 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14454: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14455: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14456: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195711 (0x13bda53f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 20:25:22 2017 Not After : Thu Mar 31 20:25:22 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:d3:48:2e:46:a2:ec:db:bd:f2:a7:46:c4:d8:de:fc: c9:5e:2b:f8:ec:d0:99:41:40:42:ed:9d:c5:ef:78:43: 16:23:5b:0b:6c:a5:bb:0e:99:d9:0b:1a:21:fd:45:2f: 06:20:b3:5c:f4:4f:a3:1d:f1:b6:78:4d:ce:6d:45:9c: d1:54:0d:ba:a6:87:c9:ca:f4:4b:be:2a:8e:bd:a6:db: a8:28:8f:3f:a4:34:cb:86:be:72:d1:47:72:6b:70:0a: b1:05:57:c1:10:4d:1b:87:3e:15:76:e2:3b:7e:b0:1a: 92:01:c5:80:c5:7c:6d:6b:77:ce:a7:77:02:e0:d8:43: 4a:86:08:2d:6b:8c:bd:ed:3b:c7:a4:74:a5:26:99:fb: c2:c3:8b:b7:de:1c:ff:0d:ff:07:46:00:75:ba:ac:5c: f5:d6:e1:13:1e:c2:61:24:4b:a3:17:21:66:d0:39:8c: 9f:24:7b:17:93:02:4e:9b:28:9c:5f:2d:fa:98:33:47: e9:7b:4e:11:97:1a:63:49:7b:02:5a:79:f6:d7:dd:a6: 83:c2:6a:97:98:4f:ba:22:3b:d6:36:c4:7d:b7:af:d8: 5f:a2:c0:c0:06:a7:84:9a:7b:f8:1c:0a:d6:04:91:a3: c8:78:31:94:5f:d5:18:3c:bf:8d:2a:35:30:f0:f0:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:45:83:ac:3e:68:14:14:34:f2:68:8d:6d:78:2b:f5: 2e:08:1c:55:cc:c0:c5:47:29:77:ce:86:32:4a:fd:38: ba:8a:70:6b:92:c8:98:cd:95:23:0c:fe:c8:5b:96:93: d6:48:5c:2d:b1:77:aa:3c:05:45:55:0c:a5:db:a5:ee: bd:cf:22:14:9e:47:5b:fd:ef:c0:98:be:d0:c1:cb:2f: 8f:0f:4f:c8:b8:65:3d:8e:16:6f:4e:15:38:32:e5:71: 6e:ce:9d:0e:f2:a9:ca:59:86:44:19:99:11:ac:35:66: da:6d:70:aa:6a:5f:0b:f2:8b:3c:c2:7e:75:93:b2:e2: 4a:74:cb:ea:93:02:25:e4:d2:46:a2:6a:30:3b:db:b0: 4c:8a:ee:2b:97:f8:ee:dc:51:55:e4:0b:d5:91:10:5b: da:39:9c:07:5a:76:bf:d2:92:47:0f:66:52:75:dd:5b: 9b:55:a2:69:30:5d:68:51:f5:30:96:92:25:c0:3e:b3: 23:d1:28:ce:d3:94:5e:61:46:c0:79:bf:b0:ab:be:b2: b5:19:28:ac:e2:e9:a3:cd:79:65:8c:ef:a2:4a:d1:d9: cb:4e:13:58:7a:34:78:ea:76:20:88:4a:c7:e0:78:b1: 8f:83:91:55:6f:12:d3:2e:d8:54:a4:9d:ef:01:36:99 Fingerprint (SHA-256): 36:1E:54:4E:E4:9E:6D:02:DD:0D:8C:5D:E3:15:5D:A3:EF:EA:96:19:2D:AA:2A:80:FD:D4:A8:AA:EA:E2:A6:EA Fingerprint (SHA1): 76:47:46:6E:49:64:6C:DF:8A:73:5C:0E:47:40:C4:49:8A:A8:B9:9E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #14457: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14458: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14459: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14460: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14461: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14462: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14463: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14464: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14465: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195712 (0x13bda540) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:25:29 2017 Not After : Thu Mar 31 20:25:29 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:af:75:aa:78:47:d3:39:5f:55:b8:6b:3d:db:5c:dc: 9d:af:af:19:c3:92:66:3a:e8:3b:b0:b6:dd:81:3e:6a: f3:e3:ff:80:3a:0b:08:35:f0:db:ed:ec:42:bb:8d:73: 27:43:7e:f6:b6:25:90:cf:05:88:4d:77:a4:42:b8:c0: 93:c7:21:71:e6:9f:9e:22:89:f7:38:7a:30:39:23:58: 63:3c:34:b9:d1:3e:7f:09:2c:eb:b1:76:0c:fb:8e:9c: 48:12:5d:da:81:e6:b7:22:71:68:19:3a:a0:45:af:36: 52:81:ee:fd:9c:44:5b:87:21:27:f5:e8:43:53:9a:43: 16:e7:3d:09:20:c0:c8:ec:a7:13:fd:a6:e0:3d:cd:44: 6b:ba:ba:f8:0e:16:3e:98:a1:66:0c:01:67:67:f0:4e: 82:d8:93:7c:dc:cb:95:26:69:2c:e8:39:ca:8f:be:9f: 76:5a:16:4f:3f:48:37:e1:9f:86:ce:eb:d2:48:52:a7: c3:25:74:2b:8b:9a:95:a0:c7:47:2f:c5:dd:da:23:e8: 99:37:78:62:af:8c:66:a8:e8:d4:1c:7f:6b:f7:fe:bd: 84:b7:b8:9b:1b:a9:7d:b1:0a:b7:98:26:c9:08:93:08: bb:ef:5d:64:04:52:68:7a:5a:c5:92:9c:f1:91:21:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:7b:cc:32:fd:18:18:dd:60:f9:55:7b:9a:f5:b7:f9: 64:c6:a3:e2:5e:f8:a3:51:4a:a2:9d:2d:3c:44:2d:20: 04:2e:49:db:24:9e:62:e9:58:29:dd:2c:b8:3a:2a:f7: 5c:a8:e7:cf:3f:07:30:fe:f8:42:9a:b5:05:73:57:4e: d0:d5:7b:da:8e:cf:5e:9f:31:12:b1:0e:8e:58:1e:f6: 6e:d3:9b:ba:e8:7f:80:7a:fe:f1:f2:7e:86:d2:85:2e: fe:86:17:bd:1b:bf:c4:7d:98:fa:e8:87:99:dd:ce:a7: 9f:70:12:62:23:bd:96:9e:7e:e6:d7:e9:af:1f:24:6b: e7:e4:46:99:b7:25:c0:12:f0:66:78:55:28:e3:bb:77: 28:1b:56:4d:0c:34:4e:3d:d2:46:02:50:8e:67:71:a8: 02:0b:fa:14:19:8e:b0:ab:dc:92:35:e8:bd:a6:83:4b: 66:15:68:e4:ba:d0:bd:90:76:52:f1:84:86:e4:5d:a4: 82:32:85:2b:65:40:77:ca:4b:4a:0e:e1:74:d3:8f:cb: f0:83:75:e9:14:cc:17:71:cd:de:91:e3:ee:cc:af:02: 5d:70:b8:89:15:ac:9e:a6:ac:10:a1:5b:fc:a1:71:12: 1b:27:45:fe:13:2b:17:98:8d:43:be:64:bc:6c:f6:17 Fingerprint (SHA-256): 3D:56:97:E5:53:20:0D:9E:B9:09:05:53:B5:4B:18:F9:38:08:AA:F6:1C:0B:1C:8F:E3:6B:A5:51:9B:76:A3:5E Fingerprint (SHA1): 44:EE:42:11:E4:7D:CB:5E:B6:31:ED:02:9D:25:E9:39:EA:7B:62:A0 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #14466: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14467: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14468: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14469: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14470: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14471: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14472: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #14473: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #14474: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #14475: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #14476: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #14477: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #14478: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #14479: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #14480: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #14481: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #14482: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #14483: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14484: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195721 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14485: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14486: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14487: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14488: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331195722 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14489: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14490: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14491: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14492: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331195723 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14493: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14494: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14495: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14496: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 331195724 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14497: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14498: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14499: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14500: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 331195725 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14501: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14502: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #14503: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14504: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 331195726 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14505: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14506: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #14507: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14508: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 331195727 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14509: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14510: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #14511: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14512: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 331195728 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14513: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14514: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #14515: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14516: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 331195729 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14517: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14518: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14519: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195721 (0x13bda549) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:27:48 2017 Not After : Thu Mar 31 20:27:48 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 59:3d:1a:9c:bd:6c:41:7d:4a:b9:28:43:21:6c:b6:3f: 42:e9:e3:d4:e1:d8:d9:13:1b:24:29:cf:76:18:e9:5c: b0:d8:ad:4a:33:6f:06:29:9d:f5:d3:3e:1c:5b:e6:d5: 8a:34:82:2e:82:76:b5:e2:ea:f7:d9:62:c0:9f:cc:92: d7:9a:73:34:5e:d6:27:d9:0b:a0:c3:da:25:41:b7:9b: 1c:93:48:98:d6:48:d6:22:a0:fa:85:20:61:db:fc:56: 10:8b:16:e8:8b:ed:02:87:e7:31:fc:55:8f:47:5d:02: c7:a5:24:b3:0d:42:13:9c:d8:85:f5:73:b4:9f:ca:aa: 44:87:ca:c6:86:fe:5d:35:c1:b1:90:2b:09:2e:0d:7a: 85:24:b7:8c:d8:33:ee:82:4a:a9:93:90:92:3a:a9:3c: de:c7:e8:23:d8:95:10:1d:4c:dc:1d:28:2a:94:13:45: dc:ac:c2:bf:94:e8:9f:ac:a4:2f:4a:5d:01:ce:92:83: 6b:19:ac:6d:65:ec:d8:38:b8:98:af:86:ee:99:05:13: 9a:70:2d:1f:c6:74:4d:81:09:d9:11:9d:3d:e0:5b:ab: 00:ab:a5:9e:e3:7b:ef:84:63:d2:b8:09:85:9e:15:e2: fd:87:c9:43:10:64:46:78:91:b8:1c:cc:e8:4f:75:d0 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:38:9a:12:ed:ba:4d:d2:f6:77:62:aa:0b: 0a:36:a0:31:b4:5c:de:11:f9:9f:42:da:81:24:3b:34: 02:1c:1c:3d:4a:56:67:4b:24:7d:53:de:08:a0:6f:fb: 10:e6:fb:b7:71:6e:f3:b7:7d:f3:c1:d3:ca:95 Fingerprint (SHA-256): EA:5F:54:57:0A:FC:1A:65:6C:68:79:9A:D6:2E:58:89:E8:A2:63:F9:A6:2D:95:6A:C1:02:79:CE:59:89:C6:E0 Fingerprint (SHA1): 2C:1A:6E:2A:A8:E9:8F:C3:B9:FB:80:FF:BA:73:B3:DD:FB:D5:66:35 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14520: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195721 (0x13bda549) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:27:48 2017 Not After : Thu Mar 31 20:27:48 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 59:3d:1a:9c:bd:6c:41:7d:4a:b9:28:43:21:6c:b6:3f: 42:e9:e3:d4:e1:d8:d9:13:1b:24:29:cf:76:18:e9:5c: b0:d8:ad:4a:33:6f:06:29:9d:f5:d3:3e:1c:5b:e6:d5: 8a:34:82:2e:82:76:b5:e2:ea:f7:d9:62:c0:9f:cc:92: d7:9a:73:34:5e:d6:27:d9:0b:a0:c3:da:25:41:b7:9b: 1c:93:48:98:d6:48:d6:22:a0:fa:85:20:61:db:fc:56: 10:8b:16:e8:8b:ed:02:87:e7:31:fc:55:8f:47:5d:02: c7:a5:24:b3:0d:42:13:9c:d8:85:f5:73:b4:9f:ca:aa: 44:87:ca:c6:86:fe:5d:35:c1:b1:90:2b:09:2e:0d:7a: 85:24:b7:8c:d8:33:ee:82:4a:a9:93:90:92:3a:a9:3c: de:c7:e8:23:d8:95:10:1d:4c:dc:1d:28:2a:94:13:45: dc:ac:c2:bf:94:e8:9f:ac:a4:2f:4a:5d:01:ce:92:83: 6b:19:ac:6d:65:ec:d8:38:b8:98:af:86:ee:99:05:13: 9a:70:2d:1f:c6:74:4d:81:09:d9:11:9d:3d:e0:5b:ab: 00:ab:a5:9e:e3:7b:ef:84:63:d2:b8:09:85:9e:15:e2: fd:87:c9:43:10:64:46:78:91:b8:1c:cc:e8:4f:75:d0 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:38:9a:12:ed:ba:4d:d2:f6:77:62:aa:0b: 0a:36:a0:31:b4:5c:de:11:f9:9f:42:da:81:24:3b:34: 02:1c:1c:3d:4a:56:67:4b:24:7d:53:de:08:a0:6f:fb: 10:e6:fb:b7:71:6e:f3:b7:7d:f3:c1:d3:ca:95 Fingerprint (SHA-256): EA:5F:54:57:0A:FC:1A:65:6C:68:79:9A:D6:2E:58:89:E8:A2:63:F9:A6:2D:95:6A:C1:02:79:CE:59:89:C6:E0 Fingerprint (SHA1): 2C:1A:6E:2A:A8:E9:8F:C3:B9:FB:80:FF:BA:73:B3:DD:FB:D5:66:35 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14521: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195721 (0x13bda549) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:27:48 2017 Not After : Thu Mar 31 20:27:48 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 59:3d:1a:9c:bd:6c:41:7d:4a:b9:28:43:21:6c:b6:3f: 42:e9:e3:d4:e1:d8:d9:13:1b:24:29:cf:76:18:e9:5c: b0:d8:ad:4a:33:6f:06:29:9d:f5:d3:3e:1c:5b:e6:d5: 8a:34:82:2e:82:76:b5:e2:ea:f7:d9:62:c0:9f:cc:92: d7:9a:73:34:5e:d6:27:d9:0b:a0:c3:da:25:41:b7:9b: 1c:93:48:98:d6:48:d6:22:a0:fa:85:20:61:db:fc:56: 10:8b:16:e8:8b:ed:02:87:e7:31:fc:55:8f:47:5d:02: c7:a5:24:b3:0d:42:13:9c:d8:85:f5:73:b4:9f:ca:aa: 44:87:ca:c6:86:fe:5d:35:c1:b1:90:2b:09:2e:0d:7a: 85:24:b7:8c:d8:33:ee:82:4a:a9:93:90:92:3a:a9:3c: de:c7:e8:23:d8:95:10:1d:4c:dc:1d:28:2a:94:13:45: dc:ac:c2:bf:94:e8:9f:ac:a4:2f:4a:5d:01:ce:92:83: 6b:19:ac:6d:65:ec:d8:38:b8:98:af:86:ee:99:05:13: 9a:70:2d:1f:c6:74:4d:81:09:d9:11:9d:3d:e0:5b:ab: 00:ab:a5:9e:e3:7b:ef:84:63:d2:b8:09:85:9e:15:e2: fd:87:c9:43:10:64:46:78:91:b8:1c:cc:e8:4f:75:d0 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:38:9a:12:ed:ba:4d:d2:f6:77:62:aa:0b: 0a:36:a0:31:b4:5c:de:11:f9:9f:42:da:81:24:3b:34: 02:1c:1c:3d:4a:56:67:4b:24:7d:53:de:08:a0:6f:fb: 10:e6:fb:b7:71:6e:f3:b7:7d:f3:c1:d3:ca:95 Fingerprint (SHA-256): EA:5F:54:57:0A:FC:1A:65:6C:68:79:9A:D6:2E:58:89:E8:A2:63:F9:A6:2D:95:6A:C1:02:79:CE:59:89:C6:E0 Fingerprint (SHA1): 2C:1A:6E:2A:A8:E9:8F:C3:B9:FB:80:FF:BA:73:B3:DD:FB:D5:66:35 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #14522: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195721 (0x13bda549) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:27:48 2017 Not After : Thu Mar 31 20:27:48 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 59:3d:1a:9c:bd:6c:41:7d:4a:b9:28:43:21:6c:b6:3f: 42:e9:e3:d4:e1:d8:d9:13:1b:24:29:cf:76:18:e9:5c: b0:d8:ad:4a:33:6f:06:29:9d:f5:d3:3e:1c:5b:e6:d5: 8a:34:82:2e:82:76:b5:e2:ea:f7:d9:62:c0:9f:cc:92: d7:9a:73:34:5e:d6:27:d9:0b:a0:c3:da:25:41:b7:9b: 1c:93:48:98:d6:48:d6:22:a0:fa:85:20:61:db:fc:56: 10:8b:16:e8:8b:ed:02:87:e7:31:fc:55:8f:47:5d:02: c7:a5:24:b3:0d:42:13:9c:d8:85:f5:73:b4:9f:ca:aa: 44:87:ca:c6:86:fe:5d:35:c1:b1:90:2b:09:2e:0d:7a: 85:24:b7:8c:d8:33:ee:82:4a:a9:93:90:92:3a:a9:3c: de:c7:e8:23:d8:95:10:1d:4c:dc:1d:28:2a:94:13:45: dc:ac:c2:bf:94:e8:9f:ac:a4:2f:4a:5d:01:ce:92:83: 6b:19:ac:6d:65:ec:d8:38:b8:98:af:86:ee:99:05:13: 9a:70:2d:1f:c6:74:4d:81:09:d9:11:9d:3d:e0:5b:ab: 00:ab:a5:9e:e3:7b:ef:84:63:d2:b8:09:85:9e:15:e2: fd:87:c9:43:10:64:46:78:91:b8:1c:cc:e8:4f:75:d0 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:38:9a:12:ed:ba:4d:d2:f6:77:62:aa:0b: 0a:36:a0:31:b4:5c:de:11:f9:9f:42:da:81:24:3b:34: 02:1c:1c:3d:4a:56:67:4b:24:7d:53:de:08:a0:6f:fb: 10:e6:fb:b7:71:6e:f3:b7:7d:f3:c1:d3:ca:95 Fingerprint (SHA-256): EA:5F:54:57:0A:FC:1A:65:6C:68:79:9A:D6:2E:58:89:E8:A2:63:F9:A6:2D:95:6A:C1:02:79:CE:59:89:C6:E0 Fingerprint (SHA1): 2C:1A:6E:2A:A8:E9:8F:C3:B9:FB:80:FF:BA:73:B3:DD:FB:D5:66:35 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #14523: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14524: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14525: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14526: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #14527: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14528: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14529: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14530: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14531: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14532: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14533: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14534: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #14535: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14536: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14537: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14538: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #14539: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14540: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14541: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14542: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14543: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14544: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14545: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14546: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #14547: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14548: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14549: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14550: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170331203120Z nextupdate=20180331203120Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Mar 31 20:31:20 2017 Next Update: Sat Mar 31 20:31:20 2018 CRL Extensions: chains.sh: #14551: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331203121Z nextupdate=20180331203121Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 20:31:21 2017 Next Update: Sat Mar 31 20:31:21 2018 CRL Extensions: chains.sh: #14552: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170331203122Z nextupdate=20180331203122Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Mar 31 20:31:22 2017 Next Update: Sat Mar 31 20:31:22 2018 CRL Extensions: chains.sh: #14553: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170331203123Z nextupdate=20180331203123Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Mar 31 20:31:23 2017 Next Update: Sat Mar 31 20:31:23 2018 CRL Extensions: chains.sh: #14554: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170331203124Z addcert 14 20170331203124Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Mar 31 20:31:24 2017 Next Update: Sat Mar 31 20:31:22 2018 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Mar 31 20:31:24 2017 CRL Extensions: chains.sh: #14555: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331203125Z addcert 15 20170331203125Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 20:31:25 2017 Next Update: Sat Mar 31 20:31:21 2018 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Mar 31 20:31:25 2017 CRL Extensions: chains.sh: #14556: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14557: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14558: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #14559: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #14560: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #14561: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #14562: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #14563: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #14564: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #14565: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:29:52 2017 Not After : Thu Mar 31 20:29:52 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:3d:5f:5b:82:d4:02:79:1b:b0:39:99:a0:f4:6a:8d: e2:47:43:36:65:15:36:4e:94:43:a7:cb:35:c7:84:11: 93:ed:29:eb:79:d2:6c:82:a1:83:d6:4f:74:02:09:34: a4:7d:0a:6e:53:57:c4:4c:1a:c8:b0:b8:79:01:b4:cc: a2:43:b6:87:38:6f:03:43:9b:68:bd:9a:be:76:38:03: e4:28:a9:17:65:51:65:79:ac:bf:d0:53:c8:f1:5c:03: ee:ab:27:04:43:39:96:d9:f1:a2:31:1c:a3:9c:10:37: a1:3e:a1:e5:71:22:75:11:9d:6b:40:8a:08:33:d3:d3: 9b:23:bb:82:6d:2d:22:7d:a6:38:7b:51:c9:f7:61:73: 6e:d8:91:a5:28:98:03:f3:a1:c8:83:bf:4f:6c:ee:1e: 1a:cd:b3:62:98:ba:fc:82:50:74:97:f9:d9:bf:52:b6: 5e:3b:0f:ec:40:94:11:a3:d5:17:69:e8:98:37:11:73: 9d:47:ce:cf:fc:3d:87:c5:3f:22:c1:a3:c3:e6:2a:72: 87:8a:65:fc:21:af:c7:d4:b4:89:00:54:3b:95:0d:6e: 56:d1:f6:fa:a9:f2:6f:28:c4:39:20:89:63:fb:94:ef: 0f:37:fd:50:26:cf:e1:6a:70:60:a6:5a:42:d4:3e:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e1:fc:d2:03:fb:b1:be:4e:d7:78:31:e0:a9:36:72:b7: 71:3e:6a:f6:4e:74:5d:6c:31:55:2a:df:2a:93:f3:7b: 9a:8f:2f:bb:f2:c9:e6:b1:5d:1a:98:b8:d8:d8:c5:7b: 65:80:35:e4:bf:65:0e:69:6d:53:5d:16:dd:c9:aa:63: 99:2a:a1:6e:bc:f6:a5:2c:41:b5:26:90:93:d9:21:84: 9a:45:b1:77:89:ea:2e:81:8f:c1:5d:34:a5:47:93:fc: f4:41:63:79:19:59:b5:53:c2:98:de:05:26:a7:ab:c1: 8c:f1:4c:a6:bf:68:44:f5:2f:6f:a6:9e:f2:34:a2:8c: 84:15:c8:bc:47:0d:78:f7:2b:d5:e5:38:d5:a1:d8:85: a6:2a:6e:86:c9:24:a8:34:db:17:70:22:a9:b5:b9:1d: fd:5b:e0:3b:e9:d0:01:d1:19:fe:88:71:1c:a6:8e:84: 3d:2f:d4:82:a8:9f:f7:c9:d4:1f:08:b6:c3:dd:4f:3a: ab:9a:26:04:17:d2:8c:4a:8d:dd:78:1b:05:79:01:a9: ab:a0:b8:48:d6:f2:fd:58:e7:68:6c:97:bd:cc:e9:5e: 36:45:36:49:f3:57:66:76:6d:26:53:96:52:07:78:ba: 3c:b9:50:f0:43:d1:63:cb:dd:34:97:41:28:d5:3c:fc Fingerprint (SHA-256): A6:B3:66:F7:6E:BB:34:F7:97:87:6D:FD:EA:3C:87:3C:15:41:A0:65:C2:A0:EC:9E:1A:29:F7:46:7F:20:19:82 Fingerprint (SHA1): BD:7B:F1:FF:60:DF:AC:FE:F2:D3:C4:93:8E:60:6A:C5:43:1F:5A:C4 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #14566: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #14567: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:29:52 2017 Not After : Thu Mar 31 20:29:52 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:3d:5f:5b:82:d4:02:79:1b:b0:39:99:a0:f4:6a:8d: e2:47:43:36:65:15:36:4e:94:43:a7:cb:35:c7:84:11: 93:ed:29:eb:79:d2:6c:82:a1:83:d6:4f:74:02:09:34: a4:7d:0a:6e:53:57:c4:4c:1a:c8:b0:b8:79:01:b4:cc: a2:43:b6:87:38:6f:03:43:9b:68:bd:9a:be:76:38:03: e4:28:a9:17:65:51:65:79:ac:bf:d0:53:c8:f1:5c:03: ee:ab:27:04:43:39:96:d9:f1:a2:31:1c:a3:9c:10:37: a1:3e:a1:e5:71:22:75:11:9d:6b:40:8a:08:33:d3:d3: 9b:23:bb:82:6d:2d:22:7d:a6:38:7b:51:c9:f7:61:73: 6e:d8:91:a5:28:98:03:f3:a1:c8:83:bf:4f:6c:ee:1e: 1a:cd:b3:62:98:ba:fc:82:50:74:97:f9:d9:bf:52:b6: 5e:3b:0f:ec:40:94:11:a3:d5:17:69:e8:98:37:11:73: 9d:47:ce:cf:fc:3d:87:c5:3f:22:c1:a3:c3:e6:2a:72: 87:8a:65:fc:21:af:c7:d4:b4:89:00:54:3b:95:0d:6e: 56:d1:f6:fa:a9:f2:6f:28:c4:39:20:89:63:fb:94:ef: 0f:37:fd:50:26:cf:e1:6a:70:60:a6:5a:42:d4:3e:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e1:fc:d2:03:fb:b1:be:4e:d7:78:31:e0:a9:36:72:b7: 71:3e:6a:f6:4e:74:5d:6c:31:55:2a:df:2a:93:f3:7b: 9a:8f:2f:bb:f2:c9:e6:b1:5d:1a:98:b8:d8:d8:c5:7b: 65:80:35:e4:bf:65:0e:69:6d:53:5d:16:dd:c9:aa:63: 99:2a:a1:6e:bc:f6:a5:2c:41:b5:26:90:93:d9:21:84: 9a:45:b1:77:89:ea:2e:81:8f:c1:5d:34:a5:47:93:fc: f4:41:63:79:19:59:b5:53:c2:98:de:05:26:a7:ab:c1: 8c:f1:4c:a6:bf:68:44:f5:2f:6f:a6:9e:f2:34:a2:8c: 84:15:c8:bc:47:0d:78:f7:2b:d5:e5:38:d5:a1:d8:85: a6:2a:6e:86:c9:24:a8:34:db:17:70:22:a9:b5:b9:1d: fd:5b:e0:3b:e9:d0:01:d1:19:fe:88:71:1c:a6:8e:84: 3d:2f:d4:82:a8:9f:f7:c9:d4:1f:08:b6:c3:dd:4f:3a: ab:9a:26:04:17:d2:8c:4a:8d:dd:78:1b:05:79:01:a9: ab:a0:b8:48:d6:f2:fd:58:e7:68:6c:97:bd:cc:e9:5e: 36:45:36:49:f3:57:66:76:6d:26:53:96:52:07:78:ba: 3c:b9:50:f0:43:d1:63:cb:dd:34:97:41:28:d5:3c:fc Fingerprint (SHA-256): A6:B3:66:F7:6E:BB:34:F7:97:87:6D:FD:EA:3C:87:3C:15:41:A0:65:C2:A0:EC:9E:1A:29:F7:46:7F:20:19:82 Fingerprint (SHA1): BD:7B:F1:FF:60:DF:AC:FE:F2:D3:C4:93:8E:60:6A:C5:43:1F:5A:C4 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #14568: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #14569: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14570: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195730 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14571: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14572: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #14573: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14574: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 331195731 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14575: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14576: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14577: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331195621.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #14578: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331195606.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14579: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14580: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #14581: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331195621.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #14582: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 331195732 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14583: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14584: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14585: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331195621.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #14586: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331195607.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14587: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14588: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #14589: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14590: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 331195733 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14591: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14592: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14593: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331195621.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #14594: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331195608.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14595: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14596: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14597: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331195621.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #14598: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331195609.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #14599: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14600: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170331203314Z nextupdate=20180331203314Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Mar 31 20:33:14 2017 Next Update: Sat Mar 31 20:33:14 2018 CRL Extensions: chains.sh: #14601: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331203314Z nextupdate=20180331203314Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 20:33:14 2017 Next Update: Sat Mar 31 20:33:14 2018 CRL Extensions: chains.sh: #14602: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170331203315Z nextupdate=20180331203315Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Mar 31 20:33:15 2017 Next Update: Sat Mar 31 20:33:15 2018 CRL Extensions: chains.sh: #14603: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170331203316Z nextupdate=20180331203316Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Mar 31 20:33:16 2017 Next Update: Sat Mar 31 20:33:16 2018 CRL Extensions: chains.sh: #14604: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331203317Z addcert 20 20170331203317Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 20:33:17 2017 Next Update: Sat Mar 31 20:33:14 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Mar 31 20:33:17 2017 CRL Extensions: chains.sh: #14605: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331203318Z addcert 40 20170331203318Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 20:33:18 2017 Next Update: Sat Mar 31 20:33:14 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Mar 31 20:33:17 2017 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Mar 31 20:33:18 2017 CRL Extensions: chains.sh: #14606: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14607: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14608: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #14609: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195730 (0x13bda552) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:31:45 2017 Not After : Thu Mar 31 20:31:45 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:e5:5e:78:17:32:b9:0d:29:09:af:88:4b:92:ef:d9: ac:1f:a0:e2:c3:1a:10:ec:79:5e:38:b4:33:c7:a2:fe: c1:d4:18:dc:5a:91:8e:72:b9:89:97:df:ce:71:79:35: aa:65:b2:4e:e4:39:2c:62:53:e5:b1:33:6e:49:55:89: 1a:99:60:2b:c5:d3:92:21:d1:aa:f7:43:9f:4b:19:cf: ff:93:e8:f3:a0:d9:08:ee:c4:d4:55:8d:50:be:7f:66: ae:bf:9a:b2:83:04:74:ad:55:23:de:44:d0:b2:7c:c3: 16:d0:78:53:92:46:4e:60:3c:95:88:32:2a:4f:1e:63: 81:b0:f8:0d:fd:d1:c3:05:a3:18:ee:6d:c4:de:48:aa: dd:6b:ac:3a:93:a1:f1:36:9d:4f:7b:42:98:3e:e9:f5: ca:63:8a:bd:fc:fa:a2:cc:ab:4b:f6:9b:0f:da:3b:8e: 64:43:70:0c:70:f9:69:94:fa:d4:21:8b:64:04:03:65: b4:f3:1f:d1:d7:08:ab:78:e7:e0:7d:9c:f5:48:8a:41: 34:bd:07:46:23:e5:00:78:ca:86:e6:f5:cc:fe:d3:ab: 33:de:b9:c8:41:43:cd:36:5b:a6:73:bb:d4:0a:a9:28: 1a:40:98:ad:63:40:b7:09:92:44:a7:06:78:2d:d8:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ec:22:4c:f4:61:76:ad:12:c1:54:eb:e0:41:3d:50: 8a:42:8d:07:2d:32:74:73:9b:a0:cd:0a:d9:b1:b5:66: 63:76:ed:f3:a2:59:1b:6c:6a:d8:9d:52:fe:ae:33:f5: 2f:0e:45:01:d5:ee:ff:9e:5b:e0:41:f9:27:44:06:e3: f9:57:16:a9:13:3a:70:e8:0f:78:93:47:05:73:e5:58: ed:3e:9a:57:f5:88:12:c0:cc:ea:5f:59:a7:69:19:a7: 50:ea:bd:b8:2a:36:43:fc:13:ce:63:bd:74:ac:d4:f0: 83:77:22:02:ab:a7:b2:38:af:79:dd:b6:b7:3a:f1:d2: e1:c0:47:3e:c0:e7:9c:f9:5c:14:f1:d2:16:40:3a:4b: 4b:13:19:3e:12:96:b3:8a:70:48:53:b1:31:25:1c:41: 4e:19:54:2c:c3:09:a0:0d:4f:9c:b4:dc:0e:d0:74:69: 45:61:3f:1e:1b:44:ce:3a:e7:d8:c0:d3:85:a8:88:45: 6a:6c:ba:59:1b:4e:fb:43:43:5a:76:a7:3c:99:60:2b: 1c:9e:2a:6a:a8:9c:b4:06:c0:7a:24:4b:d9:b4:69:91: 86:ed:e1:69:04:56:6a:c0:0c:b7:9e:25:81:62:37:dd: 75:ad:f2:f1:ec:ec:03:5f:09:ca:e1:21:da:77:49:65 Fingerprint (SHA-256): 1A:AE:5F:E9:52:92:38:B3:93:EF:1C:A2:F7:84:C5:22:53:F5:3D:68:4F:B5:32:BE:06:AB:B9:8D:4D:29:3C:A3 Fingerprint (SHA1): 0B:E3:FD:10:D7:B3:9F:FD:87:58:21:F3:49:0E:95:F5:6B:A6:DA:6C Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #14610: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #14611: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195730 (0x13bda552) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:31:45 2017 Not After : Thu Mar 31 20:31:45 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:e5:5e:78:17:32:b9:0d:29:09:af:88:4b:92:ef:d9: ac:1f:a0:e2:c3:1a:10:ec:79:5e:38:b4:33:c7:a2:fe: c1:d4:18:dc:5a:91:8e:72:b9:89:97:df:ce:71:79:35: aa:65:b2:4e:e4:39:2c:62:53:e5:b1:33:6e:49:55:89: 1a:99:60:2b:c5:d3:92:21:d1:aa:f7:43:9f:4b:19:cf: ff:93:e8:f3:a0:d9:08:ee:c4:d4:55:8d:50:be:7f:66: ae:bf:9a:b2:83:04:74:ad:55:23:de:44:d0:b2:7c:c3: 16:d0:78:53:92:46:4e:60:3c:95:88:32:2a:4f:1e:63: 81:b0:f8:0d:fd:d1:c3:05:a3:18:ee:6d:c4:de:48:aa: dd:6b:ac:3a:93:a1:f1:36:9d:4f:7b:42:98:3e:e9:f5: ca:63:8a:bd:fc:fa:a2:cc:ab:4b:f6:9b:0f:da:3b:8e: 64:43:70:0c:70:f9:69:94:fa:d4:21:8b:64:04:03:65: b4:f3:1f:d1:d7:08:ab:78:e7:e0:7d:9c:f5:48:8a:41: 34:bd:07:46:23:e5:00:78:ca:86:e6:f5:cc:fe:d3:ab: 33:de:b9:c8:41:43:cd:36:5b:a6:73:bb:d4:0a:a9:28: 1a:40:98:ad:63:40:b7:09:92:44:a7:06:78:2d:d8:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ec:22:4c:f4:61:76:ad:12:c1:54:eb:e0:41:3d:50: 8a:42:8d:07:2d:32:74:73:9b:a0:cd:0a:d9:b1:b5:66: 63:76:ed:f3:a2:59:1b:6c:6a:d8:9d:52:fe:ae:33:f5: 2f:0e:45:01:d5:ee:ff:9e:5b:e0:41:f9:27:44:06:e3: f9:57:16:a9:13:3a:70:e8:0f:78:93:47:05:73:e5:58: ed:3e:9a:57:f5:88:12:c0:cc:ea:5f:59:a7:69:19:a7: 50:ea:bd:b8:2a:36:43:fc:13:ce:63:bd:74:ac:d4:f0: 83:77:22:02:ab:a7:b2:38:af:79:dd:b6:b7:3a:f1:d2: e1:c0:47:3e:c0:e7:9c:f9:5c:14:f1:d2:16:40:3a:4b: 4b:13:19:3e:12:96:b3:8a:70:48:53:b1:31:25:1c:41: 4e:19:54:2c:c3:09:a0:0d:4f:9c:b4:dc:0e:d0:74:69: 45:61:3f:1e:1b:44:ce:3a:e7:d8:c0:d3:85:a8:88:45: 6a:6c:ba:59:1b:4e:fb:43:43:5a:76:a7:3c:99:60:2b: 1c:9e:2a:6a:a8:9c:b4:06:c0:7a:24:4b:d9:b4:69:91: 86:ed:e1:69:04:56:6a:c0:0c:b7:9e:25:81:62:37:dd: 75:ad:f2:f1:ec:ec:03:5f:09:ca:e1:21:da:77:49:65 Fingerprint (SHA-256): 1A:AE:5F:E9:52:92:38:B3:93:EF:1C:A2:F7:84:C5:22:53:F5:3D:68:4F:B5:32:BE:06:AB:B9:8D:4D:29:3C:A3 Fingerprint (SHA1): 0B:E3:FD:10:D7:B3:9F:FD:87:58:21:F3:49:0E:95:F5:6B:A6:DA:6C Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #14612: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #14613: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #14614: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195734 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14615: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #14616: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14617: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14618: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 331195735 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14619: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14620: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14621: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14622: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331195736 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14623: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14624: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14625: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14626: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 331195737 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14627: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14628: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #14629: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195738 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14630: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #14631: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #14632: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14633: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 331195739 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14634: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14635: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14636: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14637: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 331195740 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14638: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14639: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #14640: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #14641: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #14642: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195734 (0x13bda556) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:33:34 2017 Not After : Thu Mar 31 20:33:34 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:09:59:52:45:12:00:94:d8:06:51:c0:c3:67:44:3c: fd:97:fa:27:47:5f:b0:c2:d7:16:ec:f7:77:65:ff:67: 86:aa:07:e1:f0:89:2a:fd:5a:20:71:39:eb:55:3d:06: a4:56:b4:97:d1:e4:13:41:95:40:f0:35:40:9c:24:ba: 2a:e5:1a:21:7f:b9:f3:71:1b:82:1e:1d:9a:c1:9f:d5: 0b:2a:f8:ed:20:3a:a1:4c:c2:33:49:d4:e8:b6:e5:a0: 83:79:2a:6f:b8:b8:c1:28:61:b3:13:ed:20:bb:e2:91: bd:a3:11:bf:01:ad:bd:77:5b:5e:62:b3:a0:28:5b:b8: 63:f6:6c:25:2e:2f:8d:4e:e6:3c:3c:77:eb:91:c4:74: 7b:b4:a0:d4:f5:8a:c5:c6:1e:35:fe:cd:50:ea:01:80: 6c:0f:a1:40:8c:8e:35:e7:35:29:bf:75:0b:1e:d0:54: 27:36:fc:da:3e:a7:e5:25:55:04:ed:52:9e:2d:f6:2c: 8e:56:3c:70:c3:5b:e3:59:6b:9a:19:5c:5b:7f:0d:98: 7f:77:22:e8:33:f0:27:b5:45:1d:81:09:19:c8:cd:8b: 8e:5d:ef:32:41:96:f5:8e:32:fb:76:40:40:bb:40:27: a0:cd:aa:ce:69:e1:5a:69:af:82:da:90:24:e1:dd:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:8e:92:85:f4:57:c0:cf:d1:2b:09:af:58:1a:98:49: d4:5b:02:7e:d5:03:6a:f5:58:e3:bf:56:2c:47:ed:60: bc:40:65:63:96:f5:2e:af:da:6f:ff:05:f7:82:97:4c: 0c:2d:1b:49:3f:a8:e5:a5:c1:ff:c3:3d:47:56:66:a8: e6:d3:19:22:54:46:21:9a:aa:c5:e3:6a:65:39:47:5b: 43:4d:55:64:da:22:5d:d8:42:89:b4:c7:d2:21:29:00: 21:11:a4:5c:40:ca:fb:03:65:ec:fc:1a:00:ba:b4:91: b2:82:d4:57:e9:79:8b:d8:ea:8d:3a:48:fb:2a:df:64: 37:90:56:2a:7d:19:d7:ae:aa:b4:d9:67:75:fc:a7:87: 3d:0e:91:80:b3:f0:2f:ac:9b:eb:e1:c9:02:96:ff:86: 32:1f:57:59:97:3c:dd:5f:ae:1e:51:ec:d2:77:be:2e: 47:ab:58:b9:d1:27:70:42:7d:4b:43:0f:18:ce:83:8e: 2d:fc:5d:7d:18:95:08:b7:85:24:30:92:11:f4:65:43: 1d:ea:b2:1c:29:5d:00:55:d4:41:d2:06:61:e7:df:df: 50:d7:bd:6f:58:a9:36:ad:d2:27:83:58:a8:ef:df:36: 33:5d:be:a8:06:d1:43:0e:48:c3:e7:f1:8f:6f:7e:4d Fingerprint (SHA-256): FB:8E:76:B0:E2:46:1D:78:92:5D:35:72:31:48:37:C9:A2:55:A2:18:D1:32:3D:84:19:3B:FD:1E:6F:AF:68:96 Fingerprint (SHA1): 35:59:FA:CA:BA:E8:A1:95:4C:9D:8B:98:44:45:D7:48:CB:E4:D0:B8 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14643: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195736 (0x13bda558) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 20:34:18 2017 Not After : Thu Mar 31 20:34:18 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:ee:9e:88:33:98:d6:ff:ab:2f:8d:15:72:5b:12:48: 13:78:e9:bd:63:ac:1b:7f:1e:a2:68:f2:6e:94:b2:af: e0:24:d0:aa:1a:1b:da:c1:3b:b2:64:4d:90:27:01:f3: 03:e4:ef:38:70:9f:dc:e7:64:66:b7:8f:01:a7:9b:3d: a2:a5:63:a8:28:81:87:4f:cc:97:fc:5d:5d:1d:bb:1b: 01:17:2d:f8:3e:2c:37:0b:d8:ed:3c:76:a8:61:cc:ec: 6e:cb:af:5b:b7:15:ee:2d:67:f1:82:02:d9:d8:29:ac: 54:46:65:f8:2a:9b:5d:60:dd:d9:53:2a:47:7f:d4:fe: 18:f9:78:e5:a0:00:eb:13:d9:70:2e:da:ba:ae:86:cb: b7:c0:37:35:6e:57:73:1c:a7:49:14:fc:0c:b2:df:0a: 40:c7:7d:8c:46:13:5d:8f:09:2f:61:0b:e5:4c:54:1e: 72:89:54:8d:1d:52:a9:57:fb:e3:ef:9c:c4:7b:81:09: 49:39:f4:03:ed:79:87:94:d5:eb:4a:50:1e:b9:22:4a: e5:6d:11:7e:94:94:7e:4f:b2:14:90:0a:c2:8a:3f:54: 62:ac:bf:77:f5:6d:71:be:71:88:7b:fb:cc:5e:a0:5b: 41:d0:72:e7:a4:21:c7:9c:b4:a6:ef:c1:a0:8b:6d:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:d2:0f:30:9e:97:c5:7f:30:0f:bb:9f:5b:20:b1:0f: 66:f8:35:56:e9:fd:fe:c5:6c:c5:48:0e:91:98:94:c4: fa:9e:b0:46:8e:4d:43:03:56:90:05:6e:5b:35:79:3b: b4:76:ff:2b:92:1d:a0:7e:0a:fc:a5:45:02:fc:c6:0c: 60:ce:ea:cb:09:4e:a9:36:93:5c:de:f6:e9:30:1f:36: fb:21:59:33:5c:af:ce:c0:99:be:f6:de:8f:1d:a5:4b: a9:27:0d:77:aa:75:6f:d7:96:fb:a4:51:c4:f5:04:06: 12:bc:13:7c:45:ab:6a:62:2d:13:13:30:40:b0:76:d9: d9:3b:bf:d7:f2:47:39:8b:c8:a0:e1:9e:76:c8:22:70: 0f:2e:e1:d7:80:f3:cf:6d:2d:4e:a7:f5:d9:e2:ac:7c: 47:43:d8:6c:dd:a1:89:8b:4e:25:8e:a2:46:f7:07:88: cf:5d:42:84:6e:23:ac:dd:c9:d8:e6:9c:9f:2c:91:0f: 02:49:cd:3c:4d:40:b4:2d:e6:e4:a2:6e:80:68:d9:0b: 0c:b5:19:54:bb:59:98:e9:ad:3c:57:a1:4f:90:56:a4: c4:12:3d:5b:1e:59:18:d5:9a:35:9f:ac:d7:ea:3d:b5: 75:cc:35:50:bf:66:2e:5e:69:09:04:71:d1:f0:cd:41 Fingerprint (SHA-256): 68:A5:62:98:B9:81:3C:C2:79:A6:36:45:10:7F:FE:4B:BB:31:3F:72:5C:0D:D5:FB:64:39:4D:8D:B3:9D:50:7A Fingerprint (SHA1): 1D:10:53:50:E2:6C:96:40:4A:70:27:60:2D:74:E4:E0:B9:06:B8:0E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #14644: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195734 (0x13bda556) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:33:34 2017 Not After : Thu Mar 31 20:33:34 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:09:59:52:45:12:00:94:d8:06:51:c0:c3:67:44:3c: fd:97:fa:27:47:5f:b0:c2:d7:16:ec:f7:77:65:ff:67: 86:aa:07:e1:f0:89:2a:fd:5a:20:71:39:eb:55:3d:06: a4:56:b4:97:d1:e4:13:41:95:40:f0:35:40:9c:24:ba: 2a:e5:1a:21:7f:b9:f3:71:1b:82:1e:1d:9a:c1:9f:d5: 0b:2a:f8:ed:20:3a:a1:4c:c2:33:49:d4:e8:b6:e5:a0: 83:79:2a:6f:b8:b8:c1:28:61:b3:13:ed:20:bb:e2:91: bd:a3:11:bf:01:ad:bd:77:5b:5e:62:b3:a0:28:5b:b8: 63:f6:6c:25:2e:2f:8d:4e:e6:3c:3c:77:eb:91:c4:74: 7b:b4:a0:d4:f5:8a:c5:c6:1e:35:fe:cd:50:ea:01:80: 6c:0f:a1:40:8c:8e:35:e7:35:29:bf:75:0b:1e:d0:54: 27:36:fc:da:3e:a7:e5:25:55:04:ed:52:9e:2d:f6:2c: 8e:56:3c:70:c3:5b:e3:59:6b:9a:19:5c:5b:7f:0d:98: 7f:77:22:e8:33:f0:27:b5:45:1d:81:09:19:c8:cd:8b: 8e:5d:ef:32:41:96:f5:8e:32:fb:76:40:40:bb:40:27: a0:cd:aa:ce:69:e1:5a:69:af:82:da:90:24:e1:dd:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:8e:92:85:f4:57:c0:cf:d1:2b:09:af:58:1a:98:49: d4:5b:02:7e:d5:03:6a:f5:58:e3:bf:56:2c:47:ed:60: bc:40:65:63:96:f5:2e:af:da:6f:ff:05:f7:82:97:4c: 0c:2d:1b:49:3f:a8:e5:a5:c1:ff:c3:3d:47:56:66:a8: e6:d3:19:22:54:46:21:9a:aa:c5:e3:6a:65:39:47:5b: 43:4d:55:64:da:22:5d:d8:42:89:b4:c7:d2:21:29:00: 21:11:a4:5c:40:ca:fb:03:65:ec:fc:1a:00:ba:b4:91: b2:82:d4:57:e9:79:8b:d8:ea:8d:3a:48:fb:2a:df:64: 37:90:56:2a:7d:19:d7:ae:aa:b4:d9:67:75:fc:a7:87: 3d:0e:91:80:b3:f0:2f:ac:9b:eb:e1:c9:02:96:ff:86: 32:1f:57:59:97:3c:dd:5f:ae:1e:51:ec:d2:77:be:2e: 47:ab:58:b9:d1:27:70:42:7d:4b:43:0f:18:ce:83:8e: 2d:fc:5d:7d:18:95:08:b7:85:24:30:92:11:f4:65:43: 1d:ea:b2:1c:29:5d:00:55:d4:41:d2:06:61:e7:df:df: 50:d7:bd:6f:58:a9:36:ad:d2:27:83:58:a8:ef:df:36: 33:5d:be:a8:06:d1:43:0e:48:c3:e7:f1:8f:6f:7e:4d Fingerprint (SHA-256): FB:8E:76:B0:E2:46:1D:78:92:5D:35:72:31:48:37:C9:A2:55:A2:18:D1:32:3D:84:19:3B:FD:1E:6F:AF:68:96 Fingerprint (SHA1): 35:59:FA:CA:BA:E8:A1:95:4C:9D:8B:98:44:45:D7:48:CB:E4:D0:B8 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14645: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #14646: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195734 (0x13bda556) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:33:34 2017 Not After : Thu Mar 31 20:33:34 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:09:59:52:45:12:00:94:d8:06:51:c0:c3:67:44:3c: fd:97:fa:27:47:5f:b0:c2:d7:16:ec:f7:77:65:ff:67: 86:aa:07:e1:f0:89:2a:fd:5a:20:71:39:eb:55:3d:06: a4:56:b4:97:d1:e4:13:41:95:40:f0:35:40:9c:24:ba: 2a:e5:1a:21:7f:b9:f3:71:1b:82:1e:1d:9a:c1:9f:d5: 0b:2a:f8:ed:20:3a:a1:4c:c2:33:49:d4:e8:b6:e5:a0: 83:79:2a:6f:b8:b8:c1:28:61:b3:13:ed:20:bb:e2:91: bd:a3:11:bf:01:ad:bd:77:5b:5e:62:b3:a0:28:5b:b8: 63:f6:6c:25:2e:2f:8d:4e:e6:3c:3c:77:eb:91:c4:74: 7b:b4:a0:d4:f5:8a:c5:c6:1e:35:fe:cd:50:ea:01:80: 6c:0f:a1:40:8c:8e:35:e7:35:29:bf:75:0b:1e:d0:54: 27:36:fc:da:3e:a7:e5:25:55:04:ed:52:9e:2d:f6:2c: 8e:56:3c:70:c3:5b:e3:59:6b:9a:19:5c:5b:7f:0d:98: 7f:77:22:e8:33:f0:27:b5:45:1d:81:09:19:c8:cd:8b: 8e:5d:ef:32:41:96:f5:8e:32:fb:76:40:40:bb:40:27: a0:cd:aa:ce:69:e1:5a:69:af:82:da:90:24:e1:dd:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:8e:92:85:f4:57:c0:cf:d1:2b:09:af:58:1a:98:49: d4:5b:02:7e:d5:03:6a:f5:58:e3:bf:56:2c:47:ed:60: bc:40:65:63:96:f5:2e:af:da:6f:ff:05:f7:82:97:4c: 0c:2d:1b:49:3f:a8:e5:a5:c1:ff:c3:3d:47:56:66:a8: e6:d3:19:22:54:46:21:9a:aa:c5:e3:6a:65:39:47:5b: 43:4d:55:64:da:22:5d:d8:42:89:b4:c7:d2:21:29:00: 21:11:a4:5c:40:ca:fb:03:65:ec:fc:1a:00:ba:b4:91: b2:82:d4:57:e9:79:8b:d8:ea:8d:3a:48:fb:2a:df:64: 37:90:56:2a:7d:19:d7:ae:aa:b4:d9:67:75:fc:a7:87: 3d:0e:91:80:b3:f0:2f:ac:9b:eb:e1:c9:02:96:ff:86: 32:1f:57:59:97:3c:dd:5f:ae:1e:51:ec:d2:77:be:2e: 47:ab:58:b9:d1:27:70:42:7d:4b:43:0f:18:ce:83:8e: 2d:fc:5d:7d:18:95:08:b7:85:24:30:92:11:f4:65:43: 1d:ea:b2:1c:29:5d:00:55:d4:41:d2:06:61:e7:df:df: 50:d7:bd:6f:58:a9:36:ad:d2:27:83:58:a8:ef:df:36: 33:5d:be:a8:06:d1:43:0e:48:c3:e7:f1:8f:6f:7e:4d Fingerprint (SHA-256): FB:8E:76:B0:E2:46:1D:78:92:5D:35:72:31:48:37:C9:A2:55:A2:18:D1:32:3D:84:19:3B:FD:1E:6F:AF:68:96 Fingerprint (SHA1): 35:59:FA:CA:BA:E8:A1:95:4C:9D:8B:98:44:45:D7:48:CB:E4:D0:B8 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14647: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195736 (0x13bda558) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 20:34:18 2017 Not After : Thu Mar 31 20:34:18 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:ee:9e:88:33:98:d6:ff:ab:2f:8d:15:72:5b:12:48: 13:78:e9:bd:63:ac:1b:7f:1e:a2:68:f2:6e:94:b2:af: e0:24:d0:aa:1a:1b:da:c1:3b:b2:64:4d:90:27:01:f3: 03:e4:ef:38:70:9f:dc:e7:64:66:b7:8f:01:a7:9b:3d: a2:a5:63:a8:28:81:87:4f:cc:97:fc:5d:5d:1d:bb:1b: 01:17:2d:f8:3e:2c:37:0b:d8:ed:3c:76:a8:61:cc:ec: 6e:cb:af:5b:b7:15:ee:2d:67:f1:82:02:d9:d8:29:ac: 54:46:65:f8:2a:9b:5d:60:dd:d9:53:2a:47:7f:d4:fe: 18:f9:78:e5:a0:00:eb:13:d9:70:2e:da:ba:ae:86:cb: b7:c0:37:35:6e:57:73:1c:a7:49:14:fc:0c:b2:df:0a: 40:c7:7d:8c:46:13:5d:8f:09:2f:61:0b:e5:4c:54:1e: 72:89:54:8d:1d:52:a9:57:fb:e3:ef:9c:c4:7b:81:09: 49:39:f4:03:ed:79:87:94:d5:eb:4a:50:1e:b9:22:4a: e5:6d:11:7e:94:94:7e:4f:b2:14:90:0a:c2:8a:3f:54: 62:ac:bf:77:f5:6d:71:be:71:88:7b:fb:cc:5e:a0:5b: 41:d0:72:e7:a4:21:c7:9c:b4:a6:ef:c1:a0:8b:6d:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:d2:0f:30:9e:97:c5:7f:30:0f:bb:9f:5b:20:b1:0f: 66:f8:35:56:e9:fd:fe:c5:6c:c5:48:0e:91:98:94:c4: fa:9e:b0:46:8e:4d:43:03:56:90:05:6e:5b:35:79:3b: b4:76:ff:2b:92:1d:a0:7e:0a:fc:a5:45:02:fc:c6:0c: 60:ce:ea:cb:09:4e:a9:36:93:5c:de:f6:e9:30:1f:36: fb:21:59:33:5c:af:ce:c0:99:be:f6:de:8f:1d:a5:4b: a9:27:0d:77:aa:75:6f:d7:96:fb:a4:51:c4:f5:04:06: 12:bc:13:7c:45:ab:6a:62:2d:13:13:30:40:b0:76:d9: d9:3b:bf:d7:f2:47:39:8b:c8:a0:e1:9e:76:c8:22:70: 0f:2e:e1:d7:80:f3:cf:6d:2d:4e:a7:f5:d9:e2:ac:7c: 47:43:d8:6c:dd:a1:89:8b:4e:25:8e:a2:46:f7:07:88: cf:5d:42:84:6e:23:ac:dd:c9:d8:e6:9c:9f:2c:91:0f: 02:49:cd:3c:4d:40:b4:2d:e6:e4:a2:6e:80:68:d9:0b: 0c:b5:19:54:bb:59:98:e9:ad:3c:57:a1:4f:90:56:a4: c4:12:3d:5b:1e:59:18:d5:9a:35:9f:ac:d7:ea:3d:b5: 75:cc:35:50:bf:66:2e:5e:69:09:04:71:d1:f0:cd:41 Fingerprint (SHA-256): 68:A5:62:98:B9:81:3C:C2:79:A6:36:45:10:7F:FE:4B:BB:31:3F:72:5C:0D:D5:FB:64:39:4D:8D:B3:9D:50:7A Fingerprint (SHA1): 1D:10:53:50:E2:6C:96:40:4A:70:27:60:2D:74:E4:E0:B9:06:B8:0E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #14648: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #14649: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #14650: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #14651: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195734 (0x13bda556) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:33:34 2017 Not After : Thu Mar 31 20:33:34 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:09:59:52:45:12:00:94:d8:06:51:c0:c3:67:44:3c: fd:97:fa:27:47:5f:b0:c2:d7:16:ec:f7:77:65:ff:67: 86:aa:07:e1:f0:89:2a:fd:5a:20:71:39:eb:55:3d:06: a4:56:b4:97:d1:e4:13:41:95:40:f0:35:40:9c:24:ba: 2a:e5:1a:21:7f:b9:f3:71:1b:82:1e:1d:9a:c1:9f:d5: 0b:2a:f8:ed:20:3a:a1:4c:c2:33:49:d4:e8:b6:e5:a0: 83:79:2a:6f:b8:b8:c1:28:61:b3:13:ed:20:bb:e2:91: bd:a3:11:bf:01:ad:bd:77:5b:5e:62:b3:a0:28:5b:b8: 63:f6:6c:25:2e:2f:8d:4e:e6:3c:3c:77:eb:91:c4:74: 7b:b4:a0:d4:f5:8a:c5:c6:1e:35:fe:cd:50:ea:01:80: 6c:0f:a1:40:8c:8e:35:e7:35:29:bf:75:0b:1e:d0:54: 27:36:fc:da:3e:a7:e5:25:55:04:ed:52:9e:2d:f6:2c: 8e:56:3c:70:c3:5b:e3:59:6b:9a:19:5c:5b:7f:0d:98: 7f:77:22:e8:33:f0:27:b5:45:1d:81:09:19:c8:cd:8b: 8e:5d:ef:32:41:96:f5:8e:32:fb:76:40:40:bb:40:27: a0:cd:aa:ce:69:e1:5a:69:af:82:da:90:24:e1:dd:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:8e:92:85:f4:57:c0:cf:d1:2b:09:af:58:1a:98:49: d4:5b:02:7e:d5:03:6a:f5:58:e3:bf:56:2c:47:ed:60: bc:40:65:63:96:f5:2e:af:da:6f:ff:05:f7:82:97:4c: 0c:2d:1b:49:3f:a8:e5:a5:c1:ff:c3:3d:47:56:66:a8: e6:d3:19:22:54:46:21:9a:aa:c5:e3:6a:65:39:47:5b: 43:4d:55:64:da:22:5d:d8:42:89:b4:c7:d2:21:29:00: 21:11:a4:5c:40:ca:fb:03:65:ec:fc:1a:00:ba:b4:91: b2:82:d4:57:e9:79:8b:d8:ea:8d:3a:48:fb:2a:df:64: 37:90:56:2a:7d:19:d7:ae:aa:b4:d9:67:75:fc:a7:87: 3d:0e:91:80:b3:f0:2f:ac:9b:eb:e1:c9:02:96:ff:86: 32:1f:57:59:97:3c:dd:5f:ae:1e:51:ec:d2:77:be:2e: 47:ab:58:b9:d1:27:70:42:7d:4b:43:0f:18:ce:83:8e: 2d:fc:5d:7d:18:95:08:b7:85:24:30:92:11:f4:65:43: 1d:ea:b2:1c:29:5d:00:55:d4:41:d2:06:61:e7:df:df: 50:d7:bd:6f:58:a9:36:ad:d2:27:83:58:a8:ef:df:36: 33:5d:be:a8:06:d1:43:0e:48:c3:e7:f1:8f:6f:7e:4d Fingerprint (SHA-256): FB:8E:76:B0:E2:46:1D:78:92:5D:35:72:31:48:37:C9:A2:55:A2:18:D1:32:3D:84:19:3B:FD:1E:6F:AF:68:96 Fingerprint (SHA1): 35:59:FA:CA:BA:E8:A1:95:4C:9D:8B:98:44:45:D7:48:CB:E4:D0:B8 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14652: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195738 (0x13bda55a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Mar 31 20:34:51 2017 Not After : Thu Mar 31 20:34:51 2067 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:2b:c1:82:4d:7b:3b:c5:be:ab:72:10:bb:92:d9:54: de:4a:f1:de:bc:88:18:f9:a0:d2:9a:44:af:ae:d2:d9: 3e:ad:58:51:cc:e6:cb:2c:08:0a:a2:c6:68:0d:1e:d1: c6:1a:52:f6:c7:d4:2f:ed:5d:6d:ba:f5:b8:44:b4:73: 70:45:a2:a2:e1:37:3e:9d:ed:ff:08:87:98:d9:f9:be: 8f:bb:0e:90:e3:d5:d4:9e:7a:d0:78:f7:eb:f5:a3:5d: 2a:bc:0a:a6:01:61:97:93:b1:d6:2a:c8:10:cf:7e:ef: 59:23:b4:a2:ae:23:de:f3:7a:e9:30:a0:48:71:4b:d5: 24:fa:a2:12:53:ee:17:6d:dd:08:98:3d:8b:ac:6c:d7: cf:8e:ee:e6:e3:dc:56:5c:53:ae:30:8c:91:80:f6:70: 06:0d:57:c7:65:d1:43:c8:66:6d:58:1b:8d:a9:7b:e4: 1a:7a:18:48:04:1e:c3:e1:d8:9f:06:19:fa:c2:01:46: ea:c4:e5:68:2b:94:a4:7b:a6:af:86:d3:b9:2a:38:f9: 05:73:96:b4:b9:fa:4e:21:3a:fd:78:03:fd:2d:16:97: 27:51:f3:74:16:19:06:f3:22:63:6e:bc:85:3e:e0:af: a0:39:f7:79:60:0e:89:80:01:59:94:2d:fc:87:b9:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:36:3f:2d:65:9d:7e:64:2f:f9:3a:dc:2a:d0:a1:4b: 49:15:c9:e8:ad:4a:12:54:65:18:a4:51:39:fd:1d:0e: 0a:fc:80:1d:49:b5:ac:41:db:22:bf:6b:dc:90:cb:78: ca:9f:1f:34:26:8a:85:76:4f:81:27:c7:81:0c:9b:00: 14:e3:67:23:29:42:a5:f1:23:ec:60:62:4e:b6:37:8f: 4d:39:2f:29:17:5a:77:ef:e5:fd:b5:ea:89:4f:b2:22: 66:02:41:d1:cf:00:5b:79:9c:28:a6:e8:9e:c9:b7:3a: 2b:45:3c:e2:c1:05:cb:50:29:3e:68:e9:55:3a:db:d3: fe:db:d9:bd:61:47:92:91:1e:3d:d4:6b:56:4f:45:91: 72:cb:02:ea:79:f0:5a:9a:81:1d:1e:9e:2b:53:54:53: d0:3c:3c:fc:c4:d5:72:5b:35:ae:db:75:be:3c:4e:b2: a7:56:60:74:18:a3:fe:f0:76:4c:be:44:ed:af:42:ba: 3c:df:52:ec:b8:1c:25:f2:88:38:42:64:ff:d0:2e:85: a1:65:7f:a0:e6:94:ff:d3:59:d4:08:f7:6c:2c:c3:ab: 2c:af:94:dc:be:7b:52:38:99:e0:e1:d8:f8:e6:17:93: f9:54:06:30:00:90:ba:1c:be:3c:a3:a7:2f:c5:da:9a Fingerprint (SHA-256): 3A:7B:C1:57:75:CE:85:81:C0:7B:1F:AD:28:EF:F6:CE:D2:36:3F:D6:D4:8D:C4:12:8E:A6:49:BA:78:A3:D1:93 Fingerprint (SHA1): 97:98:EF:20:FA:15:45:01:EF:70:58:9E:43:F5:55:15:FA:92:2C:92 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #14653: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195734 (0x13bda556) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:33:34 2017 Not After : Thu Mar 31 20:33:34 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:09:59:52:45:12:00:94:d8:06:51:c0:c3:67:44:3c: fd:97:fa:27:47:5f:b0:c2:d7:16:ec:f7:77:65:ff:67: 86:aa:07:e1:f0:89:2a:fd:5a:20:71:39:eb:55:3d:06: a4:56:b4:97:d1:e4:13:41:95:40:f0:35:40:9c:24:ba: 2a:e5:1a:21:7f:b9:f3:71:1b:82:1e:1d:9a:c1:9f:d5: 0b:2a:f8:ed:20:3a:a1:4c:c2:33:49:d4:e8:b6:e5:a0: 83:79:2a:6f:b8:b8:c1:28:61:b3:13:ed:20:bb:e2:91: bd:a3:11:bf:01:ad:bd:77:5b:5e:62:b3:a0:28:5b:b8: 63:f6:6c:25:2e:2f:8d:4e:e6:3c:3c:77:eb:91:c4:74: 7b:b4:a0:d4:f5:8a:c5:c6:1e:35:fe:cd:50:ea:01:80: 6c:0f:a1:40:8c:8e:35:e7:35:29:bf:75:0b:1e:d0:54: 27:36:fc:da:3e:a7:e5:25:55:04:ed:52:9e:2d:f6:2c: 8e:56:3c:70:c3:5b:e3:59:6b:9a:19:5c:5b:7f:0d:98: 7f:77:22:e8:33:f0:27:b5:45:1d:81:09:19:c8:cd:8b: 8e:5d:ef:32:41:96:f5:8e:32:fb:76:40:40:bb:40:27: a0:cd:aa:ce:69:e1:5a:69:af:82:da:90:24:e1:dd:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:8e:92:85:f4:57:c0:cf:d1:2b:09:af:58:1a:98:49: d4:5b:02:7e:d5:03:6a:f5:58:e3:bf:56:2c:47:ed:60: bc:40:65:63:96:f5:2e:af:da:6f:ff:05:f7:82:97:4c: 0c:2d:1b:49:3f:a8:e5:a5:c1:ff:c3:3d:47:56:66:a8: e6:d3:19:22:54:46:21:9a:aa:c5:e3:6a:65:39:47:5b: 43:4d:55:64:da:22:5d:d8:42:89:b4:c7:d2:21:29:00: 21:11:a4:5c:40:ca:fb:03:65:ec:fc:1a:00:ba:b4:91: b2:82:d4:57:e9:79:8b:d8:ea:8d:3a:48:fb:2a:df:64: 37:90:56:2a:7d:19:d7:ae:aa:b4:d9:67:75:fc:a7:87: 3d:0e:91:80:b3:f0:2f:ac:9b:eb:e1:c9:02:96:ff:86: 32:1f:57:59:97:3c:dd:5f:ae:1e:51:ec:d2:77:be:2e: 47:ab:58:b9:d1:27:70:42:7d:4b:43:0f:18:ce:83:8e: 2d:fc:5d:7d:18:95:08:b7:85:24:30:92:11:f4:65:43: 1d:ea:b2:1c:29:5d:00:55:d4:41:d2:06:61:e7:df:df: 50:d7:bd:6f:58:a9:36:ad:d2:27:83:58:a8:ef:df:36: 33:5d:be:a8:06:d1:43:0e:48:c3:e7:f1:8f:6f:7e:4d Fingerprint (SHA-256): FB:8E:76:B0:E2:46:1D:78:92:5D:35:72:31:48:37:C9:A2:55:A2:18:D1:32:3D:84:19:3B:FD:1E:6F:AF:68:96 Fingerprint (SHA1): 35:59:FA:CA:BA:E8:A1:95:4C:9D:8B:98:44:45:D7:48:CB:E4:D0:B8 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14654: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #14655: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #14656: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #14657: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #14658: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #14659: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195739 (0x13bda55b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Mar 31 20:35:04 2017 Not After : Thu Mar 31 20:35:04 2022 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:c6:3c:2a:aa:0f:f5:ea:31:92:a5:eb:36:97:9e:70: 3d:03:17:2d:5a:db:a8:56:7b:5c:e5:c3:cd:55:aa:21: ec:7a:9b:83:5f:02:40:dc:43:94:8b:cb:2e:fe:8b:7f: 1c:09:9e:e7:78:79:4c:30:f9:8d:41:d6:a6:2f:8d:73: 78:17:04:21:89:89:72:64:56:a8:65:b5:b4:b4:c5:3c: f9:b3:e0:41:c3:bc:b4:bb:7e:93:89:95:9c:2c:0a:ec: da:72:28:af:d6:4d:1f:f1:53:8a:b6:bc:6f:41:92:59: f7:a1:56:61:68:e9:2f:31:73:7c:4b:34:de:21:4a:d9: 86:5a:fb:10:68:4f:c2:52:65:f6:55:cc:c5:98:6d:e9: de:2e:45:bb:fc:5d:c6:a6:51:1c:20:ec:f6:18:a1:d1: ca:ce:a7:35:22:dc:60:15:d0:f2:57:27:88:43:ac:5e: ee:f4:8a:d8:dd:a1:16:01:cc:2f:31:10:30:ae:ff:d0: 34:a6:84:ea:ee:ce:00:88:54:12:80:b6:27:f3:8b:4f: d2:d3:93:9d:de:0c:10:3d:8a:4b:7e:8f:79:bf:09:32: 12:d1:90:26:ec:9f:5f:66:74:e5:60:98:b1:61:bc:75: bd:b0:35:1b:d1:4e:cc:46:29:9f:f6:bb:43:b5:c2:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:ae:12:da:78:26:fc:3f:0a:66:61:4b:3e:ff:08:ac: 41:5d:6f:5d:0d:83:66:ab:6e:2f:ce:91:9f:e3:fc:4a: 1a:35:9d:47:45:f7:7e:39:09:e8:c7:b8:ec:bf:2b:65: ac:ca:4b:bb:47:6c:e6:29:42:80:5e:ef:b4:24:02:d6: 15:bd:c9:56:be:e2:15:2c:4c:22:ba:de:5d:54:77:dc: f4:02:7f:6d:54:53:78:0e:97:41:95:87:22:6a:f0:7d: 07:91:73:0c:55:5f:4e:46:4f:02:d1:00:04:9e:88:bf: 2a:85:ff:53:1c:c9:99:9d:ab:25:68:27:5a:b8:28:37: 57:1e:61:5a:6d:12:22:d9:a4:bd:23:55:b3:bf:8b:31: 2a:2d:83:e8:fd:50:b0:4f:77:93:b6:50:73:80:f2:83: c9:82:c2:fc:75:3f:cc:b6:ea:55:59:1f:d4:7a:48:ae: df:d0:2a:cf:42:fa:ca:a0:ac:38:f1:70:3c:eb:7b:b2: 2d:c9:e3:e6:9e:14:90:b7:5c:68:20:8e:d1:27:1a:70: 2e:ba:62:65:a6:97:a9:ff:25:d2:73:8d:8f:9a:f1:fb: 38:18:2f:5e:ca:d0:f6:96:be:04:61:c9:af:a2:3f:54: 09:34:10:a7:e2:07:58:fd:90:3b:6d:ba:03:03:5e:44 Fingerprint (SHA-256): 82:12:2A:33:7F:CA:A2:32:45:EE:4A:8B:5A:52:F7:9B:C4:B7:FF:F1:6E:94:D4:20:CC:29:8C:AD:9C:AB:5A:DC Fingerprint (SHA1): 99:6C:E2:E8:A3:06:15:4D:9A:50:20:9F:B7:47:6E:0E:20:F0:F6:37 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #14660: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #14661: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #14662: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #14663: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #14664: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #14665: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14666: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #14667: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #14668: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14669: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #14670: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #14671: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #14672: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #14673: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14674: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #14675: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14676: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #14677: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14678: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #14679: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14680: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #14681: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #14682: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #14683: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 27966 at Fri Mar 31 20:35:56 UTC 2017 kill -USR1 27966 httpserv: normal termination httpserv -b -p 9636 2>/dev/null; httpserv with PID 27966 killed at Fri Mar 31 20:35:57 UTC 2017 httpserv starting at Fri Mar 31 20:35:57 UTC 2017 httpserv -D -p 9636 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.2460 & trying to connect to httpserv at Fri Mar 31 20:35:57 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 retrying to connect to httpserv at Fri Mar 31 20:36:02 UTC 2017 tstclnt -p 9636 -h localhost.localdomain -q -v tstclnt: error looking up host: PR_DIRECTORY_LOOKUP_ERROR: A directory lookup on a network address has failed tstclnt: exiting with return code 1 chains.sh: #14684: Waiting for Server - FAILED kill -0 11684 >/dev/null 2>/dev/null httpserv with PID 11684 found at Fri Mar 31 20:36:03 UTC 2017 httpserv with PID 11684 started at Fri Mar 31 20:36:03 UTC 2017 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #14685: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195741 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14686: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #14687: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #14688: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195742 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14689: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #14690: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #14691: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14692: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 331195743 -7 Bridge@Army < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14693: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14694: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 331195744 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14695: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14696: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #14697: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #14698: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14699: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 331195745 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14700: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14701: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14702: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #14703: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #14704: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195742 (0x13bda55e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:36:17 2017 Not After : Thu Mar 31 20:36:17 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:25:51:a5:db:fc:87:68:0a:07:89:ce:d7:d0:e9:7a: 06:b0:ce:7b:df:e6:7f:d1:22:b0:92:ba:c7:c4:8c:67: c5:fa:bd:91:83:dd:68:23:38:8b:d3:2d:49:bc:c0:46: e7:bd:33:18:14:d8:cd:fa:60:c6:8c:73:ff:68:64:3d: 40:17:0d:20:3d:95:f5:6c:62:b9:43:0f:9e:f7:23:81: 49:43:65:bb:f8:3c:2f:4a:b0:2c:c2:7f:53:37:7b:2a: 2e:7b:0a:a1:1e:92:3c:d5:db:d6:0f:96:b6:7f:19:99: 9e:ea:2a:a4:20:c4:a2:f2:ab:52:9a:27:1f:e1:51:00: cc:bb:0f:2d:33:0f:13:d4:82:89:1a:c6:73:42:bd:ad: 83:05:7a:f6:b8:59:23:f6:ac:08:87:24:c9:cb:e8:95: 65:5c:58:dc:95:6d:08:5d:af:b4:4d:d0:52:58:d2:d5: bb:fd:c7:ff:3d:cc:a5:f4:22:4e:fc:20:2f:23:e6:49: 6e:eb:bb:27:b3:f6:03:f7:f4:8d:bd:e5:4a:c8:df:b5: a2:c9:48:53:65:54:b2:7e:99:e8:64:76:78:7f:ab:24: 60:c7:fd:be:29:f1:d8:b6:e9:32:22:f8:ff:a2:ea:c6: 2e:ac:fa:97:3b:9b:bd:a5:52:8c:76:88:c9:58:dd:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:82:1f:53:cb:14:6a:71:c0:70:de:39:66:d6:64:e2: 5d:fd:6c:62:f9:f5:dd:37:3f:d1:c9:2d:16:ec:cc:bd: 66:9c:24:98:6c:10:3c:e2:d2:a2:83:1d:1c:4f:0c:39: 79:9d:58:03:61:c3:6c:07:7f:41:a2:0f:f2:2c:5f:6b: b6:33:bb:d6:64:9d:c4:f7:af:c7:2d:1c:35:41:44:08: 43:ed:85:fb:45:68:bc:e2:76:e4:ce:7d:17:ad:df:0f: 67:d3:20:13:7e:39:ca:9b:b3:56:0b:63:79:09:c1:e4: ba:b6:3f:09:00:b0:aa:a2:40:76:0f:88:54:d3:78:b9: 9b:ff:9e:35:47:6b:e2:99:f1:4d:f5:05:af:47:c9:74: 04:9b:1f:3c:11:a2:62:e1:12:a3:89:e2:1a:09:c0:c1: de:52:02:d5:c6:21:86:98:b5:ab:4f:6d:af:7e:e3:22: e5:40:73:ba:0c:8d:50:ef:5d:a1:4b:ff:c9:92:17:e4: 2b:5c:3e:e7:2d:00:1b:0d:2a:b1:3f:9d:a3:c8:8f:0f: 54:60:a2:7c:9f:86:d9:dd:f8:82:07:48:40:11:ca:67: d6:97:6d:ee:92:6d:b1:18:ae:9e:dd:6f:41:6d:a5:81: 25:a7:89:25:df:77:1f:e8:f0:c2:6a:17:02:64:f9:ba Fingerprint (SHA-256): E3:73:7D:61:5E:BC:58:0E:40:68:8A:BC:A7:B3:36:C8:49:4D:C2:62:D9:0A:69:8E:3A:AF:70:CF:90:E6:DC:0D Fingerprint (SHA1): E6:E9:0D:9E:4C:A9:B9:B3:66:B4:24:A6:60:BC:8E:F0:DF:A7:8B:33 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14705: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195741 (0x13bda55d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 20:36:10 2017 Not After : Thu Mar 31 20:36:10 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:45:88:c1:ee:9a:ff:53:57:b5:e6:09:16:d3:cc:40: c5:a2:ef:f5:92:81:44:9e:7a:fb:44:58:1c:1e:46:44: a9:e6:03:65:23:0a:ab:c2:50:97:6d:f6:f0:09:04:b6: 76:c5:33:b9:a7:66:f7:ef:b0:58:44:91:4f:52:dd:4d: a3:38:a6:26:13:61:65:6d:ca:74:c2:7b:a3:9b:3b:e8: 6f:eb:b0:32:7b:bc:83:2d:4b:78:e8:f2:b3:4d:08:57: e6:97:37:62:74:4e:60:01:8d:49:72:0a:61:b5:1e:61: fc:88:73:58:9a:a3:d5:a7:5b:9b:0e:c0:2f:26:51:3c: 71:30:a3:6c:b2:a0:97:68:96:1c:83:25:d6:f1:36:27: 63:8f:a7:b3:81:75:e3:c9:eb:41:ac:1a:ab:25:8b:6c: 1e:2b:cc:0e:d2:86:3c:ec:49:1a:61:62:19:01:cd:85: 6a:da:52:df:a1:59:54:5b:2d:f3:b8:14:93:89:d5:ef: 39:f7:c9:da:a6:da:7d:4b:c9:45:34:3e:99:d5:1d:4a: d4:4c:ed:23:2b:8c:50:8b:eb:4f:4a:1d:d0:2e:cb:53: 3b:cf:24:5b:5d:22:ad:45:b6:e3:5d:c3:d9:94:2c:b3: 29:f0:fa:d5:78:72:12:5a:56:60:00:11:65:e7:e3:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a3:72:4d:5f:af:44:b0:59:50:15:e8:e8:bc:a6:6a:e0: 64:f6:8e:0b:bc:04:69:a7:c0:09:62:4c:fb:56:b5:db: bc:07:83:91:81:9f:b0:a5:d0:70:3b:2d:1b:42:14:96: 15:9b:c1:16:96:48:29:69:0f:b2:f2:1c:48:a6:60:2c: dc:ab:00:e2:f7:24:08:0e:ac:55:7f:b9:b9:5c:d2:12: a6:6e:c9:6f:da:72:57:fa:15:c5:5d:22:da:12:e8:66: d9:f6:db:66:21:57:4f:c3:43:6a:fd:c9:a4:f2:f3:37: 68:aa:30:ae:a4:70:29:da:97:10:7b:16:61:a8:d1:fd: 21:09:84:b1:0f:14:c7:cd:ff:60:f3:8c:aa:fe:23:05: 66:7f:72:d9:6f:d8:0b:90:c7:bd:7b:67:5d:1e:a3:b5: 6f:4c:91:e8:27:ef:aa:02:e7:20:cb:d7:4d:00:ac:89: ad:c6:90:ed:34:dd:00:fb:90:b9:f7:50:e1:7f:d1:8a: 63:fe:dd:e5:4d:5d:48:61:fb:47:15:dc:22:9f:ef:98: 87:4d:d9:c5:a8:3b:8b:11:32:41:4e:f7:8c:17:6b:f5: 26:23:5d:c1:5e:25:00:c9:6a:33:e3:59:f5:27:d1:b0: 6b:a2:43:6c:a3:6a:a5:7c:80:ea:07:71:aa:c8:dd:5a Fingerprint (SHA-256): 38:AF:54:3C:5E:9B:5B:EC:1C:5A:01:15:9D:D4:7F:26:1B:42:48:04:30:12:C2:49:E6:A1:9B:52:CA:DD:46:76 Fingerprint (SHA1): F6:DA:5E:A1:CB:BE:5A:74:FA:18:5F:B1:29:37:EA:B2:D6:35:3F:B4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14706: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #14707: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #14708: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #14709: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195741 (0x13bda55d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 20:36:10 2017 Not After : Thu Mar 31 20:36:10 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:45:88:c1:ee:9a:ff:53:57:b5:e6:09:16:d3:cc:40: c5:a2:ef:f5:92:81:44:9e:7a:fb:44:58:1c:1e:46:44: a9:e6:03:65:23:0a:ab:c2:50:97:6d:f6:f0:09:04:b6: 76:c5:33:b9:a7:66:f7:ef:b0:58:44:91:4f:52:dd:4d: a3:38:a6:26:13:61:65:6d:ca:74:c2:7b:a3:9b:3b:e8: 6f:eb:b0:32:7b:bc:83:2d:4b:78:e8:f2:b3:4d:08:57: e6:97:37:62:74:4e:60:01:8d:49:72:0a:61:b5:1e:61: fc:88:73:58:9a:a3:d5:a7:5b:9b:0e:c0:2f:26:51:3c: 71:30:a3:6c:b2:a0:97:68:96:1c:83:25:d6:f1:36:27: 63:8f:a7:b3:81:75:e3:c9:eb:41:ac:1a:ab:25:8b:6c: 1e:2b:cc:0e:d2:86:3c:ec:49:1a:61:62:19:01:cd:85: 6a:da:52:df:a1:59:54:5b:2d:f3:b8:14:93:89:d5:ef: 39:f7:c9:da:a6:da:7d:4b:c9:45:34:3e:99:d5:1d:4a: d4:4c:ed:23:2b:8c:50:8b:eb:4f:4a:1d:d0:2e:cb:53: 3b:cf:24:5b:5d:22:ad:45:b6:e3:5d:c3:d9:94:2c:b3: 29:f0:fa:d5:78:72:12:5a:56:60:00:11:65:e7:e3:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a3:72:4d:5f:af:44:b0:59:50:15:e8:e8:bc:a6:6a:e0: 64:f6:8e:0b:bc:04:69:a7:c0:09:62:4c:fb:56:b5:db: bc:07:83:91:81:9f:b0:a5:d0:70:3b:2d:1b:42:14:96: 15:9b:c1:16:96:48:29:69:0f:b2:f2:1c:48:a6:60:2c: dc:ab:00:e2:f7:24:08:0e:ac:55:7f:b9:b9:5c:d2:12: a6:6e:c9:6f:da:72:57:fa:15:c5:5d:22:da:12:e8:66: d9:f6:db:66:21:57:4f:c3:43:6a:fd:c9:a4:f2:f3:37: 68:aa:30:ae:a4:70:29:da:97:10:7b:16:61:a8:d1:fd: 21:09:84:b1:0f:14:c7:cd:ff:60:f3:8c:aa:fe:23:05: 66:7f:72:d9:6f:d8:0b:90:c7:bd:7b:67:5d:1e:a3:b5: 6f:4c:91:e8:27:ef:aa:02:e7:20:cb:d7:4d:00:ac:89: ad:c6:90:ed:34:dd:00:fb:90:b9:f7:50:e1:7f:d1:8a: 63:fe:dd:e5:4d:5d:48:61:fb:47:15:dc:22:9f:ef:98: 87:4d:d9:c5:a8:3b:8b:11:32:41:4e:f7:8c:17:6b:f5: 26:23:5d:c1:5e:25:00:c9:6a:33:e3:59:f5:27:d1:b0: 6b:a2:43:6c:a3:6a:a5:7c:80:ea:07:71:aa:c8:dd:5a Fingerprint (SHA-256): 38:AF:54:3C:5E:9B:5B:EC:1C:5A:01:15:9D:D4:7F:26:1B:42:48:04:30:12:C2:49:E6:A1:9B:52:CA:DD:46:76 Fingerprint (SHA1): F6:DA:5E:A1:CB:BE:5A:74:FA:18:5F:B1:29:37:EA:B2:D6:35:3F:B4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14710: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195742 (0x13bda55e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:36:17 2017 Not After : Thu Mar 31 20:36:17 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:25:51:a5:db:fc:87:68:0a:07:89:ce:d7:d0:e9:7a: 06:b0:ce:7b:df:e6:7f:d1:22:b0:92:ba:c7:c4:8c:67: c5:fa:bd:91:83:dd:68:23:38:8b:d3:2d:49:bc:c0:46: e7:bd:33:18:14:d8:cd:fa:60:c6:8c:73:ff:68:64:3d: 40:17:0d:20:3d:95:f5:6c:62:b9:43:0f:9e:f7:23:81: 49:43:65:bb:f8:3c:2f:4a:b0:2c:c2:7f:53:37:7b:2a: 2e:7b:0a:a1:1e:92:3c:d5:db:d6:0f:96:b6:7f:19:99: 9e:ea:2a:a4:20:c4:a2:f2:ab:52:9a:27:1f:e1:51:00: cc:bb:0f:2d:33:0f:13:d4:82:89:1a:c6:73:42:bd:ad: 83:05:7a:f6:b8:59:23:f6:ac:08:87:24:c9:cb:e8:95: 65:5c:58:dc:95:6d:08:5d:af:b4:4d:d0:52:58:d2:d5: bb:fd:c7:ff:3d:cc:a5:f4:22:4e:fc:20:2f:23:e6:49: 6e:eb:bb:27:b3:f6:03:f7:f4:8d:bd:e5:4a:c8:df:b5: a2:c9:48:53:65:54:b2:7e:99:e8:64:76:78:7f:ab:24: 60:c7:fd:be:29:f1:d8:b6:e9:32:22:f8:ff:a2:ea:c6: 2e:ac:fa:97:3b:9b:bd:a5:52:8c:76:88:c9:58:dd:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:82:1f:53:cb:14:6a:71:c0:70:de:39:66:d6:64:e2: 5d:fd:6c:62:f9:f5:dd:37:3f:d1:c9:2d:16:ec:cc:bd: 66:9c:24:98:6c:10:3c:e2:d2:a2:83:1d:1c:4f:0c:39: 79:9d:58:03:61:c3:6c:07:7f:41:a2:0f:f2:2c:5f:6b: b6:33:bb:d6:64:9d:c4:f7:af:c7:2d:1c:35:41:44:08: 43:ed:85:fb:45:68:bc:e2:76:e4:ce:7d:17:ad:df:0f: 67:d3:20:13:7e:39:ca:9b:b3:56:0b:63:79:09:c1:e4: ba:b6:3f:09:00:b0:aa:a2:40:76:0f:88:54:d3:78:b9: 9b:ff:9e:35:47:6b:e2:99:f1:4d:f5:05:af:47:c9:74: 04:9b:1f:3c:11:a2:62:e1:12:a3:89:e2:1a:09:c0:c1: de:52:02:d5:c6:21:86:98:b5:ab:4f:6d:af:7e:e3:22: e5:40:73:ba:0c:8d:50:ef:5d:a1:4b:ff:c9:92:17:e4: 2b:5c:3e:e7:2d:00:1b:0d:2a:b1:3f:9d:a3:c8:8f:0f: 54:60:a2:7c:9f:86:d9:dd:f8:82:07:48:40:11:ca:67: d6:97:6d:ee:92:6d:b1:18:ae:9e:dd:6f:41:6d:a5:81: 25:a7:89:25:df:77:1f:e8:f0:c2:6a:17:02:64:f9:ba Fingerprint (SHA-256): E3:73:7D:61:5E:BC:58:0E:40:68:8A:BC:A7:B3:36:C8:49:4D:C2:62:D9:0A:69:8E:3A:AF:70:CF:90:E6:DC:0D Fingerprint (SHA1): E6:E9:0D:9E:4C:A9:B9:B3:66:B4:24:A6:60:BC:8E:F0:DF:A7:8B:33 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14711: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #14712: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #14713: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #14714: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #14715: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #14716: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195742 (0x13bda55e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:36:17 2017 Not After : Thu Mar 31 20:36:17 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:25:51:a5:db:fc:87:68:0a:07:89:ce:d7:d0:e9:7a: 06:b0:ce:7b:df:e6:7f:d1:22:b0:92:ba:c7:c4:8c:67: c5:fa:bd:91:83:dd:68:23:38:8b:d3:2d:49:bc:c0:46: e7:bd:33:18:14:d8:cd:fa:60:c6:8c:73:ff:68:64:3d: 40:17:0d:20:3d:95:f5:6c:62:b9:43:0f:9e:f7:23:81: 49:43:65:bb:f8:3c:2f:4a:b0:2c:c2:7f:53:37:7b:2a: 2e:7b:0a:a1:1e:92:3c:d5:db:d6:0f:96:b6:7f:19:99: 9e:ea:2a:a4:20:c4:a2:f2:ab:52:9a:27:1f:e1:51:00: cc:bb:0f:2d:33:0f:13:d4:82:89:1a:c6:73:42:bd:ad: 83:05:7a:f6:b8:59:23:f6:ac:08:87:24:c9:cb:e8:95: 65:5c:58:dc:95:6d:08:5d:af:b4:4d:d0:52:58:d2:d5: bb:fd:c7:ff:3d:cc:a5:f4:22:4e:fc:20:2f:23:e6:49: 6e:eb:bb:27:b3:f6:03:f7:f4:8d:bd:e5:4a:c8:df:b5: a2:c9:48:53:65:54:b2:7e:99:e8:64:76:78:7f:ab:24: 60:c7:fd:be:29:f1:d8:b6:e9:32:22:f8:ff:a2:ea:c6: 2e:ac:fa:97:3b:9b:bd:a5:52:8c:76:88:c9:58:dd:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:82:1f:53:cb:14:6a:71:c0:70:de:39:66:d6:64:e2: 5d:fd:6c:62:f9:f5:dd:37:3f:d1:c9:2d:16:ec:cc:bd: 66:9c:24:98:6c:10:3c:e2:d2:a2:83:1d:1c:4f:0c:39: 79:9d:58:03:61:c3:6c:07:7f:41:a2:0f:f2:2c:5f:6b: b6:33:bb:d6:64:9d:c4:f7:af:c7:2d:1c:35:41:44:08: 43:ed:85:fb:45:68:bc:e2:76:e4:ce:7d:17:ad:df:0f: 67:d3:20:13:7e:39:ca:9b:b3:56:0b:63:79:09:c1:e4: ba:b6:3f:09:00:b0:aa:a2:40:76:0f:88:54:d3:78:b9: 9b:ff:9e:35:47:6b:e2:99:f1:4d:f5:05:af:47:c9:74: 04:9b:1f:3c:11:a2:62:e1:12:a3:89:e2:1a:09:c0:c1: de:52:02:d5:c6:21:86:98:b5:ab:4f:6d:af:7e:e3:22: e5:40:73:ba:0c:8d:50:ef:5d:a1:4b:ff:c9:92:17:e4: 2b:5c:3e:e7:2d:00:1b:0d:2a:b1:3f:9d:a3:c8:8f:0f: 54:60:a2:7c:9f:86:d9:dd:f8:82:07:48:40:11:ca:67: d6:97:6d:ee:92:6d:b1:18:ae:9e:dd:6f:41:6d:a5:81: 25:a7:89:25:df:77:1f:e8:f0:c2:6a:17:02:64:f9:ba Fingerprint (SHA-256): E3:73:7D:61:5E:BC:58:0E:40:68:8A:BC:A7:B3:36:C8:49:4D:C2:62:D9:0A:69:8E:3A:AF:70:CF:90:E6:DC:0D Fingerprint (SHA1): E6:E9:0D:9E:4C:A9:B9:B3:66:B4:24:A6:60:BC:8E:F0:DF:A7:8B:33 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14717: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195742 (0x13bda55e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:36:17 2017 Not After : Thu Mar 31 20:36:17 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:25:51:a5:db:fc:87:68:0a:07:89:ce:d7:d0:e9:7a: 06:b0:ce:7b:df:e6:7f:d1:22:b0:92:ba:c7:c4:8c:67: c5:fa:bd:91:83:dd:68:23:38:8b:d3:2d:49:bc:c0:46: e7:bd:33:18:14:d8:cd:fa:60:c6:8c:73:ff:68:64:3d: 40:17:0d:20:3d:95:f5:6c:62:b9:43:0f:9e:f7:23:81: 49:43:65:bb:f8:3c:2f:4a:b0:2c:c2:7f:53:37:7b:2a: 2e:7b:0a:a1:1e:92:3c:d5:db:d6:0f:96:b6:7f:19:99: 9e:ea:2a:a4:20:c4:a2:f2:ab:52:9a:27:1f:e1:51:00: cc:bb:0f:2d:33:0f:13:d4:82:89:1a:c6:73:42:bd:ad: 83:05:7a:f6:b8:59:23:f6:ac:08:87:24:c9:cb:e8:95: 65:5c:58:dc:95:6d:08:5d:af:b4:4d:d0:52:58:d2:d5: bb:fd:c7:ff:3d:cc:a5:f4:22:4e:fc:20:2f:23:e6:49: 6e:eb:bb:27:b3:f6:03:f7:f4:8d:bd:e5:4a:c8:df:b5: a2:c9:48:53:65:54:b2:7e:99:e8:64:76:78:7f:ab:24: 60:c7:fd:be:29:f1:d8:b6:e9:32:22:f8:ff:a2:ea:c6: 2e:ac:fa:97:3b:9b:bd:a5:52:8c:76:88:c9:58:dd:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:82:1f:53:cb:14:6a:71:c0:70:de:39:66:d6:64:e2: 5d:fd:6c:62:f9:f5:dd:37:3f:d1:c9:2d:16:ec:cc:bd: 66:9c:24:98:6c:10:3c:e2:d2:a2:83:1d:1c:4f:0c:39: 79:9d:58:03:61:c3:6c:07:7f:41:a2:0f:f2:2c:5f:6b: b6:33:bb:d6:64:9d:c4:f7:af:c7:2d:1c:35:41:44:08: 43:ed:85:fb:45:68:bc:e2:76:e4:ce:7d:17:ad:df:0f: 67:d3:20:13:7e:39:ca:9b:b3:56:0b:63:79:09:c1:e4: ba:b6:3f:09:00:b0:aa:a2:40:76:0f:88:54:d3:78:b9: 9b:ff:9e:35:47:6b:e2:99:f1:4d:f5:05:af:47:c9:74: 04:9b:1f:3c:11:a2:62:e1:12:a3:89:e2:1a:09:c0:c1: de:52:02:d5:c6:21:86:98:b5:ab:4f:6d:af:7e:e3:22: e5:40:73:ba:0c:8d:50:ef:5d:a1:4b:ff:c9:92:17:e4: 2b:5c:3e:e7:2d:00:1b:0d:2a:b1:3f:9d:a3:c8:8f:0f: 54:60:a2:7c:9f:86:d9:dd:f8:82:07:48:40:11:ca:67: d6:97:6d:ee:92:6d:b1:18:ae:9e:dd:6f:41:6d:a5:81: 25:a7:89:25:df:77:1f:e8:f0:c2:6a:17:02:64:f9:ba Fingerprint (SHA-256): E3:73:7D:61:5E:BC:58:0E:40:68:8A:BC:A7:B3:36:C8:49:4D:C2:62:D9:0A:69:8E:3A:AF:70:CF:90:E6:DC:0D Fingerprint (SHA1): E6:E9:0D:9E:4C:A9:B9:B3:66:B4:24:A6:60:BC:8E:F0:DF:A7:8B:33 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14718: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #14719: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #14720: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #14721: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #14722: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #14723: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195741 (0x13bda55d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 20:36:10 2017 Not After : Thu Mar 31 20:36:10 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:45:88:c1:ee:9a:ff:53:57:b5:e6:09:16:d3:cc:40: c5:a2:ef:f5:92:81:44:9e:7a:fb:44:58:1c:1e:46:44: a9:e6:03:65:23:0a:ab:c2:50:97:6d:f6:f0:09:04:b6: 76:c5:33:b9:a7:66:f7:ef:b0:58:44:91:4f:52:dd:4d: a3:38:a6:26:13:61:65:6d:ca:74:c2:7b:a3:9b:3b:e8: 6f:eb:b0:32:7b:bc:83:2d:4b:78:e8:f2:b3:4d:08:57: e6:97:37:62:74:4e:60:01:8d:49:72:0a:61:b5:1e:61: fc:88:73:58:9a:a3:d5:a7:5b:9b:0e:c0:2f:26:51:3c: 71:30:a3:6c:b2:a0:97:68:96:1c:83:25:d6:f1:36:27: 63:8f:a7:b3:81:75:e3:c9:eb:41:ac:1a:ab:25:8b:6c: 1e:2b:cc:0e:d2:86:3c:ec:49:1a:61:62:19:01:cd:85: 6a:da:52:df:a1:59:54:5b:2d:f3:b8:14:93:89:d5:ef: 39:f7:c9:da:a6:da:7d:4b:c9:45:34:3e:99:d5:1d:4a: d4:4c:ed:23:2b:8c:50:8b:eb:4f:4a:1d:d0:2e:cb:53: 3b:cf:24:5b:5d:22:ad:45:b6:e3:5d:c3:d9:94:2c:b3: 29:f0:fa:d5:78:72:12:5a:56:60:00:11:65:e7:e3:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a3:72:4d:5f:af:44:b0:59:50:15:e8:e8:bc:a6:6a:e0: 64:f6:8e:0b:bc:04:69:a7:c0:09:62:4c:fb:56:b5:db: bc:07:83:91:81:9f:b0:a5:d0:70:3b:2d:1b:42:14:96: 15:9b:c1:16:96:48:29:69:0f:b2:f2:1c:48:a6:60:2c: dc:ab:00:e2:f7:24:08:0e:ac:55:7f:b9:b9:5c:d2:12: a6:6e:c9:6f:da:72:57:fa:15:c5:5d:22:da:12:e8:66: d9:f6:db:66:21:57:4f:c3:43:6a:fd:c9:a4:f2:f3:37: 68:aa:30:ae:a4:70:29:da:97:10:7b:16:61:a8:d1:fd: 21:09:84:b1:0f:14:c7:cd:ff:60:f3:8c:aa:fe:23:05: 66:7f:72:d9:6f:d8:0b:90:c7:bd:7b:67:5d:1e:a3:b5: 6f:4c:91:e8:27:ef:aa:02:e7:20:cb:d7:4d:00:ac:89: ad:c6:90:ed:34:dd:00:fb:90:b9:f7:50:e1:7f:d1:8a: 63:fe:dd:e5:4d:5d:48:61:fb:47:15:dc:22:9f:ef:98: 87:4d:d9:c5:a8:3b:8b:11:32:41:4e:f7:8c:17:6b:f5: 26:23:5d:c1:5e:25:00:c9:6a:33:e3:59:f5:27:d1:b0: 6b:a2:43:6c:a3:6a:a5:7c:80:ea:07:71:aa:c8:dd:5a Fingerprint (SHA-256): 38:AF:54:3C:5E:9B:5B:EC:1C:5A:01:15:9D:D4:7F:26:1B:42:48:04:30:12:C2:49:E6:A1:9B:52:CA:DD:46:76 Fingerprint (SHA1): F6:DA:5E:A1:CB:BE:5A:74:FA:18:5F:B1:29:37:EA:B2:D6:35:3F:B4 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14724: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195741 (0x13bda55d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 20:36:10 2017 Not After : Thu Mar 31 20:36:10 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:45:88:c1:ee:9a:ff:53:57:b5:e6:09:16:d3:cc:40: c5:a2:ef:f5:92:81:44:9e:7a:fb:44:58:1c:1e:46:44: a9:e6:03:65:23:0a:ab:c2:50:97:6d:f6:f0:09:04:b6: 76:c5:33:b9:a7:66:f7:ef:b0:58:44:91:4f:52:dd:4d: a3:38:a6:26:13:61:65:6d:ca:74:c2:7b:a3:9b:3b:e8: 6f:eb:b0:32:7b:bc:83:2d:4b:78:e8:f2:b3:4d:08:57: e6:97:37:62:74:4e:60:01:8d:49:72:0a:61:b5:1e:61: fc:88:73:58:9a:a3:d5:a7:5b:9b:0e:c0:2f:26:51:3c: 71:30:a3:6c:b2:a0:97:68:96:1c:83:25:d6:f1:36:27: 63:8f:a7:b3:81:75:e3:c9:eb:41:ac:1a:ab:25:8b:6c: 1e:2b:cc:0e:d2:86:3c:ec:49:1a:61:62:19:01:cd:85: 6a:da:52:df:a1:59:54:5b:2d:f3:b8:14:93:89:d5:ef: 39:f7:c9:da:a6:da:7d:4b:c9:45:34:3e:99:d5:1d:4a: d4:4c:ed:23:2b:8c:50:8b:eb:4f:4a:1d:d0:2e:cb:53: 3b:cf:24:5b:5d:22:ad:45:b6:e3:5d:c3:d9:94:2c:b3: 29:f0:fa:d5:78:72:12:5a:56:60:00:11:65:e7:e3:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a3:72:4d:5f:af:44:b0:59:50:15:e8:e8:bc:a6:6a:e0: 64:f6:8e:0b:bc:04:69:a7:c0:09:62:4c:fb:56:b5:db: bc:07:83:91:81:9f:b0:a5:d0:70:3b:2d:1b:42:14:96: 15:9b:c1:16:96:48:29:69:0f:b2:f2:1c:48:a6:60:2c: dc:ab:00:e2:f7:24:08:0e:ac:55:7f:b9:b9:5c:d2:12: a6:6e:c9:6f:da:72:57:fa:15:c5:5d:22:da:12:e8:66: d9:f6:db:66:21:57:4f:c3:43:6a:fd:c9:a4:f2:f3:37: 68:aa:30:ae:a4:70:29:da:97:10:7b:16:61:a8:d1:fd: 21:09:84:b1:0f:14:c7:cd:ff:60:f3:8c:aa:fe:23:05: 66:7f:72:d9:6f:d8:0b:90:c7:bd:7b:67:5d:1e:a3:b5: 6f:4c:91:e8:27:ef:aa:02:e7:20:cb:d7:4d:00:ac:89: ad:c6:90:ed:34:dd:00:fb:90:b9:f7:50:e1:7f:d1:8a: 63:fe:dd:e5:4d:5d:48:61:fb:47:15:dc:22:9f:ef:98: 87:4d:d9:c5:a8:3b:8b:11:32:41:4e:f7:8c:17:6b:f5: 26:23:5d:c1:5e:25:00:c9:6a:33:e3:59:f5:27:d1:b0: 6b:a2:43:6c:a3:6a:a5:7c:80:ea:07:71:aa:c8:dd:5a Fingerprint (SHA-256): 38:AF:54:3C:5E:9B:5B:EC:1C:5A:01:15:9D:D4:7F:26:1B:42:48:04:30:12:C2:49:E6:A1:9B:52:CA:DD:46:76 Fingerprint (SHA1): F6:DA:5E:A1:CB:BE:5A:74:FA:18:5F:B1:29:37:EA:B2:D6:35:3F:B4 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #14725: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #14726: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195746 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14727: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #14728: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #14729: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195747 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14730: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #14731: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #14732: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195748 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14733: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #14734: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #14735: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195749 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14736: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #14737: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #14738: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195750 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14739: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #14740: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #14741: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195751 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14742: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #14743: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #14744: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195752 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14745: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #14746: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #14747: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195753 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14748: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #14749: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #14750: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195754 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14751: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #14752: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #14753: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14754: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 331195755 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14755: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14756: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 331195756 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14757: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14758: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 331195757 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14759: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14760: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #14761: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #14762: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14763: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 331195758 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14764: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14765: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 331195759 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14766: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14767: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 331195760 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14768: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14769: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #14770: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #14771: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14772: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 331195761 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14773: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14774: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 331195762 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14775: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14776: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 331195763 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14777: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14778: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #14779: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #14780: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14781: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 331195764 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14782: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14783: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 331195765 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14784: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14785: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 331195766 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14786: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14787: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #14788: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14789: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14790: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 331195767 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14791: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14792: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14793: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14794: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331195768 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #14795: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14796: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195746 (0x13bda562) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Mar 31 20:37:21 2017 Not After : Thu Mar 31 20:37:21 2067 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:cd:ba:5b:b6:9a:ea:68:b7:31:0b:8f:7a:7e:aa:98: 51:cf:f0:72:8b:cc:ba:46:84:4f:14:55:1f:00:52:b7: 11:53:d7:32:e0:45:03:2b:4a:89:4f:8e:6f:10:34:8d: 4c:05:19:be:81:aa:17:d2:e8:31:10:91:39:f1:3e:8b: 5e:a1:73:4e:eb:f8:8f:3e:a2:79:bf:23:03:40:f0:eb: a1:77:ee:76:6e:41:17:cf:83:2f:92:24:57:9b:2e:78: 88:24:61:de:f4:13:d9:e9:d2:44:1f:8c:2d:95:48:3c: 28:4b:68:66:41:9e:8a:33:93:d0:02:2e:61:88:f7:4f: e0:ce:d7:2e:64:ae:04:27:34:ee:18:f2:c5:0b:25:6e: 7f:8c:fb:7c:ff:0f:e8:61:10:2b:2e:09:fa:73:be:be: 6f:1a:72:8e:7d:d8:6a:7d:4d:c4:56:d5:ca:72:2f:e6: 41:a5:2b:94:40:4b:b2:37:fa:90:be:a9:e4:04:be:70: 8f:ef:40:98:1f:e4:b8:51:d7:4b:85:47:91:f3:78:f0: 77:82:a1:e3:2d:bf:bd:1e:ba:41:86:41:1f:a8:6c:e2: df:3b:8e:7f:36:7e:26:bd:2a:17:bc:36:80:cf:3e:0d: 1b:bc:1a:9c:20:c0:4c:f6:fc:11:6a:59:23:54:78:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:2a:b4:60:83:43:d8:05:08:1b:1f:54:46:1a:3f:85: 98:4f:8c:07:80:71:10:15:33:0a:3a:74:b3:d8:5c:e0: f8:db:b6:ea:a4:dc:ce:df:a6:05:65:4b:9d:76:58:da: 71:f2:ac:6b:83:8b:f5:60:d5:3a:71:f4:72:ce:38:c0: 96:ca:df:26:81:dc:4a:28:96:a4:a4:14:13:b0:82:f9: dc:8b:c5:53:cc:55:09:2d:7f:d1:8f:c4:72:e9:b5:f8: 7e:40:28:3a:ca:15:01:b9:d0:11:b4:da:0b:bf:0f:de: fc:6b:e6:0e:30:88:fe:44:b9:a1:f4:0d:8e:db:70:a2: 72:73:83:ca:b7:af:eb:ad:34:d4:ec:c6:95:45:92:02: 37:e8:b2:73:0e:30:ed:98:84:b9:f7:ac:c0:2a:8c:42: df:37:cc:22:0a:d1:62:d8:8a:df:c6:b3:72:29:65:6d: da:17:40:bd:01:2a:5c:73:0a:60:54:94:62:87:d6:79: f7:56:aa:13:a9:c9:a8:8a:32:97:6a:0f:88:28:69:fb: 90:2e:2c:fc:04:f0:a9:cd:1c:26:7c:76:44:a9:fa:b3: 84:51:07:64:31:6b:2a:74:66:90:90:8e:4f:fa:a3:5b: 7d:b2:d2:39:81:6b:09:bb:8d:21:82:b6:75:e0:96:ae Fingerprint (SHA-256): C3:29:4F:14:E1:44:C3:4F:53:91:DA:EF:36:51:A8:73:95:A0:EC:0C:6B:71:6D:52:DD:0F:B3:D4:7F:AB:F8:6E Fingerprint (SHA1): 46:43:85:F8:F6:E0:72:B1:11:24:93:40:C6:85:BE:9B:23:50:0F:AB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #14797: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195747 (0x13bda563) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Mar 31 20:37:29 2017 Not After : Thu Mar 31 20:37:29 2067 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:46:ac:a3:46:c6:75:4f:47:53:c6:a1:d1:41:3c:6d: 99:be:1a:6e:ca:c8:5a:c6:6c:09:39:6b:c8:9e:6d:b1: dd:8e:9a:d5:a2:78:f9:2f:fd:de:86:79:3e:c4:7f:d7: d6:d2:0d:ad:00:94:15:2b:80:e2:65:4d:7a:64:91:86: 61:f5:c1:1b:b3:d9:dc:74:a3:ca:c5:02:63:b5:8b:13: 07:3c:16:2a:79:a4:e3:ae:21:d7:10:dd:38:28:26:6e: c0:e2:95:e4:d0:3e:4b:c7:f7:1e:3a:cb:24:9e:ef:00: b5:10:54:cc:35:74:9c:26:8b:36:f7:c8:1d:e8:95:5e: 4b:cb:14:41:e8:28:08:fe:12:66:6a:f0:1a:87:a7:fe: 87:5a:49:0d:bb:f6:4d:22:a1:ab:25:53:cf:3d:22:4a: 48:4f:8e:38:a6:ae:9d:ac:b7:c0:dc:7e:74:31:6c:67: fa:57:1c:b3:00:52:b0:76:94:db:d3:38:62:88:6e:81: d5:01:0d:1d:a8:9a:07:3c:a3:ac:5c:ff:25:ba:40:de: 81:00:5d:71:2c:81:0d:6d:26:47:3a:9a:af:5f:55:ac: 2c:09:7d:b1:14:d8:b4:e3:e5:a4:0f:0c:7f:b8:fa:d5: 2b:29:9c:b2:fe:49:8d:e7:12:7e:12:6f:a6:7c:be:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:fd:77:1f:6f:84:db:e4:51:93:a7:9d:8c:63:be:a3: 7f:0b:3b:55:86:88:a0:5a:85:1e:a0:86:b5:9f:ef:a5: 45:01:7c:e9:a1:a2:f4:57:ae:df:6b:4b:95:aa:9a:96: 74:fa:e8:b1:eb:f4:dd:8a:13:fb:bb:b2:07:70:6f:49: 3b:b3:8a:84:33:b9:81:9e:29:60:1b:dd:f4:11:c3:43: 95:6d:fd:95:c5:38:e8:29:ab:83:ae:5b:12:85:ab:3f: e3:d9:b3:98:3b:fe:ec:ea:d4:3d:50:88:3c:9d:16:e8: 39:21:72:17:34:86:0b:51:91:bb:dc:4f:6a:75:25:e5: 0f:65:f9:6b:a7:d3:c5:f7:4b:3a:18:55:33:02:43:33: f8:24:a3:a5:fe:cf:25:e0:c6:e3:03:2e:04:80:4f:47: 24:be:bb:34:9a:f6:fa:df:02:2c:76:e1:91:1e:05:c4: 7d:ee:0c:b8:0d:b0:bb:9d:95:fa:c8:88:41:bb:aa:04: d9:38:04:de:95:4c:5d:d4:46:20:a7:c5:e1:59:97:f1: 29:49:77:4d:b7:ef:fb:dc:95:f0:bf:34:84:a8:12:de: c0:6b:34:22:eb:ea:be:f1:f0:e4:db:27:05:19:03:cc: c6:a9:1e:27:f7:b8:84:c8:07:da:40:d5:cf:4d:b9:26 Fingerprint (SHA-256): E5:26:F7:F1:60:1B:95:EB:A6:77:5D:FC:3F:52:3D:87:0B:EE:A0:3B:6B:9D:66:F3:9A:1D:4B:B5:32:21:7A:7A Fingerprint (SHA1): 4B:BD:9D:AB:05:5C:DE:D9:C5:2E:40:16:63:DB:59:1E:E6:EE:BD:4E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #14798: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195748 (0x13bda564) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Mar 31 20:37:38 2017 Not After : Thu Mar 31 20:37:38 2067 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:97:0b:a6:25:e2:03:78:cb:9c:03:27:4f:79:0b:30: ca:2c:15:e1:7e:6e:20:36:d7:dc:86:08:59:a7:00:af: 91:e4:6f:29:be:8a:ca:94:8b:ba:23:75:9b:5c:61:8e: 6a:88:64:ad:78:38:6d:37:5a:b1:09:9b:b4:43:f8:17: e0:bb:db:46:cf:2c:ed:4e:75:f0:a3:91:1c:22:58:ea: 53:54:f8:bf:2e:10:ce:a1:7a:61:4c:51:98:0a:54:bf: 9f:02:66:93:05:a8:5f:f9:4e:fb:60:1f:8b:9b:c7:b2: e9:a8:47:1c:b8:85:ce:be:6f:18:09:55:35:28:22:e6: 5f:93:50:1b:e6:af:70:48:45:2d:f9:74:f7:69:78:97: 1a:24:57:e3:68:64:b8:e3:f3:47:08:d5:ea:d7:61:e8: 7a:d6:b3:4b:bf:3b:42:8e:ab:d3:2e:68:68:f2:34:f2: 55:77:b0:42:59:13:8f:ff:99:59:71:22:43:4a:95:3b: 1d:e5:fc:af:cf:78:54:72:f5:16:2f:28:ce:b8:aa:ff: 5a:b3:a4:39:7a:cd:db:b4:84:87:b6:5c:f0:b3:67:c4: 63:62:35:5a:1c:77:6c:22:77:3a:8f:b9:48:e1:43:bd: 6e:19:1a:61:d4:31:26:97:5c:ce:a5:b2:ec:91:a4:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:cb:ca:77:f4:f7:35:93:3f:95:e0:1b:d4:02:50:a2: c6:92:83:29:9b:bb:0c:fb:df:3a:9e:07:14:98:2d:06: b6:d7:05:27:35:66:e5:5a:71:4d:1c:16:fa:5d:31:b6: a9:2a:79:11:8c:34:99:23:89:bf:2c:f1:4c:ed:4c:c3: 4b:f1:34:8a:1e:ec:d6:1c:fa:54:ee:19:29:7f:88:22: 09:a9:f1:ee:ad:fc:56:c7:d4:e7:c7:c5:b1:fe:77:17: 72:b0:eb:4f:bf:5d:b1:f4:3f:3e:af:cf:d9:7b:a1:3e: 80:58:02:7d:84:fb:f7:c7:f6:8e:45:05:a2:6d:b8:36: ad:a3:83:6a:22:19:49:32:4f:06:de:5d:77:10:d4:26: 53:6c:51:c1:37:57:83:db:e2:41:bd:03:28:a4:5e:1e: d8:90:bd:6f:bc:9c:95:a3:7d:3d:d3:91:e7:80:7d:f9: 68:65:85:ef:f2:ca:b4:04:cf:78:07:6d:9c:0e:02:49: b2:96:ef:9d:85:29:16:9e:b6:8d:42:24:9f:58:0a:37: 97:c3:48:d5:97:77:e2:c2:3a:9c:61:24:c4:a1:e4:b2: 13:8b:08:85:3d:b5:15:d7:44:87:ac:71:04:f1:a5:bc: ff:f8:f6:43:8d:c9:c6:95:12:b3:bb:8f:45:bd:0f:56 Fingerprint (SHA-256): 73:3B:80:C5:42:F9:BE:BB:1E:72:17:E1:92:10:33:93:5B:B2:91:43:C1:8A:50:6B:2F:7E:35:84:C1:28:7C:03 Fingerprint (SHA1): 07:9B:44:C6:67:A7:80:6A:85:65:A4:E4:1F:B6:41:03:F1:03:1B:B5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #14799: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195749 (0x13bda565) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Mar 31 20:37:46 2017 Not After : Thu Mar 31 20:37:46 2067 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:d9:d1:a1:d7:64:5f:38:61:3f:d0:55:6c:43:ea:48: 4c:ca:46:36:81:d3:60:f1:18:ff:b7:e6:62:e4:37:c5: a2:c1:da:25:05:fe:7a:5b:65:44:fc:dc:7e:b5:22:33: 8b:cf:04:42:1d:69:d2:a2:dc:87:65:e4:0e:ba:e9:e9: 66:ea:d4:88:40:f2:8e:01:2b:69:c5:28:5f:1f:49:0e: 48:8b:cd:d1:bc:13:fb:77:17:29:26:86:42:78:d8:6a: 57:5a:34:bb:0f:2d:ae:cb:b7:11:54:5a:82:bd:5f:40: 34:53:d7:6a:d7:1d:a4:37:b8:08:fb:59:0f:72:3e:6f: c9:26:b1:55:32:8b:0b:11:86:f3:e1:30:91:98:26:e0: 71:4c:cb:16:9c:d3:78:4e:52:10:c8:45:a9:d5:26:48: e4:04:06:c9:12:55:48:31:35:c8:95:c0:13:f3:9d:16: 5d:1b:5b:f2:08:63:a7:34:41:70:af:c9:22:ee:46:c1: 32:ef:ac:bd:68:b1:9b:23:12:b0:d2:ef:b6:85:7a:fd: c1:af:05:e6:e3:0b:43:9a:95:2e:5b:fe:11:86:ce:f7: 54:aa:55:af:54:d1:99:be:7d:c4:44:fc:0c:c3:4e:e5: 95:1b:f7:e0:a7:66:bb:bf:f6:21:fe:f9:aa:11:20:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:9a:02:b9:e0:54:c3:62:39:53:9b:3e:65:77:b0:a1: cf:1f:8f:11:47:c7:e4:23:ae:f0:d2:70:52:3f:67:56: 8c:92:f3:0a:85:53:0d:e1:b6:77:97:3a:12:5e:9b:f6: 1d:fd:18:ee:7c:48:9b:ac:32:5d:90:cd:af:93:3e:93: f3:a6:36:68:26:51:59:03:b1:e4:1e:03:e0:4a:9f:7c: ba:ca:e6:71:d0:6a:4d:06:56:77:2c:64:fc:b4:1d:d4: 05:ff:21:cb:60:1c:5e:11:b2:3f:cd:95:a6:5d:6c:f1: af:c5:01:76:8e:7d:0a:2b:b5:8a:07:e3:f8:c4:0c:a2: 6c:14:9c:a0:3f:01:ec:b3:92:43:99:05:89:52:1a:35: 74:d9:0d:0c:1a:d0:af:4b:c0:42:ca:c5:c2:2e:b1:a6: db:62:cb:ec:bd:12:84:05:2f:fc:c3:f7:51:d7:2c:40: 12:dd:08:df:52:cf:de:b7:cd:ff:4e:fe:31:44:77:35: 32:6d:b5:83:55:12:8a:f3:0f:60:fb:a5:1b:29:26:18: b8:24:00:48:45:6f:6c:9c:f1:9d:e7:96:2b:4e:a1:3e: 44:d5:c5:07:d8:b5:50:d7:13:50:09:98:7b:3c:bd:37: 79:f4:5d:ac:ca:f5:3d:e6:ab:b1:af:20:77:56:a8:85 Fingerprint (SHA-256): 06:3C:09:56:6F:B6:72:BF:38:4B:57:9A:70:58:6A:10:DE:98:81:42:92:86:1E:53:0C:0E:BD:56:83:C7:48:9B Fingerprint (SHA1): 74:D8:72:D3:27:46:11:8B:CE:59:BF:55:58:21:11:09:BB:31:22:09 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #14800: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195750 (0x13bda566) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Mar 31 20:37:58 2017 Not After : Thu Mar 31 20:37:58 2067 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:24:e8:0f:e7:19:e0:66:00:82:d9:07:2a:e9:1b:70: 15:f3:d0:9a:31:a5:ae:71:a3:20:47:8c:cc:fc:1f:9d: 9e:1c:57:07:91:cc:c8:f4:2d:dd:d4:cd:59:54:5e:c0: b2:ce:b3:1a:f0:1e:e9:9e:3b:91:8f:9e:d8:1d:45:76: e6:77:e8:52:0f:ae:ff:e9:46:bd:f0:99:3a:1e:d8:7d: 59:42:1d:b1:ae:76:4d:bb:da:47:d6:42:64:52:16:5e: cb:cf:e0:88:27:9f:4c:63:5b:aa:a2:d8:3b:d9:b7:63: c5:0b:a2:9c:6a:63:c7:70:e9:f5:ec:5d:72:a3:50:59: 65:23:57:ad:3e:cb:08:49:ee:51:5d:cc:b2:ed:08:f1: 91:b9:9f:37:2e:37:cf:f5:b4:e1:b4:f3:51:97:7f:e0: b8:a8:7f:ad:94:b9:2e:cb:d4:d2:5b:29:e9:0e:e5:43: 7b:83:77:c0:55:8e:65:71:ee:8a:2f:85:68:82:6c:f9: ce:6d:d2:a0:fe:6c:0e:32:7e:ab:e4:dc:1d:03:d1:be: d3:4b:90:c2:2b:9b:fc:96:68:8c:f5:5d:a2:dc:6f:92: 3b:4d:53:e0:7c:3f:00:91:fb:cf:67:e7:19:3c:ed:9d: ca:61:9b:37:97:6a:2c:39:0f:82:32:bd:52:b3:be:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:1f:b9:b9:5c:08:23:97:a8:b7:96:c9:f4:a1:7b:bc: 78:b4:3f:7f:fc:30:65:6f:a3:01:d2:f1:32:ee:15:20: c5:a8:d0:4c:78:6d:3a:62:ea:84:62:88:dc:d9:d4:9c: 75:52:a1:86:38:34:05:e1:66:c9:d8:02:00:d5:69:09: a1:36:b1:7f:33:f6:e9:c9:8a:da:8d:af:44:87:91:13: b0:b9:78:7c:57:3c:9a:2f:cd:a9:b0:a7:cd:09:f0:67: d3:4c:33:2b:db:ae:83:8d:b9:3f:96:b8:02:52:bd:52: 77:e3:46:2e:4b:b0:47:c6:d4:c0:9f:7e:5c:6c:23:19: 8c:b9:66:d2:b2:6e:18:8d:7b:89:31:19:01:b5:6c:e2: 76:64:63:84:b0:7c:2e:e2:89:9f:1c:f2:77:19:91:1e: 48:37:c8:d4:9e:60:3b:15:ee:2a:44:79:58:f9:05:12: 1f:83:54:ed:bc:e0:21:ef:89:27:b9:87:e3:50:64:8c: 78:06:b8:63:c3:85:d2:26:6b:5e:0d:8f:6e:b3:4f:3a: 4f:65:d0:d7:4b:36:aa:07:bb:b0:84:df:1f:13:7f:ce: 21:8e:2f:fc:d2:a4:e8:b8:4f:fd:91:0c:7a:dd:83:ac: f9:c0:d8:11:64:d9:11:81:99:a0:62:8f:e8:e8:be:e7 Fingerprint (SHA-256): 03:21:74:7B:FF:C1:19:05:14:CD:07:FC:0B:78:C9:13:12:50:A5:C4:F9:7C:11:6B:BF:D2:BE:0F:02:82:52:45 Fingerprint (SHA1): 2D:7E:22:FC:0E:6E:1D:78:88:94:5E:25:66:A7:1D:A5:A0:A8:13:47 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #14801: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195751 (0x13bda567) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Mar 31 20:38:05 2017 Not After : Thu Mar 31 20:38:05 2067 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:1f:16:22:72:7a:a6:8f:ce:8e:c0:e3:9d:07:7c:7e: 6e:4d:6a:12:0d:40:6f:dc:dd:53:b0:f1:16:10:e3:34: f9:d8:57:e7:ca:a9:f9:59:93:1c:10:00:31:6c:5c:cf: c2:eb:d6:4c:07:89:9b:53:43:d3:3f:58:bf:0e:4d:cf: 6c:93:b8:2e:78:f4:13:f0:f9:29:03:90:1c:e8:da:01: 6b:4c:4a:40:70:08:b9:19:22:a0:82:6f:34:75:22:11: 5c:42:b4:c9:8f:58:b7:17:6d:9d:b9:c2:0e:23:dc:da: fe:46:ac:b2:91:60:9b:de:61:25:2e:00:fb:97:6d:06: 82:2b:84:fd:4b:eb:19:1b:cf:29:bf:78:9a:85:36:41: 0f:4c:ef:8f:7e:51:fa:33:c5:cf:83:a4:f0:af:37:1a: c1:89:3c:e4:dd:6a:52:21:76:60:4e:6e:08:c8:15:cd: 91:e0:cd:3e:10:94:f9:20:67:bb:4f:17:1f:fc:7c:78: 40:b3:5f:a5:53:5f:ff:44:d9:e7:75:18:ae:dc:bd:22: 74:b9:f6:25:ef:63:8d:61:4d:b7:40:9d:59:77:b5:4c: 85:e6:05:11:4c:ef:c3:7f:eb:6d:3d:a3:33:95:d7:ce: 21:6f:a1:cf:9c:02:9f:8f:c5:92:28:41:14:c8:1d:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:e7:c7:cf:72:f6:44:fb:1e:a6:46:a4:01:41:4f:bc: 4f:7f:ab:b9:7a:44:1d:b7:36:17:f4:f3:03:3f:8a:cb: 5b:ac:63:35:0c:04:3c:0a:e2:c9:69:a2:c0:ae:b4:79: d5:8e:56:83:59:2e:b4:d5:0f:0b:a6:b1:56:66:13:5f: 69:f8:c4:ed:4b:36:f6:cc:ee:31:39:31:2e:37:1d:8e: 53:7e:8a:11:59:4b:e9:fe:12:69:cc:2b:37:10:02:4b: bb:33:76:d2:e3:29:72:88:3d:a0:ee:ff:3c:52:56:e0: d2:a9:42:59:7a:4f:a8:2c:9a:2e:5c:20:69:bb:21:ae: 1a:c0:c8:43:66:4e:71:ee:58:db:8e:9a:e2:8d:ea:28: 2a:f6:aa:60:81:97:d7:e2:c4:b1:9e:19:a0:ae:22:4e: 23:ab:cc:32:f4:52:56:30:0a:c0:c0:09:1e:fd:3d:c4: ba:1e:9a:ca:94:44:02:6f:f8:54:79:3a:32:d4:5a:8e: 71:b2:eb:dc:81:bd:02:d1:24:bb:7f:5d:aa:c8:26:66: 7a:1c:2b:74:4b:80:8b:d1:c4:e1:e6:43:20:52:47:e9: 29:bb:d0:50:11:12:9e:c8:92:41:4f:0c:ed:65:4f:b8: 2c:c8:dd:8c:e2:17:58:9f:7f:a3:82:6e:57:9f:06:90 Fingerprint (SHA-256): 9B:BD:E4:00:8E:20:30:42:63:ED:53:45:57:C1:17:A7:34:23:AB:C2:AB:3F:3E:BB:19:15:46:EB:94:E7:DD:16 Fingerprint (SHA1): FC:2C:18:97:48:1B:CE:68:F8:2B:D6:D2:AD:6E:CA:10:96:C4:87:23 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #14802: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195752 (0x13bda568) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Mar 31 20:38:11 2017 Not After : Thu Mar 31 20:38:11 2067 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:16:75:03:77:ab:6f:24:04:98:4a:83:63:63:1d:08: 30:83:80:07:70:3d:e8:4e:6c:a4:67:58:af:9d:e9:73: 85:49:7a:6f:9f:01:ad:7a:d6:e1:44:42:30:62:dc:ae: f9:31:fe:3b:a6:6d:bb:31:25:07:5a:4e:5d:f8:b6:eb: fa:3d:e3:b5:c2:e6:55:5f:3d:83:f6:b3:75:ec:f8:b9: 00:6d:0d:72:4b:0f:c1:c2:57:ca:cf:4d:5f:5b:3c:b2: 79:be:9d:46:0d:47:e7:36:aa:3e:5b:eb:96:70:61:69: db:dd:e0:20:35:e5:60:a5:45:8b:97:89:7f:64:45:a9: 0d:5f:8d:86:3b:0e:0e:eb:58:33:ec:30:de:10:01:3c: c9:38:5f:e3:db:75:f1:5c:6e:5a:6b:2c:43:ba:4d:d5: ba:0d:02:a4:99:bb:fb:b3:9d:b0:48:84:78:8d:bd:2c: 39:ba:cd:46:6a:dc:30:f5:6b:68:9d:19:be:d4:63:6b: 54:d7:6a:c7:90:51:ee:12:ef:ef:e4:58:83:cf:0d:52: 1f:bb:c7:26:5f:73:94:3c:f4:93:0a:6e:f7:fb:4d:ba: 26:a8:82:2f:88:7d:fd:25:ea:b5:15:41:4d:3d:5e:9c: 54:76:2a:2b:34:ec:a6:83:72:dd:a1:08:e8:d5:21:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:55:b2:fe:e7:8c:19:0c:c8:60:3b:40:ae:04:9f:1a: b7:62:ac:ae:3c:12:c2:bc:06:69:60:e1:cc:d9:09:42: 5b:fe:5f:37:dd:1f:53:c4:9b:4c:05:e6:71:ed:26:99: 40:83:ed:db:58:93:75:14:5c:21:3d:d0:05:eb:08:13: 23:86:a0:83:b4:2e:24:14:cb:e6:de:8d:15:9b:37:f1: 8c:07:7f:60:35:fb:a3:09:c1:e3:a6:9e:a0:56:bf:93: b4:ce:8f:8b:d6:90:bb:76:46:58:8b:19:d0:76:72:ef: 35:e8:f8:c8:0f:ee:37:ec:82:6d:8d:f9:d5:94:de:16: 62:56:d3:fa:08:6d:27:d6:c3:17:57:61:11:cc:80:5c: 3a:0b:cd:c0:2c:86:81:7a:94:ed:dd:14:1c:9e:88:64: 56:ae:d2:79:49:34:26:37:01:a4:b7:7b:27:27:0a:8a: 52:93:b0:7f:96:73:09:35:0c:9a:ee:61:10:65:e8:18: 6a:28:c6:73:fa:ee:40:f1:d1:9b:11:41:8d:ba:05:0e: 2a:b6:39:0d:5c:ac:30:50:e8:ba:af:d7:76:66:cb:ea: fc:37:3f:b2:19:b2:78:f7:f9:f7:33:a7:26:a6:db:1f: 0a:e6:7c:ca:47:5a:d6:bb:d8:f2:eb:a2:2e:1b:3b:71 Fingerprint (SHA-256): 8B:B1:4F:A2:A9:6E:F5:34:F3:7A:ED:05:2F:C6:5F:66:85:03:80:6F:1A:56:B2:5C:AC:FA:B3:E7:B7:99:37:93 Fingerprint (SHA1): BF:C2:F3:C7:B9:B1:23:94:63:8D:36:0B:83:A7:1F:A7:D8:4D:48:85 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #14803: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195753 (0x13bda569) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Mar 31 20:38:24 2017 Not After : Thu Mar 31 20:38:24 2067 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:a3:4f:f2:ac:10:f8:58:5c:bf:12:a9:d7:fc:1c:bc: 11:05:f4:30:6b:8e:7d:64:39:24:1b:9b:83:92:78:9f: 05:65:52:08:34:bf:f3:70:f5:d7:7d:a3:13:e7:4f:fa: 41:92:99:13:4f:9e:02:a3:43:c9:fa:5e:d9:5a:0c:bb: c7:67:95:ff:4b:d8:00:1f:a9:33:73:e9:53:b4:0b:7e: d7:f5:72:c7:fa:0f:c9:fc:44:29:0f:88:aa:5c:96:bd: ee:17:a4:29:4f:99:69:d3:49:3a:38:e3:67:d7:49:44: d2:87:90:2a:98:ab:81:79:ee:01:fe:53:50:e5:a1:2e: cb:3d:0d:ec:39:08:0d:51:51:0e:31:f0:bc:10:46:ef: 6f:b8:ba:15:8e:6c:d5:52:bd:9b:f2:96:34:a0:7b:3b: ff:40:8d:e6:88:2f:7c:65:59:76:a7:e0:a5:b9:9e:b7: c3:a2:dd:c3:20:4b:0c:ec:0a:17:c7:f0:a7:ef:f6:cd: 41:63:40:15:61:76:b7:73:78:ee:9e:1c:57:75:87:a7: 85:b8:cf:a4:74:57:de:bc:a2:d1:b6:63:c3:31:d2:04: 28:29:38:06:69:7a:81:37:0d:1a:b3:70:fa:23:96:d8: 53:7b:83:07:a9:74:c2:a1:ce:d9:6c:97:53:49:4d:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:cc:33:15:cf:d9:7c:a2:18:dc:6c:57:12:dd:6f:db: 33:a9:15:8a:0b:72:45:f6:9d:29:17:9d:15:2e:30:0c: 50:6b:94:4a:9a:38:d6:d6:22:a8:f0:8a:26:73:aa:8e: 98:82:2e:67:b8:45:5b:1d:99:9e:a2:47:61:84:8b:07: ba:0f:23:25:d5:7e:71:d9:33:0e:37:57:de:b1:32:51: 3c:e0:e1:ba:e2:41:57:66:d3:1e:53:59:3e:95:92:3a: 4b:ff:f3:b1:0d:2e:9b:32:f4:67:f5:cf:65:c8:6c:97: 24:72:88:32:7f:fc:01:88:f1:2b:da:a6:6f:8f:74:fa: bc:38:40:2b:0c:1f:7e:e2:4f:29:c1:5c:cc:67:ce:2d: 54:af:97:b9:4a:ff:a1:7c:4c:cf:76:26:9a:e8:c6:2c: 7f:34:69:4a:c7:a0:02:5a:6f:ca:54:57:5d:c2:5d:20: f9:ff:f7:52:67:23:b6:e6:8c:f6:92:40:20:76:9c:81: 68:f4:50:21:5c:d9:d0:e4:df:ce:09:9f:1e:55:a5:d4: c1:84:aa:04:99:89:a7:43:3c:de:5a:68:cb:e6:55:84: 19:94:a4:7a:37:e2:7e:93:df:f8:e7:3a:d7:4c:46:96: c7:e2:fe:2d:8e:27:93:31:8c:a9:e4:44:0e:b4:a5:9f Fingerprint (SHA-256): 11:E8:E4:09:C4:9F:48:3F:FE:D0:B0:0A:6E:72:C8:83:73:85:A1:0C:22:C8:90:19:79:A9:FE:B2:0F:C0:19:88 Fingerprint (SHA1): CD:C3:D1:5A:77:61:71:0B:ED:0A:BB:82:E5:F9:77:4C:41:65:31:B9 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #14804: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195754 (0x13bda56a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Mar 31 20:38:37 2017 Not After : Thu Mar 31 20:38:37 2067 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:db:ff:a4:c0:cf:37:ae:b5:d9:53:e4:e3:7e:03:c6: cf:1c:ac:81:4e:4c:cc:6c:bd:81:0a:e5:2b:f8:87:45: a7:81:82:a0:fc:75:36:bc:94:e6:a3:30:b9:7c:2c:d2: 36:68:25:ae:e4:2b:4b:53:6f:a2:bd:41:71:2f:df:95: 28:43:ec:92:56:68:4c:7e:a3:65:30:48:0a:90:c6:0a: 0c:8a:2f:3e:e8:01:72:58:1c:62:c1:81:37:95:60:49: 2a:f3:2f:fa:82:db:d6:3b:97:b6:c3:2e:07:73:c7:62: fd:6a:e0:af:fa:a9:89:58:cf:cf:d7:4f:ac:11:e9:0b: 5f:6e:2f:ba:43:e7:1a:df:f9:7b:13:13:fd:cd:ec:5f: be:63:13:42:e9:89:8c:98:23:b6:f7:f2:0f:ca:a4:d1: b5:4c:68:e0:da:8b:f9:a4:54:0f:d5:12:1f:03:0e:82: a2:11:49:f3:d0:df:57:b9:f9:78:d8:9b:25:87:8f:f2: 83:04:bb:82:a9:48:a7:29:1c:0f:9a:28:96:93:73:8e: 4a:d3:e3:69:f2:97:17:f9:58:2a:58:c7:94:65:d9:a4: ad:84:46:5e:b0:15:ef:23:70:af:17:b6:0b:0a:31:a6: 68:e9:9f:c1:ab:33:d1:e4:26:eb:60:df:c4:bc:59:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:b6:52:80:fe:01:49:6d:a6:9e:ee:6a:9f:82:ea:19: 89:7e:de:ce:aa:f8:fb:41:73:af:ef:8f:ff:af:79:2c: 09:c4:92:49:40:f7:3c:7d:b6:b1:17:53:0d:cb:39:d9: 2f:e9:8f:07:55:b5:2c:ff:1f:40:27:bd:1f:2b:c3:1c: 51:9f:16:65:f3:1e:e1:b4:f6:57:a5:b5:40:46:11:74: d1:61:c0:f9:13:3e:94:48:dc:3c:ee:34:6d:c9:92:e0: 58:f8:a1:09:2e:7c:2d:dd:f8:42:e5:bd:19:fc:9d:43: 6e:d0:fa:43:13:74:f0:5c:5e:de:c2:25:8a:6a:fa:20: 56:a8:da:14:36:16:7d:7c:e0:f6:78:0b:76:bc:7a:dc: 26:66:2a:f5:ed:69:de:0c:d2:9c:06:d3:29:53:1f:10: d2:cd:75:b6:86:41:d5:35:7d:d0:80:01:cb:40:9e:92: 39:98:66:20:ca:1c:f0:e8:6d:6b:55:2f:b0:8d:f5:48: de:8b:df:44:1d:06:c8:1e:64:96:85:6e:5b:24:1e:11: 2d:0c:3f:0a:6e:9b:10:44:5b:8e:ae:f0:01:d0:2c:4b: 4f:fe:ef:43:24:42:b0:6e:0a:bd:e7:40:38:4c:5e:89: de:3b:5a:08:5f:b4:e5:f4:0a:d1:ff:df:63:8b:b3:7f Fingerprint (SHA-256): 1F:0A:BD:BC:22:CC:20:73:4B:E8:55:82:9B:35:60:46:CF:D5:E5:D5:CA:3A:94:65:52:D4:B2:E5:B6:6D:76:93 Fingerprint (SHA1): 58:05:FB:53:E8:C9:07:E3:E1:58:3E:3D:C5:C6:7B:B0:62:EB:6E:C3 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #14805: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14806: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195769 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14807: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14808: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14809: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14810: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331195770 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14811: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14812: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14813: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14814: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331195771 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14815: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14816: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #14817: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14818: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 331195772 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14819: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14820: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14821: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195769 (0x13bda579) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:40:29 2017 Not After : Thu Mar 31 20:40:29 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:91:8b:c7:e1:48:70:6f:6f:ab:2f:79:7c:ed:bf:e2: 58:b2:52:eb:05:f7:f1:2c:a2:53:e3:b8:a0:fb:ab:3a: 60:fa:a8:b2:c2:b1:e8:82:2b:1f:e9:fb:74:ce:88:ab: 8e:7d:4d:99:f7:2b:7d:c4:12:6a:6f:df:50:cc:75:8a: 83:e1:ea:8f:66:7c:74:a7:a2:80:db:35:9c:ce:1a:ed: 1d:68:39:30:e8:7d:0d:2d:5b:8b:e8:2e:07:81:9a:ed: f7:c2:42:ac:66:94:bf:fc:5c:7e:9b:63:30:40:7f:45: 07:b5:36:1e:74:61:d5:e3:99:c7:1f:99:32:2c:86:ee: dd:af:9a:74:2b:b4:82:52:6f:e2:eb:96:5f:12:d1:8c: be:cb:d5:e4:8d:6d:aa:cf:7d:c4:63:ff:6c:10:98:b0: a8:28:c0:57:4c:8b:8a:b7:5a:e9:f3:73:3e:db:d0:3b: 05:d7:4d:35:8e:c7:2d:9c:32:31:88:24:62:8a:90:e1: 2e:13:4e:af:1f:6f:11:2b:dd:54:85:e3:b2:ca:e7:e4: d1:a2:8f:87:bb:d0:27:3f:a3:ab:92:24:27:90:6d:b8: 0f:73:30:4f:c1:b8:79:46:ac:4b:7f:42:64:3f:8f:49: 40:74:b9:44:90:b7:87:2a:fd:53:77:84:54:80:47:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:77:75:6a:ca:da:81:db:81:75:68:af:93:2a:d8:2b: 16:5c:88:d4:0a:90:37:0b:18:8e:5f:3c:24:94:b7:43: 14:48:f3:58:23:4a:68:2c:ab:b5:35:83:23:ca:28:65: 5b:9e:3a:3d:29:39:ed:52:68:15:8e:2d:0f:a6:58:5a: e5:2d:df:a6:42:ec:3b:bb:a5:77:f4:69:82:20:55:67: df:ce:40:13:49:9a:61:0c:53:30:b7:e8:ee:ce:1b:9c: fa:9c:30:75:21:22:2b:e4:ea:d4:6a:2f:21:82:5c:cc: 1c:7a:c1:cb:23:29:80:a2:ae:82:a1:36:11:af:d5:f9: 2b:a3:7d:f8:62:43:9a:98:8c:28:9f:23:d2:9c:86:30: db:6e:4d:ec:31:5d:38:3b:1e:80:5b:5b:5e:c7:d3:5d: 17:ee:8a:31:e4:90:6c:41:4b:fb:47:c6:3c:2a:48:f0: d0:43:f6:0f:5c:b6:bf:67:4f:27:5e:56:3c:1b:20:40: ff:71:c3:a2:49:72:9e:9b:9c:d9:80:44:52:26:d5:8a: 9d:ba:d9:5e:90:c5:af:f4:8d:6e:22:0e:5c:2e:8a:1b: 53:96:90:7c:26:75:e2:be:66:e8:c8:2d:e0:a9:e0:38: a4:1b:61:be:f2:54:e6:ff:5d:92:61:1a:88:89:92:bb Fingerprint (SHA-256): 1D:1E:30:01:B0:5E:02:72:99:CC:0E:96:F3:40:B1:20:32:95:B8:0E:02:1C:83:87:4D:DE:C2:37:C4:49:5E:CF Fingerprint (SHA1): D0:56:71:EA:10:65:BE:1B:DC:62:FB:51:DF:82:4F:84:12:8F:F2:B9 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14822: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14823: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195770 (0x13bda57a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:40:43 2017 Not After : Thu Mar 31 20:40:43 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:ed:20:cb:b8:7d:e2:15:3d:3c:42:ac:af:b5:b2:b9: 0f:42:61:8b:6a:15:80:21:76:11:47:76:45:82:e3:48: 4f:8d:78:61:52:7e:26:d2:c7:39:a6:b3:e1:4f:c0:ed: dd:f4:d0:72:65:2e:6e:26:e7:61:dc:ea:bb:c8:43:5d: 95:b8:39:c1:20:55:ba:a2:bd:fd:52:ea:f7:c9:01:d7: 04:bd:90:47:12:84:52:ad:15:63:b6:0c:e6:21:48:5f: ef:b3:52:aa:2d:81:1b:69:6b:90:16:e4:7e:c0:20:a0: 26:89:8e:52:d7:c4:46:7b:aa:fc:e2:8c:89:52:2f:18: 9d:a0:d8:6d:cc:27:7d:33:0e:d6:60:98:30:e7:57:86: a7:07:eb:87:bf:8e:34:55:47:da:5d:a3:83:a1:b2:99: cd:93:c8:8d:e4:6d:08:3d:ed:39:27:ff:e8:45:a7:20: 21:cd:8c:c0:97:b2:0d:1a:7c:cc:f7:96:44:da:4d:02: 3c:9a:33:72:30:e7:75:28:98:38:7e:f3:35:81:f1:05: 38:dc:2f:69:50:b2:a8:19:5a:05:0e:ab:96:e1:b7:64: c1:0a:f4:1b:8a:cd:4d:7c:5a:1e:f4:25:0c:49:32:c5: 0e:bd:57:d4:84:79:1f:8a:2a:3e:44:b8:a3:21:80:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:0b:b4:cf:50:2a:d6:f1:9c:bd:93:92:f0:da:f4:16: 1a:36:fd:35:46:67:f5:05:b3:ff:66:5b:c6:5d:bb:bb: c9:90:bd:a4:81:fe:c1:f5:3b:6c:d5:7f:ff:d0:4b:b2: 6e:33:95:b5:fc:3b:bb:d0:d1:28:5a:a0:fa:82:ab:a1: 9e:fc:f7:22:4c:dc:c2:7c:d5:4d:ed:5d:ca:3b:7d:b8: ed:8d:06:41:0d:83:1e:0a:69:7e:3f:ea:dc:01:f4:a7: d8:af:25:2d:ee:bc:1c:d5:33:bb:0c:57:eb:af:47:72: fa:7e:27:34:ce:ff:e9:aa:c4:94:11:52:c7:5c:75:16: aa:de:f6:0c:08:80:47:ac:96:30:87:12:03:b4:cb:7b: 09:b1:33:93:7e:85:a3:b1:99:5c:72:be:45:cd:85:4a: ff:68:fb:bc:cf:76:38:da:93:81:d5:74:44:aa:ea:66: a5:0c:27:3e:80:9b:2c:99:f3:c5:a0:95:0c:a6:e7:9e: 9a:04:bf:e3:4c:b9:aa:c9:5d:da:23:0c:ba:bb:0f:0f: 9e:96:3d:bc:5b:0e:9c:3d:08:08:6e:5e:05:73:c0:75: 82:33:4e:9d:60:21:47:40:70:93:28:10:1b:8c:60:c3: 96:85:ca:dd:c0:ad:de:29:6a:93:fb:0d:23:b1:da:74 Fingerprint (SHA-256): CF:AF:28:BD:DF:98:72:46:DD:9A:2C:D2:C5:D8:3C:F8:83:91:47:13:8A:DD:76:72:9A:F4:B7:86:72:F9:6A:80 Fingerprint (SHA1): A4:C8:30:53:4E:BD:05:67:3C:17:0F:09:3B:BD:D3:B2:C7:54:E5:D4 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14824: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14825: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195771 (0x13bda57b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 20:40:49 2017 Not After : Thu Mar 31 20:40:49 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:29:85:d9:62:78:0b:7f:e8:e4:3c:b2:70:ed:e1:a7: 78:68:b4:9b:d8:71:31:61:07:56:ad:c0:ce:e4:a0:91: fc:0c:be:81:05:78:96:cd:42:b3:c5:40:bc:87:98:23: e0:ac:8b:f5:e1:6b:ef:4d:76:3f:e5:5e:7a:3c:75:30: 25:03:37:fa:2f:2d:3f:24:1b:d8:ea:c6:1b:0f:55:a5: c9:eb:74:a8:6d:82:26:7b:17:16:a4:29:8f:07:5e:8d: 76:ee:d7:75:1d:b8:1f:ba:48:19:83:e9:56:55:2c:4c: c0:62:fc:63:1b:00:d7:d0:54:4e:d3:57:41:d7:f2:27: c3:0c:7f:5b:f3:51:78:82:cf:50:d2:e2:2a:fd:1a:2b: d4:84:e8:13:eb:7a:00:e4:8f:7d:1f:b3:ab:8e:d9:1a: 90:01:01:d7:04:b6:3a:fd:a2:fb:6e:17:06:78:ac:43: 4e:fc:a7:38:ad:08:0b:f2:b9:c0:f5:7a:37:69:09:5a: c2:95:94:c5:2d:6d:4d:7f:85:75:ce:34:ef:89:ee:cc: ec:7a:c7:30:99:b9:3e:ae:01:f7:e6:4a:93:a9:de:62: 41:00:ca:83:25:4e:15:c6:d0:55:eb:1f:fc:cc:6e:af: d3:b7:99:6f:3a:c1:65:17:dc:c8:3e:96:29:69:90:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:92:2a:c5:71:c3:51:da:63:b5:57:49:0a:56:e3:3c: 3a:d3:d8:36:17:a5:1c:2c:a9:10:58:11:e3:c1:46:c6: ee:b5:4c:53:88:6c:69:53:8e:95:9a:41:72:d1:f9:f4: 86:92:58:1e:25:49:4c:04:57:49:5e:e2:85:f8:d6:97: a8:37:95:3a:43:e1:1d:ed:c9:85:f4:91:52:ba:c8:a8: 7a:06:61:40:94:0d:dd:77:98:e7:77:f5:f1:dc:19:53: 83:07:6d:1f:45:15:a8:21:7f:96:03:35:ff:80:b7:23: b9:f5:c1:16:3b:a2:cb:6a:e6:c8:91:46:4a:5d:fe:ce: 49:b2:f2:16:35:24:e0:f0:f8:73:3b:fb:9c:75:85:a3: 9a:28:4d:e2:28:3d:12:d2:22:af:2a:7f:21:14:c7:a3: 7e:e8:85:58:19:ea:65:26:e7:83:5f:d8:7e:ec:66:72: 0a:d1:59:e9:98:b2:b6:6e:ba:d4:35:80:89:29:8b:81: 47:5a:12:18:d7:9b:a5:aa:0e:8b:6b:6c:3b:54:27:54: 6f:3b:de:98:91:1f:a7:60:d0:5a:d4:28:d8:8d:f3:84: 3b:c8:bc:15:95:05:88:b9:80:8d:ae:34:14:66:6f:e0: f9:4b:d6:a8:e3:62:fd:93:24:f9:41:ea:d5:d4:0a:41 Fingerprint (SHA-256): A9:06:C4:45:13:B7:AC:2D:15:85:61:BA:E9:01:9E:57:3A:0F:0F:96:68:9A:47:53:56:3D:8F:12:0F:62:B8:76 Fingerprint (SHA1): 3C:7F:BC:8B:25:13:A9:ED:3A:A4:62:44:7A:9D:2C:9F:7C:72:D5:C6 Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #14826: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14827: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #14828: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #14829: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #14830: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195769 (0x13bda579) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:40:29 2017 Not After : Thu Mar 31 20:40:29 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:91:8b:c7:e1:48:70:6f:6f:ab:2f:79:7c:ed:bf:e2: 58:b2:52:eb:05:f7:f1:2c:a2:53:e3:b8:a0:fb:ab:3a: 60:fa:a8:b2:c2:b1:e8:82:2b:1f:e9:fb:74:ce:88:ab: 8e:7d:4d:99:f7:2b:7d:c4:12:6a:6f:df:50:cc:75:8a: 83:e1:ea:8f:66:7c:74:a7:a2:80:db:35:9c:ce:1a:ed: 1d:68:39:30:e8:7d:0d:2d:5b:8b:e8:2e:07:81:9a:ed: f7:c2:42:ac:66:94:bf:fc:5c:7e:9b:63:30:40:7f:45: 07:b5:36:1e:74:61:d5:e3:99:c7:1f:99:32:2c:86:ee: dd:af:9a:74:2b:b4:82:52:6f:e2:eb:96:5f:12:d1:8c: be:cb:d5:e4:8d:6d:aa:cf:7d:c4:63:ff:6c:10:98:b0: a8:28:c0:57:4c:8b:8a:b7:5a:e9:f3:73:3e:db:d0:3b: 05:d7:4d:35:8e:c7:2d:9c:32:31:88:24:62:8a:90:e1: 2e:13:4e:af:1f:6f:11:2b:dd:54:85:e3:b2:ca:e7:e4: d1:a2:8f:87:bb:d0:27:3f:a3:ab:92:24:27:90:6d:b8: 0f:73:30:4f:c1:b8:79:46:ac:4b:7f:42:64:3f:8f:49: 40:74:b9:44:90:b7:87:2a:fd:53:77:84:54:80:47:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:77:75:6a:ca:da:81:db:81:75:68:af:93:2a:d8:2b: 16:5c:88:d4:0a:90:37:0b:18:8e:5f:3c:24:94:b7:43: 14:48:f3:58:23:4a:68:2c:ab:b5:35:83:23:ca:28:65: 5b:9e:3a:3d:29:39:ed:52:68:15:8e:2d:0f:a6:58:5a: e5:2d:df:a6:42:ec:3b:bb:a5:77:f4:69:82:20:55:67: df:ce:40:13:49:9a:61:0c:53:30:b7:e8:ee:ce:1b:9c: fa:9c:30:75:21:22:2b:e4:ea:d4:6a:2f:21:82:5c:cc: 1c:7a:c1:cb:23:29:80:a2:ae:82:a1:36:11:af:d5:f9: 2b:a3:7d:f8:62:43:9a:98:8c:28:9f:23:d2:9c:86:30: db:6e:4d:ec:31:5d:38:3b:1e:80:5b:5b:5e:c7:d3:5d: 17:ee:8a:31:e4:90:6c:41:4b:fb:47:c6:3c:2a:48:f0: d0:43:f6:0f:5c:b6:bf:67:4f:27:5e:56:3c:1b:20:40: ff:71:c3:a2:49:72:9e:9b:9c:d9:80:44:52:26:d5:8a: 9d:ba:d9:5e:90:c5:af:f4:8d:6e:22:0e:5c:2e:8a:1b: 53:96:90:7c:26:75:e2:be:66:e8:c8:2d:e0:a9:e0:38: a4:1b:61:be:f2:54:e6:ff:5d:92:61:1a:88:89:92:bb Fingerprint (SHA-256): 1D:1E:30:01:B0:5E:02:72:99:CC:0E:96:F3:40:B1:20:32:95:B8:0E:02:1C:83:87:4D:DE:C2:37:C4:49:5E:CF Fingerprint (SHA1): D0:56:71:EA:10:65:BE:1B:DC:62:FB:51:DF:82:4F:84:12:8F:F2:B9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14831: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14832: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195770 (0x13bda57a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:40:43 2017 Not After : Thu Mar 31 20:40:43 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:ed:20:cb:b8:7d:e2:15:3d:3c:42:ac:af:b5:b2:b9: 0f:42:61:8b:6a:15:80:21:76:11:47:76:45:82:e3:48: 4f:8d:78:61:52:7e:26:d2:c7:39:a6:b3:e1:4f:c0:ed: dd:f4:d0:72:65:2e:6e:26:e7:61:dc:ea:bb:c8:43:5d: 95:b8:39:c1:20:55:ba:a2:bd:fd:52:ea:f7:c9:01:d7: 04:bd:90:47:12:84:52:ad:15:63:b6:0c:e6:21:48:5f: ef:b3:52:aa:2d:81:1b:69:6b:90:16:e4:7e:c0:20:a0: 26:89:8e:52:d7:c4:46:7b:aa:fc:e2:8c:89:52:2f:18: 9d:a0:d8:6d:cc:27:7d:33:0e:d6:60:98:30:e7:57:86: a7:07:eb:87:bf:8e:34:55:47:da:5d:a3:83:a1:b2:99: cd:93:c8:8d:e4:6d:08:3d:ed:39:27:ff:e8:45:a7:20: 21:cd:8c:c0:97:b2:0d:1a:7c:cc:f7:96:44:da:4d:02: 3c:9a:33:72:30:e7:75:28:98:38:7e:f3:35:81:f1:05: 38:dc:2f:69:50:b2:a8:19:5a:05:0e:ab:96:e1:b7:64: c1:0a:f4:1b:8a:cd:4d:7c:5a:1e:f4:25:0c:49:32:c5: 0e:bd:57:d4:84:79:1f:8a:2a:3e:44:b8:a3:21:80:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:0b:b4:cf:50:2a:d6:f1:9c:bd:93:92:f0:da:f4:16: 1a:36:fd:35:46:67:f5:05:b3:ff:66:5b:c6:5d:bb:bb: c9:90:bd:a4:81:fe:c1:f5:3b:6c:d5:7f:ff:d0:4b:b2: 6e:33:95:b5:fc:3b:bb:d0:d1:28:5a:a0:fa:82:ab:a1: 9e:fc:f7:22:4c:dc:c2:7c:d5:4d:ed:5d:ca:3b:7d:b8: ed:8d:06:41:0d:83:1e:0a:69:7e:3f:ea:dc:01:f4:a7: d8:af:25:2d:ee:bc:1c:d5:33:bb:0c:57:eb:af:47:72: fa:7e:27:34:ce:ff:e9:aa:c4:94:11:52:c7:5c:75:16: aa:de:f6:0c:08:80:47:ac:96:30:87:12:03:b4:cb:7b: 09:b1:33:93:7e:85:a3:b1:99:5c:72:be:45:cd:85:4a: ff:68:fb:bc:cf:76:38:da:93:81:d5:74:44:aa:ea:66: a5:0c:27:3e:80:9b:2c:99:f3:c5:a0:95:0c:a6:e7:9e: 9a:04:bf:e3:4c:b9:aa:c9:5d:da:23:0c:ba:bb:0f:0f: 9e:96:3d:bc:5b:0e:9c:3d:08:08:6e:5e:05:73:c0:75: 82:33:4e:9d:60:21:47:40:70:93:28:10:1b:8c:60:c3: 96:85:ca:dd:c0:ad:de:29:6a:93:fb:0d:23:b1:da:74 Fingerprint (SHA-256): CF:AF:28:BD:DF:98:72:46:DD:9A:2C:D2:C5:D8:3C:F8:83:91:47:13:8A:DD:76:72:9A:F4:B7:86:72:F9:6A:80 Fingerprint (SHA1): A4:C8:30:53:4E:BD:05:67:3C:17:0F:09:3B:BD:D3:B2:C7:54:E5:D4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14833: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14834: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195771 (0x13bda57b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 20:40:49 2017 Not After : Thu Mar 31 20:40:49 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:29:85:d9:62:78:0b:7f:e8:e4:3c:b2:70:ed:e1:a7: 78:68:b4:9b:d8:71:31:61:07:56:ad:c0:ce:e4:a0:91: fc:0c:be:81:05:78:96:cd:42:b3:c5:40:bc:87:98:23: e0:ac:8b:f5:e1:6b:ef:4d:76:3f:e5:5e:7a:3c:75:30: 25:03:37:fa:2f:2d:3f:24:1b:d8:ea:c6:1b:0f:55:a5: c9:eb:74:a8:6d:82:26:7b:17:16:a4:29:8f:07:5e:8d: 76:ee:d7:75:1d:b8:1f:ba:48:19:83:e9:56:55:2c:4c: c0:62:fc:63:1b:00:d7:d0:54:4e:d3:57:41:d7:f2:27: c3:0c:7f:5b:f3:51:78:82:cf:50:d2:e2:2a:fd:1a:2b: d4:84:e8:13:eb:7a:00:e4:8f:7d:1f:b3:ab:8e:d9:1a: 90:01:01:d7:04:b6:3a:fd:a2:fb:6e:17:06:78:ac:43: 4e:fc:a7:38:ad:08:0b:f2:b9:c0:f5:7a:37:69:09:5a: c2:95:94:c5:2d:6d:4d:7f:85:75:ce:34:ef:89:ee:cc: ec:7a:c7:30:99:b9:3e:ae:01:f7:e6:4a:93:a9:de:62: 41:00:ca:83:25:4e:15:c6:d0:55:eb:1f:fc:cc:6e:af: d3:b7:99:6f:3a:c1:65:17:dc:c8:3e:96:29:69:90:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:92:2a:c5:71:c3:51:da:63:b5:57:49:0a:56:e3:3c: 3a:d3:d8:36:17:a5:1c:2c:a9:10:58:11:e3:c1:46:c6: ee:b5:4c:53:88:6c:69:53:8e:95:9a:41:72:d1:f9:f4: 86:92:58:1e:25:49:4c:04:57:49:5e:e2:85:f8:d6:97: a8:37:95:3a:43:e1:1d:ed:c9:85:f4:91:52:ba:c8:a8: 7a:06:61:40:94:0d:dd:77:98:e7:77:f5:f1:dc:19:53: 83:07:6d:1f:45:15:a8:21:7f:96:03:35:ff:80:b7:23: b9:f5:c1:16:3b:a2:cb:6a:e6:c8:91:46:4a:5d:fe:ce: 49:b2:f2:16:35:24:e0:f0:f8:73:3b:fb:9c:75:85:a3: 9a:28:4d:e2:28:3d:12:d2:22:af:2a:7f:21:14:c7:a3: 7e:e8:85:58:19:ea:65:26:e7:83:5f:d8:7e:ec:66:72: 0a:d1:59:e9:98:b2:b6:6e:ba:d4:35:80:89:29:8b:81: 47:5a:12:18:d7:9b:a5:aa:0e:8b:6b:6c:3b:54:27:54: 6f:3b:de:98:91:1f:a7:60:d0:5a:d4:28:d8:8d:f3:84: 3b:c8:bc:15:95:05:88:b9:80:8d:ae:34:14:66:6f:e0: f9:4b:d6:a8:e3:62:fd:93:24:f9:41:ea:d5:d4:0a:41 Fingerprint (SHA-256): A9:06:C4:45:13:B7:AC:2D:15:85:61:BA:E9:01:9E:57:3A:0F:0F:96:68:9A:47:53:56:3D:8F:12:0F:62:B8:76 Fingerprint (SHA1): 3C:7F:BC:8B:25:13:A9:ED:3A:A4:62:44:7A:9D:2C:9F:7C:72:D5:C6 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #14835: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14836: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #14837: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195773 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14838: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #14839: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14840: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14841: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331195774 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14842: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14843: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14844: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14845: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331195775 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14846: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14847: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #14848: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14849: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 331195776 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14850: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14851: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #14852: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14853: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 331195777 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14854: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14855: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14856: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195773 (0x13bda57d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:41:22 2017 Not After : Thu Mar 31 20:41:22 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:36:dc:20:57:27:ce:be:a3:df:25:a5:a3:87:30:78: fe:86:4c:b7:95:18:9c:12:8a:d5:d1:75:95:5e:59:dd: d3:f5:0a:43:64:8e:44:af:9b:65:3a:b1:ef:80:8f:63: fa:26:b3:d2:e6:57:71:4f:81:93:12:85:74:31:0c:86: 43:8b:9d:99:9e:c2:1f:d5:7b:27:bb:46:6b:7c:02:58: 81:f8:34:3b:1b:c6:fe:2e:e0:c5:f7:8b:e8:04:2d:25: 89:84:cf:5d:9d:cd:cb:eb:11:12:43:0c:b2:4c:80:36: e9:17:50:16:08:a2:97:63:5b:26:65:60:45:69:5d:26: 76:ef:1e:d6:00:5e:35:bd:dd:5c:c4:8f:0c:c4:1f:c3: 81:71:18:82:fb:6c:25:09:18:33:cb:14:c9:27:c9:1a: 69:5d:2d:ce:1b:64:27:29:59:5c:51:57:77:e2:a9:10: 51:6e:f4:26:a8:53:6b:4d:e4:67:4f:dc:a3:f5:1d:76: 8c:09:78:ee:0e:f6:d9:50:ad:06:52:6a:05:93:9f:f7: 2c:33:7a:98:9b:01:a7:df:c1:ff:ef:35:2a:57:e8:90: 25:95:9c:c1:dc:d1:1c:39:ac:de:86:dd:52:c8:f0:53: 8f:e2:c3:f1:38:c4:33:a8:9d:cd:83:36:f2:3c:bd:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:18:e0:c9:50:74:25:ea:73:e9:2c:59:f8:d7:f8:4a: a3:d7:ba:b8:d0:de:3a:ec:3f:f5:94:ee:f6:82:20:ba: a6:84:0b:b3:13:28:aa:ca:8b:25:2f:39:39:97:03:40: 4f:6b:e3:b7:93:2f:5e:e1:6e:8a:08:38:04:d5:82:3f: db:67:78:d2:f7:e8:ba:25:eb:16:0e:ad:31:c2:c8:7a: 16:29:5f:e4:5c:c6:64:73:db:95:6a:06:46:f8:db:45: 55:fc:72:7c:8a:cb:e3:b3:ff:62:02:dd:9f:3b:3e:80: 34:2e:e4:71:2c:7f:ea:c0:80:f3:57:af:ee:97:71:1a: 7a:85:27:72:38:1c:e6:56:b6:82:6d:4c:b6:56:6d:19: 6c:84:8a:b6:6f:bb:fc:b7:c2:ef:07:43:c0:b0:73:49: c4:ec:d8:49:00:92:51:89:7a:85:d0:10:a4:4f:e4:6c: 0b:fa:e1:a7:a8:f6:73:64:21:39:c3:6c:a5:33:d1:34: aa:e8:a1:18:fb:a0:59:59:15:98:d6:92:8c:6d:d2:30: ba:b6:d1:34:37:be:01:9b:b6:07:8d:4d:cf:a8:5e:05: 7a:25:4d:93:11:bf:cf:b8:a6:98:04:ee:6d:3d:1a:3b: e5:34:b3:56:2b:1e:50:ff:d5:89:6b:77:e1:64:33:f7 Fingerprint (SHA-256): 2F:49:41:01:A2:18:11:ED:03:8D:C7:C7:A7:3D:5F:CE:67:EE:85:1F:A5:E2:DA:D7:A6:66:C1:54:9E:08:A4:C6 Fingerprint (SHA1): FE:B8:BD:56:10:24:4F:E3:44:2A:AB:D3:3A:AE:47:71:5D:A2:54:AC Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14857: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14858: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195774 (0x13bda57e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:41:33 2017 Not After : Thu Mar 31 20:41:33 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:4b:61:a2:b9:64:4b:39:6c:7f:ca:72:18:80:ac:c5: 46:bb:7a:62:2e:3f:9a:f9:a2:f1:8a:de:f7:45:3d:b8: 40:c5:ff:f3:7f:4a:40:19:37:ab:ae:68:b2:31:cb:f9: 81:de:77:cc:ea:90:44:44:b5:a2:e8:6d:7c:33:87:35: 53:22:2c:2a:d1:5a:30:d9:85:a8:3f:56:a6:eb:b3:0c: f6:20:c6:58:80:ba:00:62:ad:cd:c7:0c:b0:7e:3b:1b: aa:fc:35:df:48:7d:e4:7b:8a:a0:3d:28:c8:b2:d9:c5: 84:4a:87:04:b6:ce:18:1c:6d:1c:12:a0:68:ff:e4:fc: 18:1b:3e:b0:14:73:cb:91:26:ef:5d:f5:e4:3b:c0:98: e3:80:cf:3d:4a:74:43:ce:22:4e:c1:10:17:82:df:48: a1:09:c3:95:97:d1:25:21:56:35:67:92:e7:18:d2:a8: 0f:cc:a7:53:da:74:a5:cb:16:5f:54:08:ab:75:ab:71: bd:9b:e8:9e:e5:56:54:5e:2b:44:86:80:65:29:9b:a8: 87:12:b2:aa:41:4d:4c:26:08:70:18:ae:4a:12:f7:ed: 64:62:ed:1b:ea:d6:b5:5d:11:54:1e:dd:b8:e8:ca:24: ed:3b:59:5d:3c:56:cf:04:6e:04:29:90:5e:c1:1e:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:68:e2:49:38:f7:8a:92:54:9a:ca:be:4e:6c:95:5d: 2e:64:82:19:7d:48:c9:5a:44:9d:be:f1:65:f9:9a:a9: 76:dd:9b:44:df:9f:85:9a:1c:c7:f7:cb:a2:2a:58:e7: cf:d7:1a:35:a9:82:91:57:5f:5d:e8:a6:9c:d3:b5:6a: d9:ed:b0:3f:00:f6:68:8a:2d:30:ed:61:68:97:24:fd: 48:2b:eb:f9:8e:5c:0e:c2:8d:ca:ab:c6:0f:6b:2a:47: 1e:0c:bf:6b:be:26:c7:97:62:3f:b7:9a:32:39:81:70: 46:e6:4d:d5:30:3d:20:7b:ce:e4:4c:78:7e:91:df:bf: 64:b7:37:11:e5:dd:38:71:a7:76:c4:3a:83:a7:1d:fc: 45:39:72:af:a3:0b:3c:3c:b0:22:57:10:e3:5c:9a:3c: da:e2:25:82:42:b5:61:b4:b4:bc:ad:a1:ec:2e:fb:ab: 6b:35:04:c8:f7:39:10:21:05:d6:32:d4:b9:36:22:17: 3f:a0:d0:f8:2d:35:48:b6:1c:50:d0:36:ea:f2:e4:d0: 47:74:13:6c:0f:5e:1a:cc:ec:b9:4e:2f:4c:cb:bd:1a: 05:b4:eb:9e:c2:06:1e:21:1b:66:27:a9:bc:ba:c6:56: b6:1b:b0:e5:82:6b:92:e3:4b:52:e7:0a:f0:fe:c1:72 Fingerprint (SHA-256): 50:4D:1F:A2:2E:D5:31:42:43:64:0E:0E:92:CA:2E:5A:CE:2E:9D:3F:28:13:A1:C4:6E:01:A4:24:4D:E0:F5:61 Fingerprint (SHA1): C3:21:C1:5C:62:44:66:1A:14:7F:38:4E:8B:11:E1:98:C4:39:EC:31 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14859: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14860: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195775 (0x13bda57f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 20:41:40 2017 Not After : Thu Mar 31 20:41:40 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:09:0d:69:51:be:b4:46:27:34:a7:ac:bf:44:78:8f: 96:f4:c1:d7:80:b8:30:82:b4:83:d5:cd:6f:48:fb:6b: 89:cc:8c:14:65:4a:8d:0c:71:99:a3:aa:dd:7b:6b:29: 3a:a9:60:8c:a6:f4:8e:53:e4:66:78:0f:61:ce:68:9c: 21:ec:08:04:0c:59:a9:e6:77:4e:e3:87:6e:1c:b2:d9: 2a:02:1b:20:17:a9:3c:6a:b5:04:35:b5:9a:38:4c:dd: e6:a4:2a:bf:78:0c:e3:fb:0a:70:24:3f:b4:28:d0:9b: f7:72:b0:46:9c:16:c2:18:8a:d8:4c:4e:6f:1b:74:70: e4:e3:91:73:54:87:c7:db:11:b7:e5:c3:e8:f2:0a:79: 58:c7:f1:30:19:95:13:04:0a:16:ea:62:fd:b9:90:d8: 32:5c:22:93:fb:a2:70:85:7d:e8:d4:df:0f:2a:4c:90: 91:9a:6e:33:67:ca:9e:46:ff:39:6f:74:ff:d3:0c:08: f0:4d:9a:7b:e9:4c:31:cf:1d:b1:00:2b:4f:80:da:61: 39:03:04:89:26:ab:5f:a9:8d:73:82:3d:fd:ea:47:45: 16:7d:56:5d:ab:2e:98:4f:26:a0:15:80:8b:aa:9a:a1: b2:c2:ce:76:4a:be:ac:6e:09:b6:51:57:96:96:f2:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:14:4f:c0:90:1a:3c:fc:13:92:66:06:f7:40:88:8d: da:aa:88:84:c9:c0:c8:3e:a8:24:3d:75:e3:65:5a:17: 15:6c:d2:21:ad:cf:fe:94:62:af:fe:a3:ce:79:d7:74: da:ce:55:30:bc:93:7f:59:ef:5e:c5:fc:30:c0:11:e1: ce:6b:0e:d7:35:0d:d4:75:c5:2c:43:e9:60:ce:41:9c: 4d:43:91:5c:e2:1e:52:3f:3b:cc:1a:9a:6c:8d:ff:7a: 62:99:6f:57:c6:14:82:02:e8:7f:c8:73:5c:a1:22:44: e0:1b:9b:c2:e5:f8:aa:98:04:8a:98:b8:a2:7c:b5:6a: c8:35:4d:f0:15:93:9a:50:c0:5c:ce:e4:1a:9b:8d:9f: 1d:4a:69:4c:ec:34:15:d5:96:34:2f:96:d0:ec:41:d0: 6f:4a:17:3b:91:89:31:5c:3f:41:0a:de:4b:78:ad:85: c5:a2:8a:da:4c:53:ae:fa:23:16:62:35:0b:bd:81:26: 57:fb:88:80:9a:2e:55:d5:52:78:a5:f2:22:1a:71:2b: e6:33:53:14:a2:b6:3b:88:15:26:76:de:13:55:fc:45: 2c:ff:04:f1:6d:7c:ee:66:b6:8d:82:e1:ef:62:f6:ca: 20:6e:c9:d2:45:0d:eb:70:a0:f8:2f:da:2b:b9:84:f5 Fingerprint (SHA-256): 3C:EA:F9:B3:C1:FB:0B:70:60:25:05:7C:27:E1:76:F5:6D:C9:97:DB:80:25:D1:93:70:2C:2C:9F:E8:F1:17:CC Fingerprint (SHA1): E2:5F:C3:1C:37:81:32:42:72:9B:F5:4B:5A:7B:B6:01:EB:3B:A3:D8 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #14861: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14862: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #14863: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #14864: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #14865: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195773 (0x13bda57d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:41:22 2017 Not After : Thu Mar 31 20:41:22 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:36:dc:20:57:27:ce:be:a3:df:25:a5:a3:87:30:78: fe:86:4c:b7:95:18:9c:12:8a:d5:d1:75:95:5e:59:dd: d3:f5:0a:43:64:8e:44:af:9b:65:3a:b1:ef:80:8f:63: fa:26:b3:d2:e6:57:71:4f:81:93:12:85:74:31:0c:86: 43:8b:9d:99:9e:c2:1f:d5:7b:27:bb:46:6b:7c:02:58: 81:f8:34:3b:1b:c6:fe:2e:e0:c5:f7:8b:e8:04:2d:25: 89:84:cf:5d:9d:cd:cb:eb:11:12:43:0c:b2:4c:80:36: e9:17:50:16:08:a2:97:63:5b:26:65:60:45:69:5d:26: 76:ef:1e:d6:00:5e:35:bd:dd:5c:c4:8f:0c:c4:1f:c3: 81:71:18:82:fb:6c:25:09:18:33:cb:14:c9:27:c9:1a: 69:5d:2d:ce:1b:64:27:29:59:5c:51:57:77:e2:a9:10: 51:6e:f4:26:a8:53:6b:4d:e4:67:4f:dc:a3:f5:1d:76: 8c:09:78:ee:0e:f6:d9:50:ad:06:52:6a:05:93:9f:f7: 2c:33:7a:98:9b:01:a7:df:c1:ff:ef:35:2a:57:e8:90: 25:95:9c:c1:dc:d1:1c:39:ac:de:86:dd:52:c8:f0:53: 8f:e2:c3:f1:38:c4:33:a8:9d:cd:83:36:f2:3c:bd:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:18:e0:c9:50:74:25:ea:73:e9:2c:59:f8:d7:f8:4a: a3:d7:ba:b8:d0:de:3a:ec:3f:f5:94:ee:f6:82:20:ba: a6:84:0b:b3:13:28:aa:ca:8b:25:2f:39:39:97:03:40: 4f:6b:e3:b7:93:2f:5e:e1:6e:8a:08:38:04:d5:82:3f: db:67:78:d2:f7:e8:ba:25:eb:16:0e:ad:31:c2:c8:7a: 16:29:5f:e4:5c:c6:64:73:db:95:6a:06:46:f8:db:45: 55:fc:72:7c:8a:cb:e3:b3:ff:62:02:dd:9f:3b:3e:80: 34:2e:e4:71:2c:7f:ea:c0:80:f3:57:af:ee:97:71:1a: 7a:85:27:72:38:1c:e6:56:b6:82:6d:4c:b6:56:6d:19: 6c:84:8a:b6:6f:bb:fc:b7:c2:ef:07:43:c0:b0:73:49: c4:ec:d8:49:00:92:51:89:7a:85:d0:10:a4:4f:e4:6c: 0b:fa:e1:a7:a8:f6:73:64:21:39:c3:6c:a5:33:d1:34: aa:e8:a1:18:fb:a0:59:59:15:98:d6:92:8c:6d:d2:30: ba:b6:d1:34:37:be:01:9b:b6:07:8d:4d:cf:a8:5e:05: 7a:25:4d:93:11:bf:cf:b8:a6:98:04:ee:6d:3d:1a:3b: e5:34:b3:56:2b:1e:50:ff:d5:89:6b:77:e1:64:33:f7 Fingerprint (SHA-256): 2F:49:41:01:A2:18:11:ED:03:8D:C7:C7:A7:3D:5F:CE:67:EE:85:1F:A5:E2:DA:D7:A6:66:C1:54:9E:08:A4:C6 Fingerprint (SHA1): FE:B8:BD:56:10:24:4F:E3:44:2A:AB:D3:3A:AE:47:71:5D:A2:54:AC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14866: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14867: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195774 (0x13bda57e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:41:33 2017 Not After : Thu Mar 31 20:41:33 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:4b:61:a2:b9:64:4b:39:6c:7f:ca:72:18:80:ac:c5: 46:bb:7a:62:2e:3f:9a:f9:a2:f1:8a:de:f7:45:3d:b8: 40:c5:ff:f3:7f:4a:40:19:37:ab:ae:68:b2:31:cb:f9: 81:de:77:cc:ea:90:44:44:b5:a2:e8:6d:7c:33:87:35: 53:22:2c:2a:d1:5a:30:d9:85:a8:3f:56:a6:eb:b3:0c: f6:20:c6:58:80:ba:00:62:ad:cd:c7:0c:b0:7e:3b:1b: aa:fc:35:df:48:7d:e4:7b:8a:a0:3d:28:c8:b2:d9:c5: 84:4a:87:04:b6:ce:18:1c:6d:1c:12:a0:68:ff:e4:fc: 18:1b:3e:b0:14:73:cb:91:26:ef:5d:f5:e4:3b:c0:98: e3:80:cf:3d:4a:74:43:ce:22:4e:c1:10:17:82:df:48: a1:09:c3:95:97:d1:25:21:56:35:67:92:e7:18:d2:a8: 0f:cc:a7:53:da:74:a5:cb:16:5f:54:08:ab:75:ab:71: bd:9b:e8:9e:e5:56:54:5e:2b:44:86:80:65:29:9b:a8: 87:12:b2:aa:41:4d:4c:26:08:70:18:ae:4a:12:f7:ed: 64:62:ed:1b:ea:d6:b5:5d:11:54:1e:dd:b8:e8:ca:24: ed:3b:59:5d:3c:56:cf:04:6e:04:29:90:5e:c1:1e:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:68:e2:49:38:f7:8a:92:54:9a:ca:be:4e:6c:95:5d: 2e:64:82:19:7d:48:c9:5a:44:9d:be:f1:65:f9:9a:a9: 76:dd:9b:44:df:9f:85:9a:1c:c7:f7:cb:a2:2a:58:e7: cf:d7:1a:35:a9:82:91:57:5f:5d:e8:a6:9c:d3:b5:6a: d9:ed:b0:3f:00:f6:68:8a:2d:30:ed:61:68:97:24:fd: 48:2b:eb:f9:8e:5c:0e:c2:8d:ca:ab:c6:0f:6b:2a:47: 1e:0c:bf:6b:be:26:c7:97:62:3f:b7:9a:32:39:81:70: 46:e6:4d:d5:30:3d:20:7b:ce:e4:4c:78:7e:91:df:bf: 64:b7:37:11:e5:dd:38:71:a7:76:c4:3a:83:a7:1d:fc: 45:39:72:af:a3:0b:3c:3c:b0:22:57:10:e3:5c:9a:3c: da:e2:25:82:42:b5:61:b4:b4:bc:ad:a1:ec:2e:fb:ab: 6b:35:04:c8:f7:39:10:21:05:d6:32:d4:b9:36:22:17: 3f:a0:d0:f8:2d:35:48:b6:1c:50:d0:36:ea:f2:e4:d0: 47:74:13:6c:0f:5e:1a:cc:ec:b9:4e:2f:4c:cb:bd:1a: 05:b4:eb:9e:c2:06:1e:21:1b:66:27:a9:bc:ba:c6:56: b6:1b:b0:e5:82:6b:92:e3:4b:52:e7:0a:f0:fe:c1:72 Fingerprint (SHA-256): 50:4D:1F:A2:2E:D5:31:42:43:64:0E:0E:92:CA:2E:5A:CE:2E:9D:3F:28:13:A1:C4:6E:01:A4:24:4D:E0:F5:61 Fingerprint (SHA1): C3:21:C1:5C:62:44:66:1A:14:7F:38:4E:8B:11:E1:98:C4:39:EC:31 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14868: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14869: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195775 (0x13bda57f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 20:41:40 2017 Not After : Thu Mar 31 20:41:40 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:09:0d:69:51:be:b4:46:27:34:a7:ac:bf:44:78:8f: 96:f4:c1:d7:80:b8:30:82:b4:83:d5:cd:6f:48:fb:6b: 89:cc:8c:14:65:4a:8d:0c:71:99:a3:aa:dd:7b:6b:29: 3a:a9:60:8c:a6:f4:8e:53:e4:66:78:0f:61:ce:68:9c: 21:ec:08:04:0c:59:a9:e6:77:4e:e3:87:6e:1c:b2:d9: 2a:02:1b:20:17:a9:3c:6a:b5:04:35:b5:9a:38:4c:dd: e6:a4:2a:bf:78:0c:e3:fb:0a:70:24:3f:b4:28:d0:9b: f7:72:b0:46:9c:16:c2:18:8a:d8:4c:4e:6f:1b:74:70: e4:e3:91:73:54:87:c7:db:11:b7:e5:c3:e8:f2:0a:79: 58:c7:f1:30:19:95:13:04:0a:16:ea:62:fd:b9:90:d8: 32:5c:22:93:fb:a2:70:85:7d:e8:d4:df:0f:2a:4c:90: 91:9a:6e:33:67:ca:9e:46:ff:39:6f:74:ff:d3:0c:08: f0:4d:9a:7b:e9:4c:31:cf:1d:b1:00:2b:4f:80:da:61: 39:03:04:89:26:ab:5f:a9:8d:73:82:3d:fd:ea:47:45: 16:7d:56:5d:ab:2e:98:4f:26:a0:15:80:8b:aa:9a:a1: b2:c2:ce:76:4a:be:ac:6e:09:b6:51:57:96:96:f2:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:14:4f:c0:90:1a:3c:fc:13:92:66:06:f7:40:88:8d: da:aa:88:84:c9:c0:c8:3e:a8:24:3d:75:e3:65:5a:17: 15:6c:d2:21:ad:cf:fe:94:62:af:fe:a3:ce:79:d7:74: da:ce:55:30:bc:93:7f:59:ef:5e:c5:fc:30:c0:11:e1: ce:6b:0e:d7:35:0d:d4:75:c5:2c:43:e9:60:ce:41:9c: 4d:43:91:5c:e2:1e:52:3f:3b:cc:1a:9a:6c:8d:ff:7a: 62:99:6f:57:c6:14:82:02:e8:7f:c8:73:5c:a1:22:44: e0:1b:9b:c2:e5:f8:aa:98:04:8a:98:b8:a2:7c:b5:6a: c8:35:4d:f0:15:93:9a:50:c0:5c:ce:e4:1a:9b:8d:9f: 1d:4a:69:4c:ec:34:15:d5:96:34:2f:96:d0:ec:41:d0: 6f:4a:17:3b:91:89:31:5c:3f:41:0a:de:4b:78:ad:85: c5:a2:8a:da:4c:53:ae:fa:23:16:62:35:0b:bd:81:26: 57:fb:88:80:9a:2e:55:d5:52:78:a5:f2:22:1a:71:2b: e6:33:53:14:a2:b6:3b:88:15:26:76:de:13:55:fc:45: 2c:ff:04:f1:6d:7c:ee:66:b6:8d:82:e1:ef:62:f6:ca: 20:6e:c9:d2:45:0d:eb:70:a0:f8:2f:da:2b:b9:84:f5 Fingerprint (SHA-256): 3C:EA:F9:B3:C1:FB:0B:70:60:25:05:7C:27:E1:76:F5:6D:C9:97:DB:80:25:D1:93:70:2C:2C:9F:E8:F1:17:CC Fingerprint (SHA1): E2:5F:C3:1C:37:81:32:42:72:9B:F5:4B:5A:7B:B6:01:EB:3B:A3:D8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #14870: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14871: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195773 (0x13bda57d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:41:22 2017 Not After : Thu Mar 31 20:41:22 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:36:dc:20:57:27:ce:be:a3:df:25:a5:a3:87:30:78: fe:86:4c:b7:95:18:9c:12:8a:d5:d1:75:95:5e:59:dd: d3:f5:0a:43:64:8e:44:af:9b:65:3a:b1:ef:80:8f:63: fa:26:b3:d2:e6:57:71:4f:81:93:12:85:74:31:0c:86: 43:8b:9d:99:9e:c2:1f:d5:7b:27:bb:46:6b:7c:02:58: 81:f8:34:3b:1b:c6:fe:2e:e0:c5:f7:8b:e8:04:2d:25: 89:84:cf:5d:9d:cd:cb:eb:11:12:43:0c:b2:4c:80:36: e9:17:50:16:08:a2:97:63:5b:26:65:60:45:69:5d:26: 76:ef:1e:d6:00:5e:35:bd:dd:5c:c4:8f:0c:c4:1f:c3: 81:71:18:82:fb:6c:25:09:18:33:cb:14:c9:27:c9:1a: 69:5d:2d:ce:1b:64:27:29:59:5c:51:57:77:e2:a9:10: 51:6e:f4:26:a8:53:6b:4d:e4:67:4f:dc:a3:f5:1d:76: 8c:09:78:ee:0e:f6:d9:50:ad:06:52:6a:05:93:9f:f7: 2c:33:7a:98:9b:01:a7:df:c1:ff:ef:35:2a:57:e8:90: 25:95:9c:c1:dc:d1:1c:39:ac:de:86:dd:52:c8:f0:53: 8f:e2:c3:f1:38:c4:33:a8:9d:cd:83:36:f2:3c:bd:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:18:e0:c9:50:74:25:ea:73:e9:2c:59:f8:d7:f8:4a: a3:d7:ba:b8:d0:de:3a:ec:3f:f5:94:ee:f6:82:20:ba: a6:84:0b:b3:13:28:aa:ca:8b:25:2f:39:39:97:03:40: 4f:6b:e3:b7:93:2f:5e:e1:6e:8a:08:38:04:d5:82:3f: db:67:78:d2:f7:e8:ba:25:eb:16:0e:ad:31:c2:c8:7a: 16:29:5f:e4:5c:c6:64:73:db:95:6a:06:46:f8:db:45: 55:fc:72:7c:8a:cb:e3:b3:ff:62:02:dd:9f:3b:3e:80: 34:2e:e4:71:2c:7f:ea:c0:80:f3:57:af:ee:97:71:1a: 7a:85:27:72:38:1c:e6:56:b6:82:6d:4c:b6:56:6d:19: 6c:84:8a:b6:6f:bb:fc:b7:c2:ef:07:43:c0:b0:73:49: c4:ec:d8:49:00:92:51:89:7a:85:d0:10:a4:4f:e4:6c: 0b:fa:e1:a7:a8:f6:73:64:21:39:c3:6c:a5:33:d1:34: aa:e8:a1:18:fb:a0:59:59:15:98:d6:92:8c:6d:d2:30: ba:b6:d1:34:37:be:01:9b:b6:07:8d:4d:cf:a8:5e:05: 7a:25:4d:93:11:bf:cf:b8:a6:98:04:ee:6d:3d:1a:3b: e5:34:b3:56:2b:1e:50:ff:d5:89:6b:77:e1:64:33:f7 Fingerprint (SHA-256): 2F:49:41:01:A2:18:11:ED:03:8D:C7:C7:A7:3D:5F:CE:67:EE:85:1F:A5:E2:DA:D7:A6:66:C1:54:9E:08:A4:C6 Fingerprint (SHA1): FE:B8:BD:56:10:24:4F:E3:44:2A:AB:D3:3A:AE:47:71:5D:A2:54:AC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14872: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195773 (0x13bda57d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:41:22 2017 Not After : Thu Mar 31 20:41:22 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:36:dc:20:57:27:ce:be:a3:df:25:a5:a3:87:30:78: fe:86:4c:b7:95:18:9c:12:8a:d5:d1:75:95:5e:59:dd: d3:f5:0a:43:64:8e:44:af:9b:65:3a:b1:ef:80:8f:63: fa:26:b3:d2:e6:57:71:4f:81:93:12:85:74:31:0c:86: 43:8b:9d:99:9e:c2:1f:d5:7b:27:bb:46:6b:7c:02:58: 81:f8:34:3b:1b:c6:fe:2e:e0:c5:f7:8b:e8:04:2d:25: 89:84:cf:5d:9d:cd:cb:eb:11:12:43:0c:b2:4c:80:36: e9:17:50:16:08:a2:97:63:5b:26:65:60:45:69:5d:26: 76:ef:1e:d6:00:5e:35:bd:dd:5c:c4:8f:0c:c4:1f:c3: 81:71:18:82:fb:6c:25:09:18:33:cb:14:c9:27:c9:1a: 69:5d:2d:ce:1b:64:27:29:59:5c:51:57:77:e2:a9:10: 51:6e:f4:26:a8:53:6b:4d:e4:67:4f:dc:a3:f5:1d:76: 8c:09:78:ee:0e:f6:d9:50:ad:06:52:6a:05:93:9f:f7: 2c:33:7a:98:9b:01:a7:df:c1:ff:ef:35:2a:57:e8:90: 25:95:9c:c1:dc:d1:1c:39:ac:de:86:dd:52:c8:f0:53: 8f:e2:c3:f1:38:c4:33:a8:9d:cd:83:36:f2:3c:bd:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:18:e0:c9:50:74:25:ea:73:e9:2c:59:f8:d7:f8:4a: a3:d7:ba:b8:d0:de:3a:ec:3f:f5:94:ee:f6:82:20:ba: a6:84:0b:b3:13:28:aa:ca:8b:25:2f:39:39:97:03:40: 4f:6b:e3:b7:93:2f:5e:e1:6e:8a:08:38:04:d5:82:3f: db:67:78:d2:f7:e8:ba:25:eb:16:0e:ad:31:c2:c8:7a: 16:29:5f:e4:5c:c6:64:73:db:95:6a:06:46:f8:db:45: 55:fc:72:7c:8a:cb:e3:b3:ff:62:02:dd:9f:3b:3e:80: 34:2e:e4:71:2c:7f:ea:c0:80:f3:57:af:ee:97:71:1a: 7a:85:27:72:38:1c:e6:56:b6:82:6d:4c:b6:56:6d:19: 6c:84:8a:b6:6f:bb:fc:b7:c2:ef:07:43:c0:b0:73:49: c4:ec:d8:49:00:92:51:89:7a:85:d0:10:a4:4f:e4:6c: 0b:fa:e1:a7:a8:f6:73:64:21:39:c3:6c:a5:33:d1:34: aa:e8:a1:18:fb:a0:59:59:15:98:d6:92:8c:6d:d2:30: ba:b6:d1:34:37:be:01:9b:b6:07:8d:4d:cf:a8:5e:05: 7a:25:4d:93:11:bf:cf:b8:a6:98:04:ee:6d:3d:1a:3b: e5:34:b3:56:2b:1e:50:ff:d5:89:6b:77:e1:64:33:f7 Fingerprint (SHA-256): 2F:49:41:01:A2:18:11:ED:03:8D:C7:C7:A7:3D:5F:CE:67:EE:85:1F:A5:E2:DA:D7:A6:66:C1:54:9E:08:A4:C6 Fingerprint (SHA1): FE:B8:BD:56:10:24:4F:E3:44:2A:AB:D3:3A:AE:47:71:5D:A2:54:AC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14873: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195774 (0x13bda57e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:41:33 2017 Not After : Thu Mar 31 20:41:33 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:4b:61:a2:b9:64:4b:39:6c:7f:ca:72:18:80:ac:c5: 46:bb:7a:62:2e:3f:9a:f9:a2:f1:8a:de:f7:45:3d:b8: 40:c5:ff:f3:7f:4a:40:19:37:ab:ae:68:b2:31:cb:f9: 81:de:77:cc:ea:90:44:44:b5:a2:e8:6d:7c:33:87:35: 53:22:2c:2a:d1:5a:30:d9:85:a8:3f:56:a6:eb:b3:0c: f6:20:c6:58:80:ba:00:62:ad:cd:c7:0c:b0:7e:3b:1b: aa:fc:35:df:48:7d:e4:7b:8a:a0:3d:28:c8:b2:d9:c5: 84:4a:87:04:b6:ce:18:1c:6d:1c:12:a0:68:ff:e4:fc: 18:1b:3e:b0:14:73:cb:91:26:ef:5d:f5:e4:3b:c0:98: e3:80:cf:3d:4a:74:43:ce:22:4e:c1:10:17:82:df:48: a1:09:c3:95:97:d1:25:21:56:35:67:92:e7:18:d2:a8: 0f:cc:a7:53:da:74:a5:cb:16:5f:54:08:ab:75:ab:71: bd:9b:e8:9e:e5:56:54:5e:2b:44:86:80:65:29:9b:a8: 87:12:b2:aa:41:4d:4c:26:08:70:18:ae:4a:12:f7:ed: 64:62:ed:1b:ea:d6:b5:5d:11:54:1e:dd:b8:e8:ca:24: ed:3b:59:5d:3c:56:cf:04:6e:04:29:90:5e:c1:1e:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:68:e2:49:38:f7:8a:92:54:9a:ca:be:4e:6c:95:5d: 2e:64:82:19:7d:48:c9:5a:44:9d:be:f1:65:f9:9a:a9: 76:dd:9b:44:df:9f:85:9a:1c:c7:f7:cb:a2:2a:58:e7: cf:d7:1a:35:a9:82:91:57:5f:5d:e8:a6:9c:d3:b5:6a: d9:ed:b0:3f:00:f6:68:8a:2d:30:ed:61:68:97:24:fd: 48:2b:eb:f9:8e:5c:0e:c2:8d:ca:ab:c6:0f:6b:2a:47: 1e:0c:bf:6b:be:26:c7:97:62:3f:b7:9a:32:39:81:70: 46:e6:4d:d5:30:3d:20:7b:ce:e4:4c:78:7e:91:df:bf: 64:b7:37:11:e5:dd:38:71:a7:76:c4:3a:83:a7:1d:fc: 45:39:72:af:a3:0b:3c:3c:b0:22:57:10:e3:5c:9a:3c: da:e2:25:82:42:b5:61:b4:b4:bc:ad:a1:ec:2e:fb:ab: 6b:35:04:c8:f7:39:10:21:05:d6:32:d4:b9:36:22:17: 3f:a0:d0:f8:2d:35:48:b6:1c:50:d0:36:ea:f2:e4:d0: 47:74:13:6c:0f:5e:1a:cc:ec:b9:4e:2f:4c:cb:bd:1a: 05:b4:eb:9e:c2:06:1e:21:1b:66:27:a9:bc:ba:c6:56: b6:1b:b0:e5:82:6b:92:e3:4b:52:e7:0a:f0:fe:c1:72 Fingerprint (SHA-256): 50:4D:1F:A2:2E:D5:31:42:43:64:0E:0E:92:CA:2E:5A:CE:2E:9D:3F:28:13:A1:C4:6E:01:A4:24:4D:E0:F5:61 Fingerprint (SHA1): C3:21:C1:5C:62:44:66:1A:14:7F:38:4E:8B:11:E1:98:C4:39:EC:31 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14874: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195774 (0x13bda57e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:41:33 2017 Not After : Thu Mar 31 20:41:33 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:4b:61:a2:b9:64:4b:39:6c:7f:ca:72:18:80:ac:c5: 46:bb:7a:62:2e:3f:9a:f9:a2:f1:8a:de:f7:45:3d:b8: 40:c5:ff:f3:7f:4a:40:19:37:ab:ae:68:b2:31:cb:f9: 81:de:77:cc:ea:90:44:44:b5:a2:e8:6d:7c:33:87:35: 53:22:2c:2a:d1:5a:30:d9:85:a8:3f:56:a6:eb:b3:0c: f6:20:c6:58:80:ba:00:62:ad:cd:c7:0c:b0:7e:3b:1b: aa:fc:35:df:48:7d:e4:7b:8a:a0:3d:28:c8:b2:d9:c5: 84:4a:87:04:b6:ce:18:1c:6d:1c:12:a0:68:ff:e4:fc: 18:1b:3e:b0:14:73:cb:91:26:ef:5d:f5:e4:3b:c0:98: e3:80:cf:3d:4a:74:43:ce:22:4e:c1:10:17:82:df:48: a1:09:c3:95:97:d1:25:21:56:35:67:92:e7:18:d2:a8: 0f:cc:a7:53:da:74:a5:cb:16:5f:54:08:ab:75:ab:71: bd:9b:e8:9e:e5:56:54:5e:2b:44:86:80:65:29:9b:a8: 87:12:b2:aa:41:4d:4c:26:08:70:18:ae:4a:12:f7:ed: 64:62:ed:1b:ea:d6:b5:5d:11:54:1e:dd:b8:e8:ca:24: ed:3b:59:5d:3c:56:cf:04:6e:04:29:90:5e:c1:1e:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:68:e2:49:38:f7:8a:92:54:9a:ca:be:4e:6c:95:5d: 2e:64:82:19:7d:48:c9:5a:44:9d:be:f1:65:f9:9a:a9: 76:dd:9b:44:df:9f:85:9a:1c:c7:f7:cb:a2:2a:58:e7: cf:d7:1a:35:a9:82:91:57:5f:5d:e8:a6:9c:d3:b5:6a: d9:ed:b0:3f:00:f6:68:8a:2d:30:ed:61:68:97:24:fd: 48:2b:eb:f9:8e:5c:0e:c2:8d:ca:ab:c6:0f:6b:2a:47: 1e:0c:bf:6b:be:26:c7:97:62:3f:b7:9a:32:39:81:70: 46:e6:4d:d5:30:3d:20:7b:ce:e4:4c:78:7e:91:df:bf: 64:b7:37:11:e5:dd:38:71:a7:76:c4:3a:83:a7:1d:fc: 45:39:72:af:a3:0b:3c:3c:b0:22:57:10:e3:5c:9a:3c: da:e2:25:82:42:b5:61:b4:b4:bc:ad:a1:ec:2e:fb:ab: 6b:35:04:c8:f7:39:10:21:05:d6:32:d4:b9:36:22:17: 3f:a0:d0:f8:2d:35:48:b6:1c:50:d0:36:ea:f2:e4:d0: 47:74:13:6c:0f:5e:1a:cc:ec:b9:4e:2f:4c:cb:bd:1a: 05:b4:eb:9e:c2:06:1e:21:1b:66:27:a9:bc:ba:c6:56: b6:1b:b0:e5:82:6b:92:e3:4b:52:e7:0a:f0:fe:c1:72 Fingerprint (SHA-256): 50:4D:1F:A2:2E:D5:31:42:43:64:0E:0E:92:CA:2E:5A:CE:2E:9D:3F:28:13:A1:C4:6E:01:A4:24:4D:E0:F5:61 Fingerprint (SHA1): C3:21:C1:5C:62:44:66:1A:14:7F:38:4E:8B:11:E1:98:C4:39:EC:31 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #14875: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195775 (0x13bda57f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 20:41:40 2017 Not After : Thu Mar 31 20:41:40 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:09:0d:69:51:be:b4:46:27:34:a7:ac:bf:44:78:8f: 96:f4:c1:d7:80:b8:30:82:b4:83:d5:cd:6f:48:fb:6b: 89:cc:8c:14:65:4a:8d:0c:71:99:a3:aa:dd:7b:6b:29: 3a:a9:60:8c:a6:f4:8e:53:e4:66:78:0f:61:ce:68:9c: 21:ec:08:04:0c:59:a9:e6:77:4e:e3:87:6e:1c:b2:d9: 2a:02:1b:20:17:a9:3c:6a:b5:04:35:b5:9a:38:4c:dd: e6:a4:2a:bf:78:0c:e3:fb:0a:70:24:3f:b4:28:d0:9b: f7:72:b0:46:9c:16:c2:18:8a:d8:4c:4e:6f:1b:74:70: e4:e3:91:73:54:87:c7:db:11:b7:e5:c3:e8:f2:0a:79: 58:c7:f1:30:19:95:13:04:0a:16:ea:62:fd:b9:90:d8: 32:5c:22:93:fb:a2:70:85:7d:e8:d4:df:0f:2a:4c:90: 91:9a:6e:33:67:ca:9e:46:ff:39:6f:74:ff:d3:0c:08: f0:4d:9a:7b:e9:4c:31:cf:1d:b1:00:2b:4f:80:da:61: 39:03:04:89:26:ab:5f:a9:8d:73:82:3d:fd:ea:47:45: 16:7d:56:5d:ab:2e:98:4f:26:a0:15:80:8b:aa:9a:a1: b2:c2:ce:76:4a:be:ac:6e:09:b6:51:57:96:96:f2:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:14:4f:c0:90:1a:3c:fc:13:92:66:06:f7:40:88:8d: da:aa:88:84:c9:c0:c8:3e:a8:24:3d:75:e3:65:5a:17: 15:6c:d2:21:ad:cf:fe:94:62:af:fe:a3:ce:79:d7:74: da:ce:55:30:bc:93:7f:59:ef:5e:c5:fc:30:c0:11:e1: ce:6b:0e:d7:35:0d:d4:75:c5:2c:43:e9:60:ce:41:9c: 4d:43:91:5c:e2:1e:52:3f:3b:cc:1a:9a:6c:8d:ff:7a: 62:99:6f:57:c6:14:82:02:e8:7f:c8:73:5c:a1:22:44: e0:1b:9b:c2:e5:f8:aa:98:04:8a:98:b8:a2:7c:b5:6a: c8:35:4d:f0:15:93:9a:50:c0:5c:ce:e4:1a:9b:8d:9f: 1d:4a:69:4c:ec:34:15:d5:96:34:2f:96:d0:ec:41:d0: 6f:4a:17:3b:91:89:31:5c:3f:41:0a:de:4b:78:ad:85: c5:a2:8a:da:4c:53:ae:fa:23:16:62:35:0b:bd:81:26: 57:fb:88:80:9a:2e:55:d5:52:78:a5:f2:22:1a:71:2b: e6:33:53:14:a2:b6:3b:88:15:26:76:de:13:55:fc:45: 2c:ff:04:f1:6d:7c:ee:66:b6:8d:82:e1:ef:62:f6:ca: 20:6e:c9:d2:45:0d:eb:70:a0:f8:2f:da:2b:b9:84:f5 Fingerprint (SHA-256): 3C:EA:F9:B3:C1:FB:0B:70:60:25:05:7C:27:E1:76:F5:6D:C9:97:DB:80:25:D1:93:70:2C:2C:9F:E8:F1:17:CC Fingerprint (SHA1): E2:5F:C3:1C:37:81:32:42:72:9B:F5:4B:5A:7B:B6:01:EB:3B:A3:D8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #14876: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195775 (0x13bda57f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 20:41:40 2017 Not After : Thu Mar 31 20:41:40 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:09:0d:69:51:be:b4:46:27:34:a7:ac:bf:44:78:8f: 96:f4:c1:d7:80:b8:30:82:b4:83:d5:cd:6f:48:fb:6b: 89:cc:8c:14:65:4a:8d:0c:71:99:a3:aa:dd:7b:6b:29: 3a:a9:60:8c:a6:f4:8e:53:e4:66:78:0f:61:ce:68:9c: 21:ec:08:04:0c:59:a9:e6:77:4e:e3:87:6e:1c:b2:d9: 2a:02:1b:20:17:a9:3c:6a:b5:04:35:b5:9a:38:4c:dd: e6:a4:2a:bf:78:0c:e3:fb:0a:70:24:3f:b4:28:d0:9b: f7:72:b0:46:9c:16:c2:18:8a:d8:4c:4e:6f:1b:74:70: e4:e3:91:73:54:87:c7:db:11:b7:e5:c3:e8:f2:0a:79: 58:c7:f1:30:19:95:13:04:0a:16:ea:62:fd:b9:90:d8: 32:5c:22:93:fb:a2:70:85:7d:e8:d4:df:0f:2a:4c:90: 91:9a:6e:33:67:ca:9e:46:ff:39:6f:74:ff:d3:0c:08: f0:4d:9a:7b:e9:4c:31:cf:1d:b1:00:2b:4f:80:da:61: 39:03:04:89:26:ab:5f:a9:8d:73:82:3d:fd:ea:47:45: 16:7d:56:5d:ab:2e:98:4f:26:a0:15:80:8b:aa:9a:a1: b2:c2:ce:76:4a:be:ac:6e:09:b6:51:57:96:96:f2:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:14:4f:c0:90:1a:3c:fc:13:92:66:06:f7:40:88:8d: da:aa:88:84:c9:c0:c8:3e:a8:24:3d:75:e3:65:5a:17: 15:6c:d2:21:ad:cf:fe:94:62:af:fe:a3:ce:79:d7:74: da:ce:55:30:bc:93:7f:59:ef:5e:c5:fc:30:c0:11:e1: ce:6b:0e:d7:35:0d:d4:75:c5:2c:43:e9:60:ce:41:9c: 4d:43:91:5c:e2:1e:52:3f:3b:cc:1a:9a:6c:8d:ff:7a: 62:99:6f:57:c6:14:82:02:e8:7f:c8:73:5c:a1:22:44: e0:1b:9b:c2:e5:f8:aa:98:04:8a:98:b8:a2:7c:b5:6a: c8:35:4d:f0:15:93:9a:50:c0:5c:ce:e4:1a:9b:8d:9f: 1d:4a:69:4c:ec:34:15:d5:96:34:2f:96:d0:ec:41:d0: 6f:4a:17:3b:91:89:31:5c:3f:41:0a:de:4b:78:ad:85: c5:a2:8a:da:4c:53:ae:fa:23:16:62:35:0b:bd:81:26: 57:fb:88:80:9a:2e:55:d5:52:78:a5:f2:22:1a:71:2b: e6:33:53:14:a2:b6:3b:88:15:26:76:de:13:55:fc:45: 2c:ff:04:f1:6d:7c:ee:66:b6:8d:82:e1:ef:62:f6:ca: 20:6e:c9:d2:45:0d:eb:70:a0:f8:2f:da:2b:b9:84:f5 Fingerprint (SHA-256): 3C:EA:F9:B3:C1:FB:0B:70:60:25:05:7C:27:E1:76:F5:6D:C9:97:DB:80:25:D1:93:70:2C:2C:9F:E8:F1:17:CC Fingerprint (SHA1): E2:5F:C3:1C:37:81:32:42:72:9B:F5:4B:5A:7B:B6:01:EB:3B:A3:D8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #14877: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #14878: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195778 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14879: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #14880: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14881: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14882: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 331195779 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14883: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14884: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #14885: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14886: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331195780 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14887: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14888: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #14889: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14890: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 331195781 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14891: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14892: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #14893: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14894: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 331195782 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14895: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14896: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #14897: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14898: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 331195783 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14899: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14900: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #14901: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14902: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 331195784 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14903: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14904: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #14905: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #14906: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #14907: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #14908: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #14909: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195778 (0x13bda582) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:42:29 2017 Not After : Thu Mar 31 20:42:29 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:b3:51:82:e9:1e:1f:37:7a:e0:6d:04:d0:5e:c1:0f: dc:c0:9b:2a:51:78:6b:10:da:74:d0:2e:28:8e:3c:79: 67:25:5e:de:12:4f:39:de:80:a3:4e:36:7a:dc:e1:24: c1:2f:1d:e0:20:d6:c3:28:cb:8f:9f:ca:8c:01:d3:77: 4d:58:d2:52:19:9e:fa:bf:b0:7b:fc:64:ce:9b:da:9e: 7a:a2:26:45:57:65:eb:ae:0e:cf:0d:f4:06:5f:ab:23: fa:d5:b9:24:4a:28:ee:cb:f8:18:97:05:16:a1:dc:3c: 63:1e:55:1f:47:74:d5:9a:94:30:5d:d0:54:cc:d8:9b: cb:f2:10:3b:18:b1:52:8b:d6:b9:a4:be:e5:39:5c:0d: bd:f7:88:0e:86:20:3a:65:25:42:07:85:5d:67:5f:a4: 9e:a4:f2:97:91:07:d0:f6:58:68:0d:3f:4f:c3:0f:ac: 58:01:ba:db:fa:65:35:df:f3:62:3e:ea:79:2b:d2:93: 4b:fe:42:64:b5:6b:bc:ea:7f:82:7d:ab:ba:ee:6f:15: df:45:b1:d2:c1:ef:ae:cb:47:78:f8:03:33:3a:58:e0: 72:52:01:dc:15:cb:ca:af:ea:f3:9b:3f:b8:50:ab:7b: 96:02:41:93:cd:58:1a:28:04:69:ab:ce:72:21:2e:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:b1:7c:a2:97:95:13:ba:89:71:3f:a3:83:11:6b:f1: fd:64:42:a3:5d:d7:76:bf:cb:d2:3f:f2:e6:32:71:ab: 18:f1:22:a1:40:40:9e:ce:d9:fe:d4:42:b0:e1:cd:ab: 9d:11:82:b4:c8:96:99:9d:82:a8:16:cd:2f:85:88:c4: 5d:48:0c:a0:45:c6:cd:5c:cd:3c:a1:0c:44:fc:35:a1: a0:3a:d1:8c:97:d8:89:60:a6:9f:bc:c7:58:25:16:f3: e2:fa:53:b6:66:69:0c:49:ca:8e:a7:49:ca:cb:da:14: 50:6b:fa:d0:4a:03:bc:4a:01:ec:01:c8:55:4c:43:ef: 33:f5:59:37:f2:7f:24:6b:5f:5f:29:3e:06:9f:e1:7f: bd:92:97:f5:5d:ab:09:26:a0:a4:f2:0c:42:14:f9:c4: 4d:ac:ff:48:3a:94:ae:76:b4:c8:a8:34:45:89:6a:28: 77:1e:8e:79:64:84:cb:08:ae:ca:0b:89:d2:55:a9:d1: e7:17:17:71:d9:20:a2:bc:9f:66:60:38:c1:b7:1c:b7: 34:b4:4d:38:8a:47:f4:a5:f2:20:9d:bc:1a:6a:ef:e3: 43:e8:eb:13:52:19:9b:f0:cc:ce:61:2f:a4:da:9f:d2: 97:b3:93:24:22:38:40:1b:20:82:c1:ff:45:44:3d:1e Fingerprint (SHA-256): 78:96:BF:3A:24:13:7E:C9:C3:C9:E8:4F:84:7A:41:75:17:A8:A5:B7:DB:56:8B:00:BD:0C:56:7D:92:D2:1C:40 Fingerprint (SHA1): 37:F1:BB:F9:F4:94:60:77:2D:09:E3:1F:BA:DB:15:5F:86:54:6C:56 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14910: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14911: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14912: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14913: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195778 (0x13bda582) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:42:29 2017 Not After : Thu Mar 31 20:42:29 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:b3:51:82:e9:1e:1f:37:7a:e0:6d:04:d0:5e:c1:0f: dc:c0:9b:2a:51:78:6b:10:da:74:d0:2e:28:8e:3c:79: 67:25:5e:de:12:4f:39:de:80:a3:4e:36:7a:dc:e1:24: c1:2f:1d:e0:20:d6:c3:28:cb:8f:9f:ca:8c:01:d3:77: 4d:58:d2:52:19:9e:fa:bf:b0:7b:fc:64:ce:9b:da:9e: 7a:a2:26:45:57:65:eb:ae:0e:cf:0d:f4:06:5f:ab:23: fa:d5:b9:24:4a:28:ee:cb:f8:18:97:05:16:a1:dc:3c: 63:1e:55:1f:47:74:d5:9a:94:30:5d:d0:54:cc:d8:9b: cb:f2:10:3b:18:b1:52:8b:d6:b9:a4:be:e5:39:5c:0d: bd:f7:88:0e:86:20:3a:65:25:42:07:85:5d:67:5f:a4: 9e:a4:f2:97:91:07:d0:f6:58:68:0d:3f:4f:c3:0f:ac: 58:01:ba:db:fa:65:35:df:f3:62:3e:ea:79:2b:d2:93: 4b:fe:42:64:b5:6b:bc:ea:7f:82:7d:ab:ba:ee:6f:15: df:45:b1:d2:c1:ef:ae:cb:47:78:f8:03:33:3a:58:e0: 72:52:01:dc:15:cb:ca:af:ea:f3:9b:3f:b8:50:ab:7b: 96:02:41:93:cd:58:1a:28:04:69:ab:ce:72:21:2e:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:b1:7c:a2:97:95:13:ba:89:71:3f:a3:83:11:6b:f1: fd:64:42:a3:5d:d7:76:bf:cb:d2:3f:f2:e6:32:71:ab: 18:f1:22:a1:40:40:9e:ce:d9:fe:d4:42:b0:e1:cd:ab: 9d:11:82:b4:c8:96:99:9d:82:a8:16:cd:2f:85:88:c4: 5d:48:0c:a0:45:c6:cd:5c:cd:3c:a1:0c:44:fc:35:a1: a0:3a:d1:8c:97:d8:89:60:a6:9f:bc:c7:58:25:16:f3: e2:fa:53:b6:66:69:0c:49:ca:8e:a7:49:ca:cb:da:14: 50:6b:fa:d0:4a:03:bc:4a:01:ec:01:c8:55:4c:43:ef: 33:f5:59:37:f2:7f:24:6b:5f:5f:29:3e:06:9f:e1:7f: bd:92:97:f5:5d:ab:09:26:a0:a4:f2:0c:42:14:f9:c4: 4d:ac:ff:48:3a:94:ae:76:b4:c8:a8:34:45:89:6a:28: 77:1e:8e:79:64:84:cb:08:ae:ca:0b:89:d2:55:a9:d1: e7:17:17:71:d9:20:a2:bc:9f:66:60:38:c1:b7:1c:b7: 34:b4:4d:38:8a:47:f4:a5:f2:20:9d:bc:1a:6a:ef:e3: 43:e8:eb:13:52:19:9b:f0:cc:ce:61:2f:a4:da:9f:d2: 97:b3:93:24:22:38:40:1b:20:82:c1:ff:45:44:3d:1e Fingerprint (SHA-256): 78:96:BF:3A:24:13:7E:C9:C3:C9:E8:4F:84:7A:41:75:17:A8:A5:B7:DB:56:8B:00:BD:0C:56:7D:92:D2:1C:40 Fingerprint (SHA1): 37:F1:BB:F9:F4:94:60:77:2D:09:E3:1F:BA:DB:15:5F:86:54:6C:56 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #14914: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #14915: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #14916: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195785 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #14917: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #14918: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #14919: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14920: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 331195786 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14921: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14922: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #14923: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14924: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 331195787 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14925: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14926: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #14927: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14928: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 331195788 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14929: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14930: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #14931: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14932: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 331195789 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14933: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14934: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #14935: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14936: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 331195790 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14937: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14938: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #14939: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14940: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 331195791 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14941: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14942: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #14943: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14944: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 331195792 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14945: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14946: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #14947: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14948: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 331195793 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14949: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14950: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #14951: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14952: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 331195794 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14953: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14954: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #14955: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14956: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 331195795 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14957: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14958: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #14959: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14960: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 331195796 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14961: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14962: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #14963: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14964: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 331195797 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14965: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14966: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #14967: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14968: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 331195798 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14969: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14970: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #14971: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14972: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 331195799 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14973: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14974: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #14975: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14976: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 331195800 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14977: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14978: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #14979: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14980: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 331195801 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14981: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14982: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #14983: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14984: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 331195802 --extCP --extIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #14985: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14986: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #14987: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14988: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 331195803 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14989: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14990: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #14991: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #14992: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 331195804 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14993: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14994: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #14995: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #14996: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 331195805 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #14997: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #14998: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #14999: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15000: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 331195806 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15001: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15002: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #15003: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15004: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 331195807 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15005: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15006: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #15007: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15008: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 331195808 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15009: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15010: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #15011: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15012: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 331195809 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15013: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15014: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #15015: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15016: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 331195810 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15017: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15018: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #15019: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15020: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 331195811 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15021: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15022: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #15023: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15024: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 331195812 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15025: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15026: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #15027: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15028: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 331195813 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15029: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15030: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #15031: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15032: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 331195814 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15033: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15034: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15035: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195785 (0x13bda589) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:44:25 2017 Not After : Thu Mar 31 20:44:25 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:3c:8b:d4:36:d5:1c:0b:d3:f4:f1:a9:eb:c1:23:65: 2f:10:55:3d:50:56:d2:d4:b9:7d:82:85:57:a1:c2:6e: 73:90:c0:ad:47:23:58:13:77:1b:b1:dd:98:db:79:a2: be:44:83:57:1c:9c:2f:32:18:47:38:79:70:e5:1a:f4: 73:07:3d:eb:88:43:1b:ac:1d:8f:15:c7:e9:ba:66:cf: 3e:6d:55:3d:a2:bf:c4:ad:cc:79:f2:40:df:fb:04:9a: 37:6a:b3:8e:8f:6d:9f:bb:97:2f:25:da:b7:4b:6f:b3: 24:56:29:0a:1f:f3:e3:87:e8:d5:d4:57:81:9a:1f:d3: 40:c0:96:97:a1:2b:cc:d9:d7:c9:9b:d0:22:e2:d8:ac: 44:98:9d:c9:2a:43:97:5f:12:dc:ec:e3:db:b1:f4:03: 17:58:f1:45:0a:4e:72:f7:9c:95:b7:5b:38:1a:cc:0b: 34:5a:df:8b:86:3e:fa:3d:8e:89:7f:9f:3d:f2:c8:dc: 08:b9:fd:7d:c3:d9:e4:fd:fb:7b:9c:3f:48:7b:65:b8: 92:9b:9b:54:6c:58:d1:5d:06:6e:a2:5f:44:58:db:1b: 05:57:71:e2:b8:b5:48:9a:c3:5e:53:02:8f:b1:28:5e: c8:a4:3d:f6:67:86:cc:a7:86:38:3a:ba:55:a1:84:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:76:6d:60:ee:20:9e:22:a0:51:13:af:78:63:8b:90: 80:c0:de:d6:dd:f8:50:a3:29:36:0f:55:27:82:b4:0c: f1:de:56:d1:18:d0:9a:ce:b4:25:ba:74:4c:da:ea:09: e1:a3:7c:9d:12:0b:ce:9b:bd:83:17:0b:63:35:a1:88: 02:27:97:07:fd:fd:6a:91:73:a9:e1:0d:d2:d8:83:50: b4:c5:b8:26:c2:66:96:da:72:76:e0:dc:21:10:34:eb: 8a:77:23:97:6c:cb:86:36:d6:0c:e1:8d:16:eb:6d:bc: 8d:c1:20:3f:53:05:4c:20:ed:dd:54:8f:e9:21:43:51: 75:83:38:f6:bd:4a:ae:0f:a0:f4:d2:8d:02:f9:0f:72: 50:c0:7d:24:0a:b2:2f:6f:33:9e:c0:d7:ed:56:18:9d: 8e:84:2f:5a:26:21:2a:3a:02:0a:fe:69:6f:08:67:5e: 07:3d:f0:3f:4b:ec:68:51:fc:cc:00:6b:b4:31:0a:89: 54:ee:71:31:d3:0e:3b:76:e2:cd:1a:52:12:71:07:5b: 90:b7:e3:4b:7e:55:d5:f0:e8:02:07:a9:81:91:25:4b: a5:c6:7f:fb:5f:71:db:ae:98:55:77:a3:ad:e1:55:af: 28:01:08:d6:60:5d:88:97:0a:31:8d:ac:91:6a:fe:fc Fingerprint (SHA-256): 57:56:07:11:D7:2E:70:5C:BC:D4:7F:42:31:32:24:39:CC:D6:62:4E:15:E1:75:3D:F1:88:8B:72:E3:77:78:99 Fingerprint (SHA1): 27:E4:A5:AC:EC:F5:72:AA:D7:18:E4:0B:44:98:AE:9D:E8:83:2D:6B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15036: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15037: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195785 (0x13bda589) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:44:25 2017 Not After : Thu Mar 31 20:44:25 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:3c:8b:d4:36:d5:1c:0b:d3:f4:f1:a9:eb:c1:23:65: 2f:10:55:3d:50:56:d2:d4:b9:7d:82:85:57:a1:c2:6e: 73:90:c0:ad:47:23:58:13:77:1b:b1:dd:98:db:79:a2: be:44:83:57:1c:9c:2f:32:18:47:38:79:70:e5:1a:f4: 73:07:3d:eb:88:43:1b:ac:1d:8f:15:c7:e9:ba:66:cf: 3e:6d:55:3d:a2:bf:c4:ad:cc:79:f2:40:df:fb:04:9a: 37:6a:b3:8e:8f:6d:9f:bb:97:2f:25:da:b7:4b:6f:b3: 24:56:29:0a:1f:f3:e3:87:e8:d5:d4:57:81:9a:1f:d3: 40:c0:96:97:a1:2b:cc:d9:d7:c9:9b:d0:22:e2:d8:ac: 44:98:9d:c9:2a:43:97:5f:12:dc:ec:e3:db:b1:f4:03: 17:58:f1:45:0a:4e:72:f7:9c:95:b7:5b:38:1a:cc:0b: 34:5a:df:8b:86:3e:fa:3d:8e:89:7f:9f:3d:f2:c8:dc: 08:b9:fd:7d:c3:d9:e4:fd:fb:7b:9c:3f:48:7b:65:b8: 92:9b:9b:54:6c:58:d1:5d:06:6e:a2:5f:44:58:db:1b: 05:57:71:e2:b8:b5:48:9a:c3:5e:53:02:8f:b1:28:5e: c8:a4:3d:f6:67:86:cc:a7:86:38:3a:ba:55:a1:84:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:76:6d:60:ee:20:9e:22:a0:51:13:af:78:63:8b:90: 80:c0:de:d6:dd:f8:50:a3:29:36:0f:55:27:82:b4:0c: f1:de:56:d1:18:d0:9a:ce:b4:25:ba:74:4c:da:ea:09: e1:a3:7c:9d:12:0b:ce:9b:bd:83:17:0b:63:35:a1:88: 02:27:97:07:fd:fd:6a:91:73:a9:e1:0d:d2:d8:83:50: b4:c5:b8:26:c2:66:96:da:72:76:e0:dc:21:10:34:eb: 8a:77:23:97:6c:cb:86:36:d6:0c:e1:8d:16:eb:6d:bc: 8d:c1:20:3f:53:05:4c:20:ed:dd:54:8f:e9:21:43:51: 75:83:38:f6:bd:4a:ae:0f:a0:f4:d2:8d:02:f9:0f:72: 50:c0:7d:24:0a:b2:2f:6f:33:9e:c0:d7:ed:56:18:9d: 8e:84:2f:5a:26:21:2a:3a:02:0a:fe:69:6f:08:67:5e: 07:3d:f0:3f:4b:ec:68:51:fc:cc:00:6b:b4:31:0a:89: 54:ee:71:31:d3:0e:3b:76:e2:cd:1a:52:12:71:07:5b: 90:b7:e3:4b:7e:55:d5:f0:e8:02:07:a9:81:91:25:4b: a5:c6:7f:fb:5f:71:db:ae:98:55:77:a3:ad:e1:55:af: 28:01:08:d6:60:5d:88:97:0a:31:8d:ac:91:6a:fe:fc Fingerprint (SHA-256): 57:56:07:11:D7:2E:70:5C:BC:D4:7F:42:31:32:24:39:CC:D6:62:4E:15:E1:75:3D:F1:88:8B:72:E3:77:78:99 Fingerprint (SHA1): 27:E4:A5:AC:EC:F5:72:AA:D7:18:E4:0B:44:98:AE:9D:E8:83:2D:6B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15038: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15039: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15040: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15041: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195785 (0x13bda589) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:44:25 2017 Not After : Thu Mar 31 20:44:25 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:3c:8b:d4:36:d5:1c:0b:d3:f4:f1:a9:eb:c1:23:65: 2f:10:55:3d:50:56:d2:d4:b9:7d:82:85:57:a1:c2:6e: 73:90:c0:ad:47:23:58:13:77:1b:b1:dd:98:db:79:a2: be:44:83:57:1c:9c:2f:32:18:47:38:79:70:e5:1a:f4: 73:07:3d:eb:88:43:1b:ac:1d:8f:15:c7:e9:ba:66:cf: 3e:6d:55:3d:a2:bf:c4:ad:cc:79:f2:40:df:fb:04:9a: 37:6a:b3:8e:8f:6d:9f:bb:97:2f:25:da:b7:4b:6f:b3: 24:56:29:0a:1f:f3:e3:87:e8:d5:d4:57:81:9a:1f:d3: 40:c0:96:97:a1:2b:cc:d9:d7:c9:9b:d0:22:e2:d8:ac: 44:98:9d:c9:2a:43:97:5f:12:dc:ec:e3:db:b1:f4:03: 17:58:f1:45:0a:4e:72:f7:9c:95:b7:5b:38:1a:cc:0b: 34:5a:df:8b:86:3e:fa:3d:8e:89:7f:9f:3d:f2:c8:dc: 08:b9:fd:7d:c3:d9:e4:fd:fb:7b:9c:3f:48:7b:65:b8: 92:9b:9b:54:6c:58:d1:5d:06:6e:a2:5f:44:58:db:1b: 05:57:71:e2:b8:b5:48:9a:c3:5e:53:02:8f:b1:28:5e: c8:a4:3d:f6:67:86:cc:a7:86:38:3a:ba:55:a1:84:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:76:6d:60:ee:20:9e:22:a0:51:13:af:78:63:8b:90: 80:c0:de:d6:dd:f8:50:a3:29:36:0f:55:27:82:b4:0c: f1:de:56:d1:18:d0:9a:ce:b4:25:ba:74:4c:da:ea:09: e1:a3:7c:9d:12:0b:ce:9b:bd:83:17:0b:63:35:a1:88: 02:27:97:07:fd:fd:6a:91:73:a9:e1:0d:d2:d8:83:50: b4:c5:b8:26:c2:66:96:da:72:76:e0:dc:21:10:34:eb: 8a:77:23:97:6c:cb:86:36:d6:0c:e1:8d:16:eb:6d:bc: 8d:c1:20:3f:53:05:4c:20:ed:dd:54:8f:e9:21:43:51: 75:83:38:f6:bd:4a:ae:0f:a0:f4:d2:8d:02:f9:0f:72: 50:c0:7d:24:0a:b2:2f:6f:33:9e:c0:d7:ed:56:18:9d: 8e:84:2f:5a:26:21:2a:3a:02:0a:fe:69:6f:08:67:5e: 07:3d:f0:3f:4b:ec:68:51:fc:cc:00:6b:b4:31:0a:89: 54:ee:71:31:d3:0e:3b:76:e2:cd:1a:52:12:71:07:5b: 90:b7:e3:4b:7e:55:d5:f0:e8:02:07:a9:81:91:25:4b: a5:c6:7f:fb:5f:71:db:ae:98:55:77:a3:ad:e1:55:af: 28:01:08:d6:60:5d:88:97:0a:31:8d:ac:91:6a:fe:fc Fingerprint (SHA-256): 57:56:07:11:D7:2E:70:5C:BC:D4:7F:42:31:32:24:39:CC:D6:62:4E:15:E1:75:3D:F1:88:8B:72:E3:77:78:99 Fingerprint (SHA1): 27:E4:A5:AC:EC:F5:72:AA:D7:18:E4:0B:44:98:AE:9D:E8:83:2D:6B Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15042: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15043: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15044: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15045: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195785 (0x13bda589) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:44:25 2017 Not After : Thu Mar 31 20:44:25 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:3c:8b:d4:36:d5:1c:0b:d3:f4:f1:a9:eb:c1:23:65: 2f:10:55:3d:50:56:d2:d4:b9:7d:82:85:57:a1:c2:6e: 73:90:c0:ad:47:23:58:13:77:1b:b1:dd:98:db:79:a2: be:44:83:57:1c:9c:2f:32:18:47:38:79:70:e5:1a:f4: 73:07:3d:eb:88:43:1b:ac:1d:8f:15:c7:e9:ba:66:cf: 3e:6d:55:3d:a2:bf:c4:ad:cc:79:f2:40:df:fb:04:9a: 37:6a:b3:8e:8f:6d:9f:bb:97:2f:25:da:b7:4b:6f:b3: 24:56:29:0a:1f:f3:e3:87:e8:d5:d4:57:81:9a:1f:d3: 40:c0:96:97:a1:2b:cc:d9:d7:c9:9b:d0:22:e2:d8:ac: 44:98:9d:c9:2a:43:97:5f:12:dc:ec:e3:db:b1:f4:03: 17:58:f1:45:0a:4e:72:f7:9c:95:b7:5b:38:1a:cc:0b: 34:5a:df:8b:86:3e:fa:3d:8e:89:7f:9f:3d:f2:c8:dc: 08:b9:fd:7d:c3:d9:e4:fd:fb:7b:9c:3f:48:7b:65:b8: 92:9b:9b:54:6c:58:d1:5d:06:6e:a2:5f:44:58:db:1b: 05:57:71:e2:b8:b5:48:9a:c3:5e:53:02:8f:b1:28:5e: c8:a4:3d:f6:67:86:cc:a7:86:38:3a:ba:55:a1:84:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:76:6d:60:ee:20:9e:22:a0:51:13:af:78:63:8b:90: 80:c0:de:d6:dd:f8:50:a3:29:36:0f:55:27:82:b4:0c: f1:de:56:d1:18:d0:9a:ce:b4:25:ba:74:4c:da:ea:09: e1:a3:7c:9d:12:0b:ce:9b:bd:83:17:0b:63:35:a1:88: 02:27:97:07:fd:fd:6a:91:73:a9:e1:0d:d2:d8:83:50: b4:c5:b8:26:c2:66:96:da:72:76:e0:dc:21:10:34:eb: 8a:77:23:97:6c:cb:86:36:d6:0c:e1:8d:16:eb:6d:bc: 8d:c1:20:3f:53:05:4c:20:ed:dd:54:8f:e9:21:43:51: 75:83:38:f6:bd:4a:ae:0f:a0:f4:d2:8d:02:f9:0f:72: 50:c0:7d:24:0a:b2:2f:6f:33:9e:c0:d7:ed:56:18:9d: 8e:84:2f:5a:26:21:2a:3a:02:0a:fe:69:6f:08:67:5e: 07:3d:f0:3f:4b:ec:68:51:fc:cc:00:6b:b4:31:0a:89: 54:ee:71:31:d3:0e:3b:76:e2:cd:1a:52:12:71:07:5b: 90:b7:e3:4b:7e:55:d5:f0:e8:02:07:a9:81:91:25:4b: a5:c6:7f:fb:5f:71:db:ae:98:55:77:a3:ad:e1:55:af: 28:01:08:d6:60:5d:88:97:0a:31:8d:ac:91:6a:fe:fc Fingerprint (SHA-256): 57:56:07:11:D7:2E:70:5C:BC:D4:7F:42:31:32:24:39:CC:D6:62:4E:15:E1:75:3D:F1:88:8B:72:E3:77:78:99 Fingerprint (SHA1): 27:E4:A5:AC:EC:F5:72:AA:D7:18:E4:0B:44:98:AE:9D:E8:83:2D:6B Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15046: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195785 (0x13bda589) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:44:25 2017 Not After : Thu Mar 31 20:44:25 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:3c:8b:d4:36:d5:1c:0b:d3:f4:f1:a9:eb:c1:23:65: 2f:10:55:3d:50:56:d2:d4:b9:7d:82:85:57:a1:c2:6e: 73:90:c0:ad:47:23:58:13:77:1b:b1:dd:98:db:79:a2: be:44:83:57:1c:9c:2f:32:18:47:38:79:70:e5:1a:f4: 73:07:3d:eb:88:43:1b:ac:1d:8f:15:c7:e9:ba:66:cf: 3e:6d:55:3d:a2:bf:c4:ad:cc:79:f2:40:df:fb:04:9a: 37:6a:b3:8e:8f:6d:9f:bb:97:2f:25:da:b7:4b:6f:b3: 24:56:29:0a:1f:f3:e3:87:e8:d5:d4:57:81:9a:1f:d3: 40:c0:96:97:a1:2b:cc:d9:d7:c9:9b:d0:22:e2:d8:ac: 44:98:9d:c9:2a:43:97:5f:12:dc:ec:e3:db:b1:f4:03: 17:58:f1:45:0a:4e:72:f7:9c:95:b7:5b:38:1a:cc:0b: 34:5a:df:8b:86:3e:fa:3d:8e:89:7f:9f:3d:f2:c8:dc: 08:b9:fd:7d:c3:d9:e4:fd:fb:7b:9c:3f:48:7b:65:b8: 92:9b:9b:54:6c:58:d1:5d:06:6e:a2:5f:44:58:db:1b: 05:57:71:e2:b8:b5:48:9a:c3:5e:53:02:8f:b1:28:5e: c8:a4:3d:f6:67:86:cc:a7:86:38:3a:ba:55:a1:84:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:76:6d:60:ee:20:9e:22:a0:51:13:af:78:63:8b:90: 80:c0:de:d6:dd:f8:50:a3:29:36:0f:55:27:82:b4:0c: f1:de:56:d1:18:d0:9a:ce:b4:25:ba:74:4c:da:ea:09: e1:a3:7c:9d:12:0b:ce:9b:bd:83:17:0b:63:35:a1:88: 02:27:97:07:fd:fd:6a:91:73:a9:e1:0d:d2:d8:83:50: b4:c5:b8:26:c2:66:96:da:72:76:e0:dc:21:10:34:eb: 8a:77:23:97:6c:cb:86:36:d6:0c:e1:8d:16:eb:6d:bc: 8d:c1:20:3f:53:05:4c:20:ed:dd:54:8f:e9:21:43:51: 75:83:38:f6:bd:4a:ae:0f:a0:f4:d2:8d:02:f9:0f:72: 50:c0:7d:24:0a:b2:2f:6f:33:9e:c0:d7:ed:56:18:9d: 8e:84:2f:5a:26:21:2a:3a:02:0a:fe:69:6f:08:67:5e: 07:3d:f0:3f:4b:ec:68:51:fc:cc:00:6b:b4:31:0a:89: 54:ee:71:31:d3:0e:3b:76:e2:cd:1a:52:12:71:07:5b: 90:b7:e3:4b:7e:55:d5:f0:e8:02:07:a9:81:91:25:4b: a5:c6:7f:fb:5f:71:db:ae:98:55:77:a3:ad:e1:55:af: 28:01:08:d6:60:5d:88:97:0a:31:8d:ac:91:6a:fe:fc Fingerprint (SHA-256): 57:56:07:11:D7:2E:70:5C:BC:D4:7F:42:31:32:24:39:CC:D6:62:4E:15:E1:75:3D:F1:88:8B:72:E3:77:78:99 Fingerprint (SHA1): 27:E4:A5:AC:EC:F5:72:AA:D7:18:E4:0B:44:98:AE:9D:E8:83:2D:6B Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15047: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15048: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195785 (0x13bda589) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:44:25 2017 Not After : Thu Mar 31 20:44:25 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:3c:8b:d4:36:d5:1c:0b:d3:f4:f1:a9:eb:c1:23:65: 2f:10:55:3d:50:56:d2:d4:b9:7d:82:85:57:a1:c2:6e: 73:90:c0:ad:47:23:58:13:77:1b:b1:dd:98:db:79:a2: be:44:83:57:1c:9c:2f:32:18:47:38:79:70:e5:1a:f4: 73:07:3d:eb:88:43:1b:ac:1d:8f:15:c7:e9:ba:66:cf: 3e:6d:55:3d:a2:bf:c4:ad:cc:79:f2:40:df:fb:04:9a: 37:6a:b3:8e:8f:6d:9f:bb:97:2f:25:da:b7:4b:6f:b3: 24:56:29:0a:1f:f3:e3:87:e8:d5:d4:57:81:9a:1f:d3: 40:c0:96:97:a1:2b:cc:d9:d7:c9:9b:d0:22:e2:d8:ac: 44:98:9d:c9:2a:43:97:5f:12:dc:ec:e3:db:b1:f4:03: 17:58:f1:45:0a:4e:72:f7:9c:95:b7:5b:38:1a:cc:0b: 34:5a:df:8b:86:3e:fa:3d:8e:89:7f:9f:3d:f2:c8:dc: 08:b9:fd:7d:c3:d9:e4:fd:fb:7b:9c:3f:48:7b:65:b8: 92:9b:9b:54:6c:58:d1:5d:06:6e:a2:5f:44:58:db:1b: 05:57:71:e2:b8:b5:48:9a:c3:5e:53:02:8f:b1:28:5e: c8:a4:3d:f6:67:86:cc:a7:86:38:3a:ba:55:a1:84:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:76:6d:60:ee:20:9e:22:a0:51:13:af:78:63:8b:90: 80:c0:de:d6:dd:f8:50:a3:29:36:0f:55:27:82:b4:0c: f1:de:56:d1:18:d0:9a:ce:b4:25:ba:74:4c:da:ea:09: e1:a3:7c:9d:12:0b:ce:9b:bd:83:17:0b:63:35:a1:88: 02:27:97:07:fd:fd:6a:91:73:a9:e1:0d:d2:d8:83:50: b4:c5:b8:26:c2:66:96:da:72:76:e0:dc:21:10:34:eb: 8a:77:23:97:6c:cb:86:36:d6:0c:e1:8d:16:eb:6d:bc: 8d:c1:20:3f:53:05:4c:20:ed:dd:54:8f:e9:21:43:51: 75:83:38:f6:bd:4a:ae:0f:a0:f4:d2:8d:02:f9:0f:72: 50:c0:7d:24:0a:b2:2f:6f:33:9e:c0:d7:ed:56:18:9d: 8e:84:2f:5a:26:21:2a:3a:02:0a:fe:69:6f:08:67:5e: 07:3d:f0:3f:4b:ec:68:51:fc:cc:00:6b:b4:31:0a:89: 54:ee:71:31:d3:0e:3b:76:e2:cd:1a:52:12:71:07:5b: 90:b7:e3:4b:7e:55:d5:f0:e8:02:07:a9:81:91:25:4b: a5:c6:7f:fb:5f:71:db:ae:98:55:77:a3:ad:e1:55:af: 28:01:08:d6:60:5d:88:97:0a:31:8d:ac:91:6a:fe:fc Fingerprint (SHA-256): 57:56:07:11:D7:2E:70:5C:BC:D4:7F:42:31:32:24:39:CC:D6:62:4E:15:E1:75:3D:F1:88:8B:72:E3:77:78:99 Fingerprint (SHA1): 27:E4:A5:AC:EC:F5:72:AA:D7:18:E4:0B:44:98:AE:9D:E8:83:2D:6B Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15049: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15050: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15051: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15052: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195785 (0x13bda589) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:44:25 2017 Not After : Thu Mar 31 20:44:25 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:3c:8b:d4:36:d5:1c:0b:d3:f4:f1:a9:eb:c1:23:65: 2f:10:55:3d:50:56:d2:d4:b9:7d:82:85:57:a1:c2:6e: 73:90:c0:ad:47:23:58:13:77:1b:b1:dd:98:db:79:a2: be:44:83:57:1c:9c:2f:32:18:47:38:79:70:e5:1a:f4: 73:07:3d:eb:88:43:1b:ac:1d:8f:15:c7:e9:ba:66:cf: 3e:6d:55:3d:a2:bf:c4:ad:cc:79:f2:40:df:fb:04:9a: 37:6a:b3:8e:8f:6d:9f:bb:97:2f:25:da:b7:4b:6f:b3: 24:56:29:0a:1f:f3:e3:87:e8:d5:d4:57:81:9a:1f:d3: 40:c0:96:97:a1:2b:cc:d9:d7:c9:9b:d0:22:e2:d8:ac: 44:98:9d:c9:2a:43:97:5f:12:dc:ec:e3:db:b1:f4:03: 17:58:f1:45:0a:4e:72:f7:9c:95:b7:5b:38:1a:cc:0b: 34:5a:df:8b:86:3e:fa:3d:8e:89:7f:9f:3d:f2:c8:dc: 08:b9:fd:7d:c3:d9:e4:fd:fb:7b:9c:3f:48:7b:65:b8: 92:9b:9b:54:6c:58:d1:5d:06:6e:a2:5f:44:58:db:1b: 05:57:71:e2:b8:b5:48:9a:c3:5e:53:02:8f:b1:28:5e: c8:a4:3d:f6:67:86:cc:a7:86:38:3a:ba:55:a1:84:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:76:6d:60:ee:20:9e:22:a0:51:13:af:78:63:8b:90: 80:c0:de:d6:dd:f8:50:a3:29:36:0f:55:27:82:b4:0c: f1:de:56:d1:18:d0:9a:ce:b4:25:ba:74:4c:da:ea:09: e1:a3:7c:9d:12:0b:ce:9b:bd:83:17:0b:63:35:a1:88: 02:27:97:07:fd:fd:6a:91:73:a9:e1:0d:d2:d8:83:50: b4:c5:b8:26:c2:66:96:da:72:76:e0:dc:21:10:34:eb: 8a:77:23:97:6c:cb:86:36:d6:0c:e1:8d:16:eb:6d:bc: 8d:c1:20:3f:53:05:4c:20:ed:dd:54:8f:e9:21:43:51: 75:83:38:f6:bd:4a:ae:0f:a0:f4:d2:8d:02:f9:0f:72: 50:c0:7d:24:0a:b2:2f:6f:33:9e:c0:d7:ed:56:18:9d: 8e:84:2f:5a:26:21:2a:3a:02:0a:fe:69:6f:08:67:5e: 07:3d:f0:3f:4b:ec:68:51:fc:cc:00:6b:b4:31:0a:89: 54:ee:71:31:d3:0e:3b:76:e2:cd:1a:52:12:71:07:5b: 90:b7:e3:4b:7e:55:d5:f0:e8:02:07:a9:81:91:25:4b: a5:c6:7f:fb:5f:71:db:ae:98:55:77:a3:ad:e1:55:af: 28:01:08:d6:60:5d:88:97:0a:31:8d:ac:91:6a:fe:fc Fingerprint (SHA-256): 57:56:07:11:D7:2E:70:5C:BC:D4:7F:42:31:32:24:39:CC:D6:62:4E:15:E1:75:3D:F1:88:8B:72:E3:77:78:99 Fingerprint (SHA1): 27:E4:A5:AC:EC:F5:72:AA:D7:18:E4:0B:44:98:AE:9D:E8:83:2D:6B Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15053: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195785 (0x13bda589) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:44:25 2017 Not After : Thu Mar 31 20:44:25 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:3c:8b:d4:36:d5:1c:0b:d3:f4:f1:a9:eb:c1:23:65: 2f:10:55:3d:50:56:d2:d4:b9:7d:82:85:57:a1:c2:6e: 73:90:c0:ad:47:23:58:13:77:1b:b1:dd:98:db:79:a2: be:44:83:57:1c:9c:2f:32:18:47:38:79:70:e5:1a:f4: 73:07:3d:eb:88:43:1b:ac:1d:8f:15:c7:e9:ba:66:cf: 3e:6d:55:3d:a2:bf:c4:ad:cc:79:f2:40:df:fb:04:9a: 37:6a:b3:8e:8f:6d:9f:bb:97:2f:25:da:b7:4b:6f:b3: 24:56:29:0a:1f:f3:e3:87:e8:d5:d4:57:81:9a:1f:d3: 40:c0:96:97:a1:2b:cc:d9:d7:c9:9b:d0:22:e2:d8:ac: 44:98:9d:c9:2a:43:97:5f:12:dc:ec:e3:db:b1:f4:03: 17:58:f1:45:0a:4e:72:f7:9c:95:b7:5b:38:1a:cc:0b: 34:5a:df:8b:86:3e:fa:3d:8e:89:7f:9f:3d:f2:c8:dc: 08:b9:fd:7d:c3:d9:e4:fd:fb:7b:9c:3f:48:7b:65:b8: 92:9b:9b:54:6c:58:d1:5d:06:6e:a2:5f:44:58:db:1b: 05:57:71:e2:b8:b5:48:9a:c3:5e:53:02:8f:b1:28:5e: c8:a4:3d:f6:67:86:cc:a7:86:38:3a:ba:55:a1:84:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:76:6d:60:ee:20:9e:22:a0:51:13:af:78:63:8b:90: 80:c0:de:d6:dd:f8:50:a3:29:36:0f:55:27:82:b4:0c: f1:de:56:d1:18:d0:9a:ce:b4:25:ba:74:4c:da:ea:09: e1:a3:7c:9d:12:0b:ce:9b:bd:83:17:0b:63:35:a1:88: 02:27:97:07:fd:fd:6a:91:73:a9:e1:0d:d2:d8:83:50: b4:c5:b8:26:c2:66:96:da:72:76:e0:dc:21:10:34:eb: 8a:77:23:97:6c:cb:86:36:d6:0c:e1:8d:16:eb:6d:bc: 8d:c1:20:3f:53:05:4c:20:ed:dd:54:8f:e9:21:43:51: 75:83:38:f6:bd:4a:ae:0f:a0:f4:d2:8d:02:f9:0f:72: 50:c0:7d:24:0a:b2:2f:6f:33:9e:c0:d7:ed:56:18:9d: 8e:84:2f:5a:26:21:2a:3a:02:0a:fe:69:6f:08:67:5e: 07:3d:f0:3f:4b:ec:68:51:fc:cc:00:6b:b4:31:0a:89: 54:ee:71:31:d3:0e:3b:76:e2:cd:1a:52:12:71:07:5b: 90:b7:e3:4b:7e:55:d5:f0:e8:02:07:a9:81:91:25:4b: a5:c6:7f:fb:5f:71:db:ae:98:55:77:a3:ad:e1:55:af: 28:01:08:d6:60:5d:88:97:0a:31:8d:ac:91:6a:fe:fc Fingerprint (SHA-256): 57:56:07:11:D7:2E:70:5C:BC:D4:7F:42:31:32:24:39:CC:D6:62:4E:15:E1:75:3D:F1:88:8B:72:E3:77:78:99 Fingerprint (SHA1): 27:E4:A5:AC:EC:F5:72:AA:D7:18:E4:0B:44:98:AE:9D:E8:83:2D:6B Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #15054: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195785 (0x13bda589) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:44:25 2017 Not After : Thu Mar 31 20:44:25 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:3c:8b:d4:36:d5:1c:0b:d3:f4:f1:a9:eb:c1:23:65: 2f:10:55:3d:50:56:d2:d4:b9:7d:82:85:57:a1:c2:6e: 73:90:c0:ad:47:23:58:13:77:1b:b1:dd:98:db:79:a2: be:44:83:57:1c:9c:2f:32:18:47:38:79:70:e5:1a:f4: 73:07:3d:eb:88:43:1b:ac:1d:8f:15:c7:e9:ba:66:cf: 3e:6d:55:3d:a2:bf:c4:ad:cc:79:f2:40:df:fb:04:9a: 37:6a:b3:8e:8f:6d:9f:bb:97:2f:25:da:b7:4b:6f:b3: 24:56:29:0a:1f:f3:e3:87:e8:d5:d4:57:81:9a:1f:d3: 40:c0:96:97:a1:2b:cc:d9:d7:c9:9b:d0:22:e2:d8:ac: 44:98:9d:c9:2a:43:97:5f:12:dc:ec:e3:db:b1:f4:03: 17:58:f1:45:0a:4e:72:f7:9c:95:b7:5b:38:1a:cc:0b: 34:5a:df:8b:86:3e:fa:3d:8e:89:7f:9f:3d:f2:c8:dc: 08:b9:fd:7d:c3:d9:e4:fd:fb:7b:9c:3f:48:7b:65:b8: 92:9b:9b:54:6c:58:d1:5d:06:6e:a2:5f:44:58:db:1b: 05:57:71:e2:b8:b5:48:9a:c3:5e:53:02:8f:b1:28:5e: c8:a4:3d:f6:67:86:cc:a7:86:38:3a:ba:55:a1:84:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:76:6d:60:ee:20:9e:22:a0:51:13:af:78:63:8b:90: 80:c0:de:d6:dd:f8:50:a3:29:36:0f:55:27:82:b4:0c: f1:de:56:d1:18:d0:9a:ce:b4:25:ba:74:4c:da:ea:09: e1:a3:7c:9d:12:0b:ce:9b:bd:83:17:0b:63:35:a1:88: 02:27:97:07:fd:fd:6a:91:73:a9:e1:0d:d2:d8:83:50: b4:c5:b8:26:c2:66:96:da:72:76:e0:dc:21:10:34:eb: 8a:77:23:97:6c:cb:86:36:d6:0c:e1:8d:16:eb:6d:bc: 8d:c1:20:3f:53:05:4c:20:ed:dd:54:8f:e9:21:43:51: 75:83:38:f6:bd:4a:ae:0f:a0:f4:d2:8d:02:f9:0f:72: 50:c0:7d:24:0a:b2:2f:6f:33:9e:c0:d7:ed:56:18:9d: 8e:84:2f:5a:26:21:2a:3a:02:0a:fe:69:6f:08:67:5e: 07:3d:f0:3f:4b:ec:68:51:fc:cc:00:6b:b4:31:0a:89: 54:ee:71:31:d3:0e:3b:76:e2:cd:1a:52:12:71:07:5b: 90:b7:e3:4b:7e:55:d5:f0:e8:02:07:a9:81:91:25:4b: a5:c6:7f:fb:5f:71:db:ae:98:55:77:a3:ad:e1:55:af: 28:01:08:d6:60:5d:88:97:0a:31:8d:ac:91:6a:fe:fc Fingerprint (SHA-256): 57:56:07:11:D7:2E:70:5C:BC:D4:7F:42:31:32:24:39:CC:D6:62:4E:15:E1:75:3D:F1:88:8B:72:E3:77:78:99 Fingerprint (SHA1): 27:E4:A5:AC:EC:F5:72:AA:D7:18:E4:0B:44:98:AE:9D:E8:83:2D:6B Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #15055: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195785 (0x13bda589) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:44:25 2017 Not After : Thu Mar 31 20:44:25 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:3c:8b:d4:36:d5:1c:0b:d3:f4:f1:a9:eb:c1:23:65: 2f:10:55:3d:50:56:d2:d4:b9:7d:82:85:57:a1:c2:6e: 73:90:c0:ad:47:23:58:13:77:1b:b1:dd:98:db:79:a2: be:44:83:57:1c:9c:2f:32:18:47:38:79:70:e5:1a:f4: 73:07:3d:eb:88:43:1b:ac:1d:8f:15:c7:e9:ba:66:cf: 3e:6d:55:3d:a2:bf:c4:ad:cc:79:f2:40:df:fb:04:9a: 37:6a:b3:8e:8f:6d:9f:bb:97:2f:25:da:b7:4b:6f:b3: 24:56:29:0a:1f:f3:e3:87:e8:d5:d4:57:81:9a:1f:d3: 40:c0:96:97:a1:2b:cc:d9:d7:c9:9b:d0:22:e2:d8:ac: 44:98:9d:c9:2a:43:97:5f:12:dc:ec:e3:db:b1:f4:03: 17:58:f1:45:0a:4e:72:f7:9c:95:b7:5b:38:1a:cc:0b: 34:5a:df:8b:86:3e:fa:3d:8e:89:7f:9f:3d:f2:c8:dc: 08:b9:fd:7d:c3:d9:e4:fd:fb:7b:9c:3f:48:7b:65:b8: 92:9b:9b:54:6c:58:d1:5d:06:6e:a2:5f:44:58:db:1b: 05:57:71:e2:b8:b5:48:9a:c3:5e:53:02:8f:b1:28:5e: c8:a4:3d:f6:67:86:cc:a7:86:38:3a:ba:55:a1:84:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:76:6d:60:ee:20:9e:22:a0:51:13:af:78:63:8b:90: 80:c0:de:d6:dd:f8:50:a3:29:36:0f:55:27:82:b4:0c: f1:de:56:d1:18:d0:9a:ce:b4:25:ba:74:4c:da:ea:09: e1:a3:7c:9d:12:0b:ce:9b:bd:83:17:0b:63:35:a1:88: 02:27:97:07:fd:fd:6a:91:73:a9:e1:0d:d2:d8:83:50: b4:c5:b8:26:c2:66:96:da:72:76:e0:dc:21:10:34:eb: 8a:77:23:97:6c:cb:86:36:d6:0c:e1:8d:16:eb:6d:bc: 8d:c1:20:3f:53:05:4c:20:ed:dd:54:8f:e9:21:43:51: 75:83:38:f6:bd:4a:ae:0f:a0:f4:d2:8d:02:f9:0f:72: 50:c0:7d:24:0a:b2:2f:6f:33:9e:c0:d7:ed:56:18:9d: 8e:84:2f:5a:26:21:2a:3a:02:0a:fe:69:6f:08:67:5e: 07:3d:f0:3f:4b:ec:68:51:fc:cc:00:6b:b4:31:0a:89: 54:ee:71:31:d3:0e:3b:76:e2:cd:1a:52:12:71:07:5b: 90:b7:e3:4b:7e:55:d5:f0:e8:02:07:a9:81:91:25:4b: a5:c6:7f:fb:5f:71:db:ae:98:55:77:a3:ad:e1:55:af: 28:01:08:d6:60:5d:88:97:0a:31:8d:ac:91:6a:fe:fc Fingerprint (SHA-256): 57:56:07:11:D7:2E:70:5C:BC:D4:7F:42:31:32:24:39:CC:D6:62:4E:15:E1:75:3D:F1:88:8B:72:E3:77:78:99 Fingerprint (SHA1): 27:E4:A5:AC:EC:F5:72:AA:D7:18:E4:0B:44:98:AE:9D:E8:83:2D:6B Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #15056: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195785 (0x13bda589) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:44:25 2017 Not After : Thu Mar 31 20:44:25 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:3c:8b:d4:36:d5:1c:0b:d3:f4:f1:a9:eb:c1:23:65: 2f:10:55:3d:50:56:d2:d4:b9:7d:82:85:57:a1:c2:6e: 73:90:c0:ad:47:23:58:13:77:1b:b1:dd:98:db:79:a2: be:44:83:57:1c:9c:2f:32:18:47:38:79:70:e5:1a:f4: 73:07:3d:eb:88:43:1b:ac:1d:8f:15:c7:e9:ba:66:cf: 3e:6d:55:3d:a2:bf:c4:ad:cc:79:f2:40:df:fb:04:9a: 37:6a:b3:8e:8f:6d:9f:bb:97:2f:25:da:b7:4b:6f:b3: 24:56:29:0a:1f:f3:e3:87:e8:d5:d4:57:81:9a:1f:d3: 40:c0:96:97:a1:2b:cc:d9:d7:c9:9b:d0:22:e2:d8:ac: 44:98:9d:c9:2a:43:97:5f:12:dc:ec:e3:db:b1:f4:03: 17:58:f1:45:0a:4e:72:f7:9c:95:b7:5b:38:1a:cc:0b: 34:5a:df:8b:86:3e:fa:3d:8e:89:7f:9f:3d:f2:c8:dc: 08:b9:fd:7d:c3:d9:e4:fd:fb:7b:9c:3f:48:7b:65:b8: 92:9b:9b:54:6c:58:d1:5d:06:6e:a2:5f:44:58:db:1b: 05:57:71:e2:b8:b5:48:9a:c3:5e:53:02:8f:b1:28:5e: c8:a4:3d:f6:67:86:cc:a7:86:38:3a:ba:55:a1:84:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:76:6d:60:ee:20:9e:22:a0:51:13:af:78:63:8b:90: 80:c0:de:d6:dd:f8:50:a3:29:36:0f:55:27:82:b4:0c: f1:de:56:d1:18:d0:9a:ce:b4:25:ba:74:4c:da:ea:09: e1:a3:7c:9d:12:0b:ce:9b:bd:83:17:0b:63:35:a1:88: 02:27:97:07:fd:fd:6a:91:73:a9:e1:0d:d2:d8:83:50: b4:c5:b8:26:c2:66:96:da:72:76:e0:dc:21:10:34:eb: 8a:77:23:97:6c:cb:86:36:d6:0c:e1:8d:16:eb:6d:bc: 8d:c1:20:3f:53:05:4c:20:ed:dd:54:8f:e9:21:43:51: 75:83:38:f6:bd:4a:ae:0f:a0:f4:d2:8d:02:f9:0f:72: 50:c0:7d:24:0a:b2:2f:6f:33:9e:c0:d7:ed:56:18:9d: 8e:84:2f:5a:26:21:2a:3a:02:0a:fe:69:6f:08:67:5e: 07:3d:f0:3f:4b:ec:68:51:fc:cc:00:6b:b4:31:0a:89: 54:ee:71:31:d3:0e:3b:76:e2:cd:1a:52:12:71:07:5b: 90:b7:e3:4b:7e:55:d5:f0:e8:02:07:a9:81:91:25:4b: a5:c6:7f:fb:5f:71:db:ae:98:55:77:a3:ad:e1:55:af: 28:01:08:d6:60:5d:88:97:0a:31:8d:ac:91:6a:fe:fc Fingerprint (SHA-256): 57:56:07:11:D7:2E:70:5C:BC:D4:7F:42:31:32:24:39:CC:D6:62:4E:15:E1:75:3D:F1:88:8B:72:E3:77:78:99 Fingerprint (SHA1): 27:E4:A5:AC:EC:F5:72:AA:D7:18:E4:0B:44:98:AE:9D:E8:83:2D:6B Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #15057: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195785 (0x13bda589) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 20:44:25 2017 Not After : Thu Mar 31 20:44:25 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:3c:8b:d4:36:d5:1c:0b:d3:f4:f1:a9:eb:c1:23:65: 2f:10:55:3d:50:56:d2:d4:b9:7d:82:85:57:a1:c2:6e: 73:90:c0:ad:47:23:58:13:77:1b:b1:dd:98:db:79:a2: be:44:83:57:1c:9c:2f:32:18:47:38:79:70:e5:1a:f4: 73:07:3d:eb:88:43:1b:ac:1d:8f:15:c7:e9:ba:66:cf: 3e:6d:55:3d:a2:bf:c4:ad:cc:79:f2:40:df:fb:04:9a: 37:6a:b3:8e:8f:6d:9f:bb:97:2f:25:da:b7:4b:6f:b3: 24:56:29:0a:1f:f3:e3:87:e8:d5:d4:57:81:9a:1f:d3: 40:c0:96:97:a1:2b:cc:d9:d7:c9:9b:d0:22:e2:d8:ac: 44:98:9d:c9:2a:43:97:5f:12:dc:ec:e3:db:b1:f4:03: 17:58:f1:45:0a:4e:72:f7:9c:95:b7:5b:38:1a:cc:0b: 34:5a:df:8b:86:3e:fa:3d:8e:89:7f:9f:3d:f2:c8:dc: 08:b9:fd:7d:c3:d9:e4:fd:fb:7b:9c:3f:48:7b:65:b8: 92:9b:9b:54:6c:58:d1:5d:06:6e:a2:5f:44:58:db:1b: 05:57:71:e2:b8:b5:48:9a:c3:5e:53:02:8f:b1:28:5e: c8:a4:3d:f6:67:86:cc:a7:86:38:3a:ba:55:a1:84:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:76:6d:60:ee:20:9e:22:a0:51:13:af:78:63:8b:90: 80:c0:de:d6:dd:f8:50:a3:29:36:0f:55:27:82:b4:0c: f1:de:56:d1:18:d0:9a:ce:b4:25:ba:74:4c:da:ea:09: e1:a3:7c:9d:12:0b:ce:9b:bd:83:17:0b:63:35:a1:88: 02:27:97:07:fd:fd:6a:91:73:a9:e1:0d:d2:d8:83:50: b4:c5:b8:26:c2:66:96:da:72:76:e0:dc:21:10:34:eb: 8a:77:23:97:6c:cb:86:36:d6:0c:e1:8d:16:eb:6d:bc: 8d:c1:20:3f:53:05:4c:20:ed:dd:54:8f:e9:21:43:51: 75:83:38:f6:bd:4a:ae:0f:a0:f4:d2:8d:02:f9:0f:72: 50:c0:7d:24:0a:b2:2f:6f:33:9e:c0:d7:ed:56:18:9d: 8e:84:2f:5a:26:21:2a:3a:02:0a:fe:69:6f:08:67:5e: 07:3d:f0:3f:4b:ec:68:51:fc:cc:00:6b:b4:31:0a:89: 54:ee:71:31:d3:0e:3b:76:e2:cd:1a:52:12:71:07:5b: 90:b7:e3:4b:7e:55:d5:f0:e8:02:07:a9:81:91:25:4b: a5:c6:7f:fb:5f:71:db:ae:98:55:77:a3:ad:e1:55:af: 28:01:08:d6:60:5d:88:97:0a:31:8d:ac:91:6a:fe:fc Fingerprint (SHA-256): 57:56:07:11:D7:2E:70:5C:BC:D4:7F:42:31:32:24:39:CC:D6:62:4E:15:E1:75:3D:F1:88:8B:72:E3:77:78:99 Fingerprint (SHA1): 27:E4:A5:AC:EC:F5:72:AA:D7:18:E4:0B:44:98:AE:9D:E8:83:2D:6B Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #15058: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15059: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #15060: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195815 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15061: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #15062: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #15063: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15064: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 331195816 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15065: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15066: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #15067: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15068: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 331195817 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15069: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15070: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #15071: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15072: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 331195818 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15073: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15074: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #15075: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15076: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 331195819 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15077: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15078: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #15079: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15080: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 331195820 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15081: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15082: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #15083: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15084: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 331195821 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15085: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15086: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15087: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195815 (0x13bda5a7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:50:48 2017 Not After : Thu Mar 31 20:50:48 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:f1:c5:0c:91:15:72:84:bc:4c:b4:8a:24:83:86:5d: b8:fe:d9:7c:45:cd:2a:40:31:e3:ed:d6:49:46:35:32: b8:53:db:74:7b:1a:7a:b3:68:14:75:20:a4:b6:35:8e: c6:52:3d:2c:f2:7d:45:75:49:f8:2b:af:dc:0e:c7:63: 7e:ee:ec:ce:84:a9:e1:cf:8a:02:cb:a6:57:16:79:cd: 89:16:35:31:c7:a7:9b:22:49:4f:74:d5:9d:e6:5b:cc: 93:02:a3:aa:b8:c7:80:a1:3c:95:82:2f:10:32:eb:f5: d9:75:9e:ff:3e:26:71:4e:8a:e7:e6:b3:cf:7d:a3:f8: 77:74:0f:c9:5c:6e:79:60:26:49:cc:65:1e:cc:d2:71: 0a:c4:11:8e:49:f2:58:63:0a:97:8d:5b:00:d2:ec:00: e4:b7:85:a1:83:4a:32:e8:ff:c7:8d:b9:e8:93:bf:88: a7:a2:65:59:42:28:ba:90:2b:84:55:93:10:23:7c:85: db:8a:4a:d4:7f:ba:1c:20:9d:4d:5d:f0:db:a9:c1:dd: 44:1a:4e:82:c7:99:b6:ed:db:8f:a4:ba:c2:06:76:11: eb:f7:44:b7:91:17:7f:32:c6:ad:fb:fa:99:3e:fd:52: e3:93:fb:47:f2:f4:af:89:f6:54:b7:0f:aa:65:6a:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:3a:bd:9d:6d:b1:20:98:d7:ae:71:9e:9e:c6:74:e7: ce:42:18:b4:55:0d:60:2a:c8:10:7c:b3:a4:0e:78:69: 76:c5:23:57:e5:80:a7:44:7a:0d:e7:af:7e:9d:e1:45: 71:e7:7c:be:e9:3c:3a:8e:fa:10:52:ba:73:39:84:92: 7f:72:dd:d1:b4:f2:ba:81:65:cf:37:42:24:24:e4:b4: 26:28:be:c7:af:65:91:22:88:5f:61:af:b2:e6:be:a8: e4:f3:90:84:fb:66:c0:d9:cc:64:54:81:2a:1c:b4:c9: eb:95:29:61:df:1f:7d:a4:db:02:d5:07:6a:5a:3e:36: cc:89:bb:a6:d2:16:a3:15:60:e4:e6:be:ae:07:95:73: 5c:3e:52:db:4d:9c:0a:7e:b5:e2:71:d5:4e:50:d1:c7: 1e:d1:5a:be:27:9b:30:08:db:d9:0a:eb:e3:de:6c:40: a6:eb:e3:31:28:1d:ed:c0:54:54:71:72:84:80:88:7f: 9b:b2:fb:74:c3:13:c9:2f:46:c9:01:9e:ab:10:c1:39: 8d:b5:1f:70:d2:57:bd:a5:8d:93:f3:9d:a3:4a:9e:1f: eb:1f:13:59:7a:e8:0a:63:d3:e3:05:7c:d9:5a:6a:b8: ca:2c:2d:83:99:37:b9:d4:4c:30:e3:da:97:82:5d:72 Fingerprint (SHA-256): 5A:CC:8E:C9:65:0F:68:A9:5A:81:5F:3F:0A:10:58:27:F6:6F:D9:7E:7C:BD:B7:E4:7A:9D:BE:D3:79:A5:0C:FA Fingerprint (SHA1): 25:24:6E:E2:EB:33:5F:01:DD:60:88:6B:EE:41:3A:3D:71:55:89:E5 Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #15088: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15089: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15090: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #15091: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195815 (0x13bda5a7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:50:48 2017 Not After : Thu Mar 31 20:50:48 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:f1:c5:0c:91:15:72:84:bc:4c:b4:8a:24:83:86:5d: b8:fe:d9:7c:45:cd:2a:40:31:e3:ed:d6:49:46:35:32: b8:53:db:74:7b:1a:7a:b3:68:14:75:20:a4:b6:35:8e: c6:52:3d:2c:f2:7d:45:75:49:f8:2b:af:dc:0e:c7:63: 7e:ee:ec:ce:84:a9:e1:cf:8a:02:cb:a6:57:16:79:cd: 89:16:35:31:c7:a7:9b:22:49:4f:74:d5:9d:e6:5b:cc: 93:02:a3:aa:b8:c7:80:a1:3c:95:82:2f:10:32:eb:f5: d9:75:9e:ff:3e:26:71:4e:8a:e7:e6:b3:cf:7d:a3:f8: 77:74:0f:c9:5c:6e:79:60:26:49:cc:65:1e:cc:d2:71: 0a:c4:11:8e:49:f2:58:63:0a:97:8d:5b:00:d2:ec:00: e4:b7:85:a1:83:4a:32:e8:ff:c7:8d:b9:e8:93:bf:88: a7:a2:65:59:42:28:ba:90:2b:84:55:93:10:23:7c:85: db:8a:4a:d4:7f:ba:1c:20:9d:4d:5d:f0:db:a9:c1:dd: 44:1a:4e:82:c7:99:b6:ed:db:8f:a4:ba:c2:06:76:11: eb:f7:44:b7:91:17:7f:32:c6:ad:fb:fa:99:3e:fd:52: e3:93:fb:47:f2:f4:af:89:f6:54:b7:0f:aa:65:6a:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:3a:bd:9d:6d:b1:20:98:d7:ae:71:9e:9e:c6:74:e7: ce:42:18:b4:55:0d:60:2a:c8:10:7c:b3:a4:0e:78:69: 76:c5:23:57:e5:80:a7:44:7a:0d:e7:af:7e:9d:e1:45: 71:e7:7c:be:e9:3c:3a:8e:fa:10:52:ba:73:39:84:92: 7f:72:dd:d1:b4:f2:ba:81:65:cf:37:42:24:24:e4:b4: 26:28:be:c7:af:65:91:22:88:5f:61:af:b2:e6:be:a8: e4:f3:90:84:fb:66:c0:d9:cc:64:54:81:2a:1c:b4:c9: eb:95:29:61:df:1f:7d:a4:db:02:d5:07:6a:5a:3e:36: cc:89:bb:a6:d2:16:a3:15:60:e4:e6:be:ae:07:95:73: 5c:3e:52:db:4d:9c:0a:7e:b5:e2:71:d5:4e:50:d1:c7: 1e:d1:5a:be:27:9b:30:08:db:d9:0a:eb:e3:de:6c:40: a6:eb:e3:31:28:1d:ed:c0:54:54:71:72:84:80:88:7f: 9b:b2:fb:74:c3:13:c9:2f:46:c9:01:9e:ab:10:c1:39: 8d:b5:1f:70:d2:57:bd:a5:8d:93:f3:9d:a3:4a:9e:1f: eb:1f:13:59:7a:e8:0a:63:d3:e3:05:7c:d9:5a:6a:b8: ca:2c:2d:83:99:37:b9:d4:4c:30:e3:da:97:82:5d:72 Fingerprint (SHA-256): 5A:CC:8E:C9:65:0F:68:A9:5A:81:5F:3F:0A:10:58:27:F6:6F:D9:7E:7C:BD:B7:E4:7A:9D:BE:D3:79:A5:0C:FA Fingerprint (SHA1): 25:24:6E:E2:EB:33:5F:01:DD:60:88:6B:EE:41:3A:3D:71:55:89:E5 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #15092: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15093: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15094: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #15095: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195822 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15096: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #15097: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15098: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15099: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331195823 --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #15100: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15101: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15102: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15103: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331195824 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15104: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15105: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #15106: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15107: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 331195825 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15108: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15109: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15110: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #15111: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #15112: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #15113: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195822 (0x13bda5ae) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:52:30 2017 Not After : Thu Mar 31 20:52:30 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:ed:41:6b:3b:d7:fb:d2:64:08:d6:d8:84:d6:bf:ec: 02:62:9d:37:83:0c:0a:df:84:94:54:9c:fd:fc:12:9c: f6:f4:6e:63:8f:40:ac:ec:85:33:bf:36:c2:45:cb:6c: f8:aa:53:a0:30:81:9d:12:61:6f:5f:9f:63:4a:92:31: 62:4d:a2:f6:b8:ca:66:35:9d:17:3f:08:e6:0d:0e:90: 6d:72:d4:cc:07:de:2c:20:e5:04:7b:aa:ec:53:3b:aa: ff:8a:ee:c1:69:3e:22:92:76:47:d2:6a:67:ef:11:9f: 1c:05:e1:f9:3f:81:a2:75:57:b0:78:c8:90:7a:16:87: 83:2c:32:6d:f6:69:dd:74:d5:69:11:ed:f3:dd:4b:60: d2:a0:36:a7:88:aa:78:de:43:4a:1c:db:75:41:4d:8d: 41:a2:84:c4:c4:c9:50:b9:f7:f8:5b:e8:69:0d:a8:fd: d4:78:00:34:da:83:95:26:1c:ec:99:46:eb:b4:f0:92: 12:56:83:14:9c:45:b0:de:16:fd:ad:17:8f:a4:65:d1: af:80:36:a6:36:7e:59:ae:cd:82:b7:98:73:06:18:7e: d4:f1:79:a0:52:9c:bd:c1:13:83:bd:fb:59:a5:2c:bf: 67:b3:fa:41:20:7c:ef:f6:92:34:b0:8d:84:ab:9e:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:96:a2:f4:42:71:1e:64:c7:a5:b2:d8:94:21:80:0a: ab:53:2f:2b:ba:12:e2:07:f7:95:41:2f:35:a3:62:48: b4:79:66:b6:9c:6e:f1:87:20:e6:e1:06:c3:2a:27:f0: b9:9f:2a:55:dd:af:53:3a:c5:00:03:81:cc:db:b8:98: 6d:2f:cd:aa:97:b7:cc:f0:b2:7a:50:a3:ac:fc:e5:9f: ca:d3:17:c1:63:36:12:c1:cb:bc:03:61:e3:ea:fe:b3: 99:5c:43:42:d7:aa:a5:d2:7d:ea:e0:47:72:2a:2a:d0: d3:64:c3:84:b5:15:15:c0:4b:b8:c0:66:f3:f3:b2:66: 79:6f:f9:c0:b6:e1:84:a3:62:50:31:b4:2a:2f:15:9c: e9:20:68:21:0a:71:ae:e7:98:12:6a:b0:87:04:51:d8: 3d:9a:7b:16:fb:c7:b7:7a:91:b1:11:48:18:e2:a7:24: 09:95:38:e4:f7:7b:5a:fb:18:93:d0:2c:ee:79:ed:dc: 7e:fb:f2:14:69:f5:87:db:9d:c5:21:e5:55:7f:5f:80: 78:38:3d:f5:3f:e0:60:86:f7:fb:74:b4:76:15:18:d7: 30:c3:15:f8:d6:8a:6d:b5:9d:3e:00:86:f7:d7:e3:a5: c1:f9:89:8f:43:85:b0:62:01:46:b1:da:a2:50:bd:7b Fingerprint (SHA-256): 8F:99:38:86:BD:99:A8:C3:05:F3:FD:74:0C:4E:E3:92:21:67:B5:DF:D0:DA:52:A1:E2:CA:FF:91:76:EF:BA:95 Fingerprint (SHA1): EB:CD:74:2A:10:98:66:26:4D:70:E0:2B:BE:A3:14:78:99:12:3C:11 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15114: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15115: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15116: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195823 (0x13bda5af) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:52:40 2017 Not After : Thu Mar 31 20:52:40 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:24:b0:f7:e6:fe:f9:e9:d8:ab:9a:31:d2:ef:76:de: c0:ef:9f:8a:ab:f4:4c:79:dd:e6:f2:06:49:48:b7:b1: 84:3a:2a:aa:e3:e4:0d:41:bf:4c:77:ed:11:1d:fe:3f: ac:25:5c:33:d1:11:19:1c:0c:24:b8:9d:9b:b1:60:16: c0:42:bf:de:80:4e:4d:82:60:b5:4b:43:56:4e:f6:19: 0a:9f:a2:78:e3:9f:ff:2a:fa:30:70:65:34:b7:b5:07: 31:01:d2:af:ae:8d:3b:fd:c7:a6:22:f6:f3:40:a4:46: 1f:75:37:fa:74:d0:bd:08:7b:72:16:8c:4d:92:7c:ce: 0e:07:90:45:b2:96:88:1f:39:16:6d:40:8c:6d:d5:2e: 4c:70:ce:9b:ca:af:2b:36:91:01:d5:f5:80:fc:69:67: 51:0b:1f:e2:a7:3a:73:3d:d6:f5:e9:9b:9b:a9:2d:22: 49:bb:31:1e:ff:37:ae:9d:1f:e2:6a:b4:0b:49:15:1c: 70:a6:eb:2b:69:4d:db:48:b8:62:e5:3a:0e:5f:18:4a: 52:f5:31:73:c9:ac:75:8c:be:b8:b5:fc:1c:ba:04:bf: d1:63:59:9f:e7:64:85:8a:aa:9d:8c:7d:98:18:a9:5c: 33:b5:30:e7:97:0c:aa:e6:43:0f:ab:c5:08:22:c2:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:e5:17:22:7c:a1:8b:4e:74:27:e0:f6:53:3f:f3:93: 1d:2f:02:82:36:42:ce:ce:22:b5:cb:f8:c4:cc:8c:ea: d6:c4:33:6f:ef:f7:83:ca:3f:23:40:41:cd:6d:63:a7: 67:de:e5:e1:3e:6a:17:2f:54:c8:2a:a2:0c:8f:6b:00: 2d:74:bf:fc:65:b0:51:cd:9d:6e:42:2f:82:3c:e5:37: bd:66:ac:9c:15:64:8f:25:f5:ef:14:e6:a2:a5:46:54: 8e:57:36:79:cf:12:6d:71:a6:ab:70:4e:a6:e5:2a:35: ba:80:4c:95:85:c2:82:a7:0a:b0:da:a9:52:19:33:4a: cc:6c:a5:38:74:9b:1c:4e:08:52:61:38:53:83:c0:5d: b5:a5:69:21:a5:e1:ff:2f:aa:9b:5f:e8:b9:33:cf:24: 58:1d:12:9e:23:a6:f2:19:d0:13:05:96:4a:9b:87:68: b5:bb:bd:5f:45:4c:4c:e7:0f:da:a4:a7:4b:65:20:eb: d8:17:2c:77:a0:dc:94:30:60:da:87:a1:9f:9b:fd:50: f2:8b:23:ca:c7:28:08:a6:7e:51:d3:d1:27:73:bd:68: 20:25:1d:01:77:4c:e7:17:f2:a8:1e:1e:a5:a3:5d:9c: 24:4d:98:9b:b2:b4:ce:88:9d:b8:b7:0b:f4:55:30:c0 Fingerprint (SHA-256): 86:20:22:83:B0:6A:3D:B1:C6:1B:07:08:92:EA:25:98:A7:5D:9B:B9:2C:4C:B9:98:5F:88:DE:FB:C1:18:27:50 Fingerprint (SHA1): A7:00:0B:16:2B:82:E6:50:19:8E:B6:9C:E0:AA:C5:35:FF:C6:E2:D1 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #15117: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15118: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195824 (0x13bda5b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 20:52:51 2017 Not After : Thu Mar 31 20:52:51 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:04:6a:b9:b3:80:ce:5e:e8:b3:10:26:47:11:87:a2: 2e:5e:8d:27:b5:37:e5:b9:2f:4a:79:4e:2a:c6:39:3a: 4c:bc:f1:d9:6d:61:3c:f9:3a:bf:f1:8e:c8:2a:d8:a4: 7a:b9:ad:37:32:5b:66:3c:7a:f5:c2:d6:e7:be:7e:2b: 44:64:86:fc:3c:d4:c6:08:b2:10:cc:91:9f:ba:fc:13: 1f:d2:b4:1f:f0:36:73:f8:15:25:f3:1b:2b:8b:10:cf: 85:76:44:0f:8f:c9:27:6a:c6:a1:26:69:c8:c9:a6:08: 9e:eb:26:32:59:90:1b:d9:09:b5:b5:67:f9:33:57:07: 67:ee:9f:ac:70:d7:fa:d7:10:58:e6:56:3a:be:58:80: f3:05:bd:f9:7a:f6:0d:4a:c6:68:5b:79:61:ac:e7:11: ac:df:72:50:22:04:71:33:9b:a5:c2:fa:0d:2b:d2:98: b5:c4:cb:bf:25:d3:d2:af:e3:d8:9a:74:55:3e:ca:ed: 8d:f2:5d:61:50:60:8f:b3:98:9b:13:44:48:60:87:cf: 66:22:a5:87:5e:a4:c3:02:e2:ef:4e:dd:63:56:7f:89: 37:91:67:1f:63:b2:ea:ff:ec:a6:28:01:64:91:02:cd: 98:56:06:e9:c2:b2:2d:e5:8e:c4:53:3f:5b:16:c1:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:02:92:14:1f:c8:eb:d3:96:1a:10:a2:64:86:88:08: d7:b8:2b:72:2a:fe:51:8f:a5:9f:2e:0a:f3:2d:d7:82: 8b:cb:18:70:fb:e7:94:20:8a:c3:2d:64:8f:fb:ff:17: 56:7f:ff:ee:35:52:ac:5f:44:72:70:e5:04:4c:2b:d5: 82:7b:37:e7:18:38:74:97:77:d8:41:c6:17:c6:0a:67: ca:55:2b:96:63:ec:fb:f3:3e:da:e6:35:1e:b8:9c:99: b2:09:a1:97:d8:86:b2:27:b7:0e:34:07:ab:2d:f2:68: e3:fd:c6:6e:de:5b:8b:6f:a4:d5:a6:a2:a1:5c:e5:03: b4:3d:87:bc:f2:de:cc:b9:82:35:99:7a:0e:ca:c7:b4: f3:76:49:fb:a1:aa:2f:34:9d:71:ed:91:a4:03:cc:af: fd:43:c5:e1:41:0b:1e:cb:2f:e7:dd:ae:6d:52:01:a8: 73:7b:d5:b5:e4:7d:39:b5:bb:40:06:57:34:d3:b9:41: 6d:a9:07:eb:df:66:b3:91:25:03:1d:2c:e2:8f:0d:9a: 52:2a:21:67:06:0e:f8:fc:44:40:1c:fe:62:0a:85:33: 02:f2:c0:69:f2:44:d1:3e:68:be:14:6f:b9:90:78:30: 1c:f4:64:d7:43:8a:5e:7d:d8:1f:df:20:0d:4b:54:39 Fingerprint (SHA-256): 2C:AE:67:C3:FB:5D:B8:73:2E:D8:B0:50:9B:CC:D0:5B:2C:69:52:14:34:C0:D0:6C:AC:3D:5A:34:55:29:8A:0B Fingerprint (SHA1): 21:0C:E3:67:BB:08:68:B7:CF:FF:CC:30:1D:DE:B8:D3:ED:52:CF:26 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #15119: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #15120: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195826 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15121: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #15122: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15123: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15124: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331195827 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15125: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15126: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15127: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15128: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331195828 --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #15129: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15130: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #15131: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15132: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 331195829 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15133: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15134: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #15135: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15136: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 331195830 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15137: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15138: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15139: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #15140: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #15141: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #15142: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #15143: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195826 (0x13bda5b2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:53:30 2017 Not After : Thu Mar 31 20:53:30 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:ec:c1:38:1d:03:c1:ef:62:33:45:16:30:91:a7:d7: 9d:e0:e2:2b:4a:50:ba:08:9f:7f:4c:34:1d:53:b3:94: 3d:1b:fb:c8:29:27:63:c5:5c:d8:84:0e:68:c7:ca:92: 17:05:d0:6e:49:ca:3b:27:fc:e9:e8:fb:c0:21:26:a4: 99:6a:8d:e5:15:17:93:0a:f8:7e:83:cd:62:b1:30:13: ea:fb:59:2f:6c:ac:1f:60:86:4f:67:0e:cf:a2:28:5a: 96:94:bd:bb:45:df:ee:51:70:58:67:d6:c8:58:c9:bf: 26:27:3e:79:71:71:c2:46:d7:75:61:51:74:b3:a4:33: 59:c3:87:9a:c9:b4:af:0a:db:71:be:5c:97:c2:14:32: 69:cc:3e:70:15:f8:ee:2c:27:5f:b3:6c:03:40:9b:83: 5b:82:fa:9d:ce:ff:74:a7:e6:44:cd:a4:42:80:23:e6: 25:cd:d8:ca:70:3b:ed:8a:5e:5d:22:c0:19:f2:1a:d4: 04:b2:cf:08:0e:94:5a:a1:db:14:21:e1:57:bf:ee:66: dd:ab:07:e5:4c:59:84:26:0a:e8:80:1f:ae:cf:00:ed: 45:3b:30:99:e4:5c:cd:e6:63:1b:24:26:ba:4d:65:85: 3c:9d:0f:10:cf:7c:3a:94:11:30:ba:f1:dd:24:ac:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:35:98:93:72:76:e0:64:8a:3d:51:73:1c:d1:46:f4: 22:97:b6:cc:d6:4b:05:29:f3:b5:9e:a0:d7:cc:ad:ee: f1:f8:87:96:c1:a8:ac:19:8e:5d:e1:fc:8c:6c:16:c8: a8:2f:b0:8f:dd:fd:b1:6c:e8:b2:4b:32:9d:74:97:4e: 14:9e:6c:49:5f:bd:21:43:05:c5:d5:ec:00:ab:fa:8c: 2d:e4:63:63:36:97:5e:e7:18:58:51:6f:b8:da:d2:62: 2a:18:02:63:99:8d:36:57:95:0d:54:f1:1d:d3:ef:18: 97:99:88:9b:a6:12:78:b3:90:90:8a:3d:54:08:f8:e8: 17:4c:f0:b0:5f:89:71:11:63:4f:a6:60:15:d6:a3:0b: d2:5b:da:9c:8c:25:f7:e8:49:16:c3:f5:dd:ef:92:f2: af:5b:58:8f:32:e8:dd:00:36:0d:a1:69:0e:aa:34:cf: 38:e2:de:b0:45:26:ce:3b:25:5f:cc:94:0b:35:63:7e: 1c:66:69:3c:6f:7d:1c:a4:16:cb:cd:ba:4a:3b:6c:2d: 90:2a:10:ac:1b:63:2b:71:60:1a:bc:6c:26:5d:12:69: 83:a8:8e:0e:d8:8b:a4:ba:ed:d1:c0:63:b7:78:d9:ca: 08:e2:7b:a1:f9:8d:62:08:88:27:ea:6e:0d:65:c0:95 Fingerprint (SHA-256): 7D:25:0B:B2:3A:5C:1F:82:BF:32:4E:3E:2D:05:AD:0B:CE:64:EC:9F:2B:C9:E7:56:4F:0B:CE:30:82:F6:C9:46 Fingerprint (SHA1): A2:FD:27:4B:EF:3F:1A:79:72:22:8A:45:41:FC:DF:49:C0:22:41:12 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15144: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15145: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195827 (0x13bda5b3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:54:01 2017 Not After : Thu Mar 31 20:54:01 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:25:8c:76:50:44:fa:48:95:70:9d:60:b6:ad:95:3a: c5:e6:c4:c0:cd:50:3a:7d:ca:61:4a:06:5a:2d:71:7c: bd:0c:b8:d7:ec:99:83:3f:c4:1a:fe:0f:25:83:04:c0: 56:32:79:8c:a7:ef:74:00:5a:da:45:fb:db:13:ad:fa: 7b:4b:9d:22:8d:95:63:5d:28:c1:61:2f:d4:ad:4b:6a: a9:cc:45:28:c1:84:32:f9:b4:1f:83:3e:16:d7:1c:9b: 81:97:f3:45:72:2e:f1:24:c5:a5:38:b8:52:e3:f7:4a: b7:70:6a:6b:35:9c:10:d1:31:c4:cd:24:08:3a:35:85: a8:0a:a8:4e:c9:9b:8e:d1:6f:f8:a4:ad:11:4f:95:4e: 6f:11:04:ae:e5:8b:3f:f4:1b:2e:ca:50:23:9d:45:c4: 54:c5:61:60:22:21:a8:9c:63:4b:a3:81:1f:ed:a2:8e: cc:32:fc:0a:05:98:4e:ab:a2:48:ce:4f:b4:14:5e:63: 4d:9b:43:01:cd:b5:7c:a4:bb:22:43:75:42:de:1a:24: 5a:9f:38:65:a6:51:29:ab:c8:7d:18:02:35:15:7c:52: 4e:c1:01:a9:7e:51:3b:f6:53:1f:f3:bd:c6:f7:e6:c4: a7:50:97:a3:39:75:60:6f:98:6c:ee:be:13:15:30:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:2c:ed:84:03:23:8c:ec:b8:8b:46:40:48:01:a4:66: 86:1e:c0:d7:8f:25:02:4f:3a:bd:03:1c:3e:d2:92:bf: ca:95:1d:bb:b9:38:4c:ed:b6:ad:69:31:78:06:db:fe: a2:b2:fd:34:3b:06:0b:75:78:6f:b0:a0:dd:6d:8b:cc: 48:a2:eb:11:9f:79:c8:62:11:58:d4:3c:d8:f4:b6:b2: 00:69:85:84:26:40:72:47:f3:2b:55:a1:c1:8b:78:bb: 7f:3d:ca:cb:8a:f3:5f:f9:40:63:be:b3:8d:af:68:98: 0e:9e:b1:67:e2:71:75:77:4d:68:04:88:1e:50:84:68: e3:74:7c:75:88:1d:f3:df:55:b2:29:e7:3b:66:bd:e7: d9:ef:4e:f9:1f:50:3e:e4:65:e0:29:a0:42:22:80:60: c1:fa:de:83:ab:23:53:0e:5b:3c:19:4c:ef:01:77:87: da:03:38:49:97:ce:bd:d9:72:37:7b:8f:c7:da:ba:a2: 80:58:6a:e8:85:b2:98:32:3e:ca:09:0a:d7:e0:a1:0a: dd:6b:1c:f6:6b:27:f1:b9:a0:04:6e:f4:a8:89:30:31: a9:ef:6a:50:bc:30:23:c8:38:8e:39:14:4f:4c:ad:f8: 37:d7:6a:9a:8c:a5:b7:87:c1:fc:16:89:c9:c9:2c:29 Fingerprint (SHA-256): 70:65:A4:32:DC:D8:DB:0F:02:78:4D:C3:6C:F3:32:09:61:BC:CD:A4:62:1A:64:54:FF:6A:14:68:7D:E9:62:DD Fingerprint (SHA1): 09:A0:34:92:E9:64:A2:BF:69:62:19:81:55:08:44:C9:C9:F4:58:1A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #15146: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15147: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15148: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195828 (0x13bda5b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 20:54:10 2017 Not After : Thu Mar 31 20:54:10 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:27:44:b3:27:37:94:03:a3:de:db:5f:77:2a:c0:55: 2c:b7:41:a5:e7:2a:a1:ab:a4:dd:a5:85:2a:68:b3:1c: 37:b0:ee:1e:be:d5:0c:f2:4b:3f:22:57:72:24:51:31: 8e:00:14:d6:d2:b8:0f:57:43:49:55:a1:6a:42:48:b5: 6d:af:ac:86:eb:51:f1:69:be:1d:db:7e:4d:a7:a3:03: 3e:fe:91:38:fc:38:29:fd:6d:0e:58:fa:1f:a6:52:78: 91:a7:fd:96:d3:29:0f:05:6f:4d:76:b8:7c:f2:68:f1: 8b:01:ae:2b:e9:35:29:5f:f7:46:b8:5a:6c:04:5a:22: a6:d0:03:5e:6d:46:4e:49:a9:5e:ae:52:7b:90:2e:ec: fd:eb:ed:90:ee:e0:e1:48:dc:a5:65:56:fc:76:ee:9b: 7b:c8:c1:34:06:2d:75:88:4a:04:63:bd:e1:7a:8c:71: 17:1e:9e:9b:51:cc:24:ab:9a:4d:8a:3d:b7:32:4a:50: 13:7b:e4:5c:e5:16:1d:f1:f4:5f:85:7e:90:fd:2f:33: 73:b6:f3:4f:d3:c7:a6:ff:bf:c6:e5:cd:db:68:bd:e3: 35:ed:5f:9f:8e:6d:31:ea:91:c8:df:2f:54:1e:c3:24: d8:5a:52:34:8e:61:c7:7a:d0:9f:18:e4:9e:bc:df:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:f9:f8:4d:8a:6b:28:79:63:8a:9b:77:da:1a:cf:4b: c9:05:bb:de:ed:24:c7:9e:e3:ab:a4:46:e0:b8:c7:31: 53:db:86:55:95:3b:f7:e6:55:5f:6a:07:db:d1:75:f8: f0:d6:2d:04:20:c5:4b:20:02:e6:9d:2a:27:5f:23:9f: cd:bb:81:44:05:df:7f:89:46:2d:7a:cf:36:67:cc:8a: b9:2c:a1:f1:d9:4d:0c:71:86:94:c6:d8:69:c2:f0:7c: 10:42:9d:b3:17:d8:b8:09:a9:7f:1e:78:f6:ea:b5:dd: a8:9c:fc:35:3f:a4:cd:55:f0:bc:64:2b:b0:9b:16:e3: f5:a0:9d:48:62:bb:82:ce:58:c6:fc:aa:d5:68:92:60: f6:b4:33:e6:df:f2:ba:db:fa:69:16:6c:c4:d9:f3:32: a6:97:7b:84:09:f6:6b:e7:3c:5d:b7:64:cd:1e:9f:4e: a4:3f:d4:8b:09:45:ac:51:f4:ca:b9:4b:3f:ad:84:e8: 66:37:65:4e:ba:bc:c0:31:94:46:78:6f:9f:a1:9a:48: 40:05:9e:1e:9b:64:59:64:d7:08:a4:8b:b4:50:a9:51: a1:0d:fb:25:99:45:ac:f3:04:69:63:9b:8f:46:16:99: 2e:c3:8a:a0:95:a6:dd:7f:ba:aa:99:fc:e2:82:d7:5a Fingerprint (SHA-256): 0E:6B:3D:D5:3D:76:53:B1:97:97:88:B9:DC:B4:A2:8F:E8:11:7D:DE:B3:9D:7F:B3:F4:8D:5E:E0:79:46:02:5B Fingerprint (SHA1): 1F:AA:3B:5B:C3:9E:82:51:50:0C:B3:FB:30:55:FD:35:97:AE:E2:97 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #15149: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #15150: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195831 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15151: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #15152: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15153: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15154: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331195832 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15155: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15156: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15157: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15158: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331195833 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA1Root-331195610.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15159: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15160: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #15161: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15162: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 331195834 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15163: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15164: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #15165: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195831 (0x13bda5b7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 20:54:47 2017 Not After : Thu Mar 31 20:54:47 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:4a:04:86:34:9d:e1:68:f8:3e:86:cc:07:5b:58:17: d7:26:72:c8:48:6f:a8:55:0a:09:99:a1:fc:3e:d1:07: 46:02:92:64:88:10:06:a4:b7:b3:78:11:f5:d7:9d:b8: af:4b:83:70:8e:b9:73:b2:ac:69:20:63:d8:91:dd:81: 72:65:a2:a1:f2:77:b4:38:37:08:91:7a:04:9f:a5:cd: 43:b6:b1:cd:cf:95:b7:41:7d:d9:5a:49:54:ed:da:6d: 9c:46:57:f6:c9:71:88:85:67:ab:3f:e2:92:05:9a:56: d7:18:39:c0:f2:32:2d:1a:f8:e5:1d:a8:da:dd:10:61: 84:40:cf:a1:88:39:56:27:74:1b:2a:4e:4a:a7:05:cb: a6:6c:7f:32:e0:ba:7b:94:10:0c:af:30:1b:5a:25:91: 54:91:b7:ad:2c:9b:6f:62:a7:d9:c1:05:c5:33:41:43: 2c:a1:4e:96:62:40:bf:2e:95:45:a4:8d:d6:45:7a:9b: 5f:ed:26:5a:34:25:fe:e1:48:47:76:b0:2a:87:9b:28: 23:db:7b:4d:4c:27:85:66:ea:cd:0d:1e:10:1c:3c:5e: 2b:ed:d7:fe:2a:f8:f2:61:74:81:c9:26:55:7c:be:b5: d4:b1:e1:18:d5:8d:e7:45:8e:8b:82:10:ab:26:93:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:a8:c5:d2:49:54:bb:0e:3f:92:24:7f:0a:c0:e4:77: 64:85:b5:cf:4c:4a:48:15:6a:8b:cb:60:53:e5:34:ed: ea:b5:8a:e4:10:9f:4c:e7:e1:3e:a3:e0:8a:85:54:48: 7a:30:f2:d8:73:29:d4:3b:a9:3c:c1:29:24:39:8f:e1: f7:79:4b:f5:91:76:d8:0f:43:e4:8e:45:8a:47:4b:89: 09:78:18:69:2b:0d:43:20:f6:71:68:fe:80:6e:8b:b8: 78:4c:84:70:78:84:a4:d8:72:6c:9f:92:34:82:97:d9: bc:66:27:8b:0b:33:c3:62:c5:5f:8b:db:e1:8e:cc:ea: 64:2b:94:d2:89:d0:b2:67:fa:de:9d:27:36:84:4e:9e: bf:06:36:08:83:ac:90:cb:81:95:b4:d5:5a:43:cd:8f: 9d:11:c2:f1:64:e8:9c:2f:54:ef:18:16:fb:0f:73:2b: 98:d9:33:b6:be:88:76:b9:9d:dd:f6:ef:ba:24:96:22: 2d:bc:81:bc:fd:04:dd:9c:1d:ad:49:e8:c3:e1:37:14: c0:c6:ea:4f:e4:02:18:40:93:44:8c:a1:76:1a:84:d4: 47:43:5b:e1:52:f5:05:65:dd:09:cc:43:c3:0c:4a:c5: d3:f8:81:60:71:44:46:21:9b:69:e2:ee:48:b2:21:3f Fingerprint (SHA-256): EC:D9:59:08:EF:F5:56:58:EC:C5:DF:86:91:5E:13:99:D6:A5:D8:3D:EB:0C:62:63:B5:D3:1F:70:2B:52:E5:89 Fingerprint (SHA1): B9:1C:84:1C:6E:9D:09:86:4B:19:FA:79:A8:89:49:ED:37:A4:0C:CB Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15166: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #15167: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195835 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15168: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #15169: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #15170: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195836 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15171: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #15172: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #15173: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15174: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 331195837 -7 Bridge@Army < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15175: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15176: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 331195838 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15177: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15178: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #15179: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15180: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15181: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 331195839 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-Bridge-331195611.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15182: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15183: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #15184: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15185: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331195840 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15186: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15187: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #15188: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195835 (0x13bda5bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 20:55:59 2017 Not After : Thu Mar 31 20:55:59 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:66:63:de:f1:f9:0f:51:16:78:a0:ab:bf:f4:dd:e6: 8f:b1:c7:cc:4c:b9:24:f8:49:c0:de:06:50:f0:e6:89: 08:fe:4d:35:bb:b8:98:eb:ab:ee:e7:45:cd:80:7c:50: b5:2c:1b:c3:ef:88:5e:d2:7c:53:c6:22:c4:1d:01:39: a8:ca:9d:27:2b:9b:63:c5:fd:1e:52:6c:cb:6b:fd:25: 6b:13:da:aa:90:09:e4:65:9d:7d:cb:20:89:fa:ed:2b: 1b:20:39:c0:3f:d1:1a:a0:d4:14:35:80:61:0e:11:81: 1e:3c:87:d4:2b:0e:8f:8f:26:0e:9d:ab:c2:61:c6:3f: 4f:d3:07:c4:1c:af:41:ec:b3:7b:89:4a:93:5b:31:7c: 08:2a:57:d2:d8:b5:32:1f:42:eb:dc:31:17:82:df:f6: e2:fa:aa:77:57:e9:c9:db:91:47:ef:8c:90:aa:e4:b2: a1:a0:c2:f3:01:c8:3d:49:d8:44:6e:a6:cc:a6:7c:db: 21:9e:f6:02:ec:ac:7f:2e:35:70:41:21:24:1a:ae:59: 57:c1:e4:09:07:34:f5:ed:b2:7e:69:a0:16:7e:a8:dd: 63:1e:05:ab:66:f3:5e:02:9f:31:0f:f4:30:a4:9a:b5: 38:db:22:2c:47:a4:01:a8:bf:5b:f4:de:f8:51:9d:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:1a:10:55:5a:1a:95:94:09:21:80:84:9e:55:37:9a: d6:42:46:12:31:5c:71:60:3f:04:e8:bd:9d:62:fc:6f: 5f:5b:b2:44:79:4c:ed:39:2f:c7:68:93:02:d2:32:80: 80:9d:c5:ad:00:7c:f0:d5:8f:aa:75:e8:55:14:86:ef: 4a:ca:6f:54:4d:e5:cb:01:e3:fe:2f:65:df:7d:b4:d4: 3c:d3:cc:be:32:93:0f:09:7a:e3:46:cc:b1:f7:a6:be: c5:7e:4e:7d:13:0c:14:a4:a9:08:5c:94:f4:b0:8d:b6: 28:fc:d4:b6:db:22:6c:95:45:27:4a:ea:90:dc:18:18: 83:da:77:e1:00:85:cf:47:99:45:d1:2f:14:09:ce:95: 78:03:b2:7e:7f:d3:e6:c1:b3:3b:7d:4d:8b:cd:5f:d4: a1:73:12:9b:9f:45:32:d1:b3:7a:83:91:7f:20:1a:00: 90:49:c9:e6:5c:18:72:9b:72:12:24:2d:72:0e:8a:6a: 6e:78:16:28:a6:b3:89:f8:4b:8d:f4:7b:b8:62:38:91: 71:82:87:04:45:d3:4f:c9:b3:30:43:00:23:55:2f:71: d5:50:e4:5b:83:b3:c2:f6:a9:7d:e7:3c:e3:04:e2:73: 24:cc:6b:d7:04:25:31:36:49:31:66:d9:b5:3d:3d:52 Fingerprint (SHA-256): F7:FC:41:79:9A:DA:A4:18:D4:30:7B:EF:DB:8D:24:3D:FC:4C:41:5B:54:E2:F2:39:69:B2:82:B1:CD:15:D0:69 Fingerprint (SHA1): 29:58:F5:72:2C:AC:37:0E:49:4A:0F:1A:3D:4E:5E:D4:FE:84:1E:D8 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15189: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195836 (0x13bda5bc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:56:08 2017 Not After : Thu Mar 31 20:56:08 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:f7:81:6b:80:34:db:3b:96:f0:11:fa:d3:68:be:4c: 0a:02:86:4f:f7:e3:04:d9:43:f0:af:0a:7c:f1:3f:90: 93:54:03:b6:bb:95:ef:21:a8:4e:97:ba:5e:c1:5c:27: 52:a5:b4:8d:c9:07:59:c3:6a:50:0c:2c:55:2a:3d:b2: 72:41:c8:cf:81:73:c6:f5:a6:75:be:fa:eb:8f:42:29: 36:55:b0:cd:a6:4c:3a:7f:65:da:62:20:3c:2f:f9:3e: 7e:5f:a3:37:ac:fd:33:10:e7:4c:a0:fb:09:8a:6f:d3: 6a:45:68:bf:cf:1e:4b:40:56:e4:c8:4b:57:98:84:e2: 90:41:6b:74:35:15:eb:b8:f3:f8:9f:2a:2d:7f:9e:5f: 5b:a8:be:28:cb:fe:ba:af:f7:e7:15:40:4f:0e:00:da: 8e:d4:f2:f6:cb:6f:38:8d:37:9a:ce:2d:55:1b:f5:8c: 78:f1:0c:04:42:76:30:59:0b:39:42:e5:5b:93:06:9b: cb:a6:1e:27:00:d8:f7:06:2d:0d:ec:49:8b:fe:3e:15: 13:39:d1:90:ed:31:d5:84:b1:88:b8:f1:d5:18:70:b4: 5c:ac:5d:5f:a1:55:e1:d8:c7:a6:cc:d8:dc:8c:56:b1: 43:d1:5a:a5:ff:8e:17:37:63:14:f9:aa:b4:31:85:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:41:48:98:77:5c:96:6f:cf:03:f6:4a:7c:d0:dd:5c: 4f:17:85:ce:72:aa:e2:3b:00:82:69:95:5f:0c:65:11: 0a:ca:42:2e:8e:06:ac:06:95:92:c7:7b:99:75:56:7d: 48:d2:ed:1d:33:45:28:29:84:f0:ab:0b:a7:07:4c:a4: bf:40:2d:1f:6a:96:c0:ec:9a:a5:99:65:85:90:c3:af: ba:cc:e2:79:29:a5:20:e3:f2:ce:72:b8:5e:1d:48:1e: c8:17:bd:96:a7:20:15:d3:5e:98:cb:d6:0c:8f:69:f2: 2c:5d:98:aa:0b:0a:f0:34:28:56:30:0e:07:d3:3f:4e: f9:92:00:de:35:fa:13:a4:c9:d1:b7:35:47:f0:75:9a: de:b4:ed:5a:bd:4a:2a:39:bd:0f:f3:af:f8:4f:7b:86: af:4b:80:9a:d3:16:3c:e8:48:f0:ea:55:89:4f:3d:63: 87:af:5e:0c:0a:98:f7:65:04:05:f1:37:ae:a6:79:f1: cd:c2:0d:02:08:47:30:c4:26:0f:7b:a1:a1:9c:92:c1: 6e:00:4a:af:63:d8:23:7c:ff:bf:79:fa:03:81:87:95: 1a:00:7a:60:c6:90:0b:02:a1:69:47:5c:b6:35:96:5c: 0d:41:77:f0:46:2b:d5:57:6e:92:fe:72:17:c2:4a:bb Fingerprint (SHA-256): 24:34:4A:31:F0:87:A1:26:21:F0:18:85:C9:C5:57:0B:9E:A0:BE:62:D8:5E:75:2F:B8:51:07:ED:80:C8:9B:54 Fingerprint (SHA1): 43:B0:8C:74:43:59:F6:0D:57:92:4F:F0:02:9A:27:7F:43:0D:10:F2 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15190: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195836 (0x13bda5bc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:56:08 2017 Not After : Thu Mar 31 20:56:08 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:f7:81:6b:80:34:db:3b:96:f0:11:fa:d3:68:be:4c: 0a:02:86:4f:f7:e3:04:d9:43:f0:af:0a:7c:f1:3f:90: 93:54:03:b6:bb:95:ef:21:a8:4e:97:ba:5e:c1:5c:27: 52:a5:b4:8d:c9:07:59:c3:6a:50:0c:2c:55:2a:3d:b2: 72:41:c8:cf:81:73:c6:f5:a6:75:be:fa:eb:8f:42:29: 36:55:b0:cd:a6:4c:3a:7f:65:da:62:20:3c:2f:f9:3e: 7e:5f:a3:37:ac:fd:33:10:e7:4c:a0:fb:09:8a:6f:d3: 6a:45:68:bf:cf:1e:4b:40:56:e4:c8:4b:57:98:84:e2: 90:41:6b:74:35:15:eb:b8:f3:f8:9f:2a:2d:7f:9e:5f: 5b:a8:be:28:cb:fe:ba:af:f7:e7:15:40:4f:0e:00:da: 8e:d4:f2:f6:cb:6f:38:8d:37:9a:ce:2d:55:1b:f5:8c: 78:f1:0c:04:42:76:30:59:0b:39:42:e5:5b:93:06:9b: cb:a6:1e:27:00:d8:f7:06:2d:0d:ec:49:8b:fe:3e:15: 13:39:d1:90:ed:31:d5:84:b1:88:b8:f1:d5:18:70:b4: 5c:ac:5d:5f:a1:55:e1:d8:c7:a6:cc:d8:dc:8c:56:b1: 43:d1:5a:a5:ff:8e:17:37:63:14:f9:aa:b4:31:85:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:41:48:98:77:5c:96:6f:cf:03:f6:4a:7c:d0:dd:5c: 4f:17:85:ce:72:aa:e2:3b:00:82:69:95:5f:0c:65:11: 0a:ca:42:2e:8e:06:ac:06:95:92:c7:7b:99:75:56:7d: 48:d2:ed:1d:33:45:28:29:84:f0:ab:0b:a7:07:4c:a4: bf:40:2d:1f:6a:96:c0:ec:9a:a5:99:65:85:90:c3:af: ba:cc:e2:79:29:a5:20:e3:f2:ce:72:b8:5e:1d:48:1e: c8:17:bd:96:a7:20:15:d3:5e:98:cb:d6:0c:8f:69:f2: 2c:5d:98:aa:0b:0a:f0:34:28:56:30:0e:07:d3:3f:4e: f9:92:00:de:35:fa:13:a4:c9:d1:b7:35:47:f0:75:9a: de:b4:ed:5a:bd:4a:2a:39:bd:0f:f3:af:f8:4f:7b:86: af:4b:80:9a:d3:16:3c:e8:48:f0:ea:55:89:4f:3d:63: 87:af:5e:0c:0a:98:f7:65:04:05:f1:37:ae:a6:79:f1: cd:c2:0d:02:08:47:30:c4:26:0f:7b:a1:a1:9c:92:c1: 6e:00:4a:af:63:d8:23:7c:ff:bf:79:fa:03:81:87:95: 1a:00:7a:60:c6:90:0b:02:a1:69:47:5c:b6:35:96:5c: 0d:41:77:f0:46:2b:d5:57:6e:92:fe:72:17:c2:4a:bb Fingerprint (SHA-256): 24:34:4A:31:F0:87:A1:26:21:F0:18:85:C9:C5:57:0B:9E:A0:BE:62:D8:5E:75:2F:B8:51:07:ED:80:C8:9B:54 Fingerprint (SHA1): 43:B0:8C:74:43:59:F6:0D:57:92:4F:F0:02:9A:27:7F:43:0D:10:F2 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15191: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #15192: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195841 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15193: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #15194: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #15195: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195842 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15196: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #15197: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #15198: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15199: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 331195843 -7 Bridge@Army < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15200: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15201: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 331195844 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15202: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15203: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #15204: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15205: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15206: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 331195845 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-Bridge-331195612.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15207: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15208: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #15209: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15210: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331195846 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15211: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15212: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15213: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15214: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 331195847 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-BridgeNavy-331195613.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15215: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15216: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #15217: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15218: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 331195848 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15219: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15220: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #15221: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195841 (0x13bda5c1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 20:56:58 2017 Not After : Thu Mar 31 20:56:58 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:06:77:00:0b:02:39:7d:a3:e0:46:cc:35:c9:16:68: aa:46:80:f9:05:53:51:bf:82:a3:60:4a:e4:03:ee:67: be:83:91:39:5f:f9:82:99:b8:df:59:f3:a5:64:e8:91: 8b:97:39:2b:c3:4b:74:b5:e2:fb:cb:14:4d:27:73:ab: b5:84:d4:a1:43:64:02:6e:9f:d4:cd:84:db:9f:ad:24: ab:2c:04:32:cf:0d:61:fa:d3:54:22:af:8e:47:f6:33: f2:db:1b:20:d9:7c:b0:5a:a8:d1:8b:94:7a:bb:d9:ab: 7d:e6:d8:86:7d:28:5f:3e:a2:ae:03:05:58:ad:83:d3: e3:1e:2c:32:d5:9e:d1:71:97:96:75:97:5f:69:70:b6: c2:af:83:ca:94:05:9f:53:18:df:d8:71:1c:31:82:3f: 62:91:af:15:3a:1a:a5:22:25:37:d3:5b:01:4d:2a:d6: 1f:fa:13:29:95:a2:53:ba:0e:1b:9a:9e:88:45:2d:34: ef:f6:b9:70:69:22:d5:ac:58:f3:96:08:73:1a:5c:35: 62:1f:5b:9a:94:8e:1a:bd:0f:1f:7a:66:09:48:b4:dc: 47:b2:5a:9e:e0:a3:c5:85:87:26:c6:90:dd:2b:65:fa: 52:16:77:16:a9:49:d1:c4:6d:59:be:c1:3c:5a:93:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ab:f0:6a:5b:47:f4:6b:99:89:6b:09:ba:f4:71:40:9e: 4e:fd:ba:3a:7e:c8:84:bf:ed:96:f7:c4:29:8d:f0:7c: 1f:3f:a2:fa:27:14:71:66:ef:ec:fc:5a:30:91:54:d2: 06:c4:7c:ce:ad:2b:15:0f:6d:1c:f3:24:e1:52:c1:cc: 8e:fa:d7:89:c4:2d:05:e1:bd:69:fb:fe:ba:31:3b:59: 66:40:38:39:c2:06:3b:d8:8c:12:67:80:e4:73:07:d9: fc:11:06:7d:68:c8:9a:53:73:63:6b:9e:4c:23:a2:d4: dc:3d:26:d6:6c:30:f7:bc:29:2a:d9:13:05:86:d1:76: 6b:88:86:1f:bc:2a:2f:14:11:84:df:dd:21:78:55:d2: cf:08:3d:a6:8c:13:1d:2e:ff:e4:db:48:74:10:54:69: 43:33:b3:06:b6:44:76:49:8f:2c:1c:26:08:81:5d:18: 2b:56:7f:f0:a5:73:60:19:4b:a1:d1:c3:fb:f8:56:26: f7:dd:57:10:fc:3e:ae:94:cb:ff:43:39:f5:58:f7:ba: 76:c0:5b:57:13:ae:4d:14:1c:04:d3:d5:08:5a:bb:9c: 98:31:a4:9d:35:f0:72:cd:35:89:87:e9:83:39:71:0a: f2:f1:3b:b7:ac:7a:e0:3d:1f:6b:64:be:b6:c5:59:af Fingerprint (SHA-256): C2:EE:83:17:D0:A5:A4:03:41:BA:80:53:3A:AD:F4:E7:8C:42:6A:FF:D1:63:DF:CF:F9:41:2B:22:66:79:71:F5 Fingerprint (SHA1): 2D:12:3F:04:A0:3D:73:DF:3F:29:3E:2C:61:92:12:FC:AF:E5:20:1E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15222: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195842 (0x13bda5c2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:57:16 2017 Not After : Thu Mar 31 20:57:16 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:ec:d9:d9:98:23:cc:15:01:57:5f:b6:7c:94:01:5f: 11:57:e5:94:6d:cc:38:a5:77:43:38:9b:25:72:b0:05: 3f:a3:ac:cb:b1:fc:59:b2:8b:be:d6:fc:93:24:d9:39: a4:8e:6c:76:1c:c3:01:ab:4b:d8:17:b7:ed:aa:6c:18: 3e:03:28:a7:81:1a:a2:d2:bd:bf:54:0e:63:d0:c9:2b: 16:3e:fd:32:58:4f:b9:81:c3:75:aa:f8:cf:fb:6b:2f: fc:93:bf:94:59:05:c9:ad:e1:fd:9e:25:c7:0e:d2:c5: df:f2:fb:0a:42:eb:5d:94:55:8f:c0:fd:5b:22:f0:f2: 09:11:cb:91:6c:8d:87:4e:67:20:8d:7c:f5:14:91:0d: fc:66:09:cf:84:c9:10:45:75:89:02:48:d2:6b:b5:50: 41:e1:e0:10:99:f0:31:87:4c:82:ad:5a:33:bd:c3:8b: 4c:96:d5:3b:75:ed:46:c4:39:64:5e:75:a1:82:7b:2e: e4:68:8e:da:4e:47:21:8c:e2:b6:28:e9:38:b1:07:bd: 12:b9:25:1d:a9:a3:1f:5b:1c:a7:ac:db:49:9a:59:d1: 91:7c:ba:fa:39:d6:6b:e4:f8:74:dd:84:bb:6a:8e:b1: 63:cd:c1:43:95:21:c3:b6:d6:f8:d2:2f:ab:9f:26:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:8b:97:55:26:4c:3c:00:aa:38:b7:da:de:a9:72:4d: e6:24:0c:42:f4:f8:bd:a0:c5:b9:ca:4b:13:7f:26:a6: df:1e:17:23:ad:f3:bb:47:a9:b8:93:e6:75:01:12:a3: 00:37:9f:24:99:15:68:98:de:b3:fb:ca:17:a0:61:c0: ad:2e:f7:f1:50:ca:c9:70:8a:91:d6:60:34:8e:80:d9: e4:35:69:3f:5c:26:0f:91:d4:ca:5d:03:39:bc:2c:fa: 6e:08:6c:ca:e3:0c:30:7d:b0:7b:3b:a3:6b:8c:f1:34: e1:c2:4f:c6:98:35:71:b2:e8:02:b6:f0:c7:a9:ce:2a: 4b:94:62:63:0b:b7:89:26:f8:2f:24:14:e5:f2:d1:94: 52:e8:42:af:2f:64:c6:b1:d8:74:93:fb:da:28:49:3c: 22:04:6c:f2:b4:aa:ed:cb:e7:ea:f8:7d:14:1a:53:ee: 36:9c:43:c2:ed:4b:d5:f3:13:11:af:ee:be:ae:3f:f5: e5:72:c9:b3:35:aa:6d:33:d4:cb:f7:1c:6a:5b:08:0a: 76:aa:a7:e2:4a:44:0c:11:30:c7:62:6a:52:61:3c:28: 37:78:54:e3:79:4c:5f:6f:e8:84:6a:a8:2e:9e:23:1e: 61:fa:16:7a:ba:47:ca:a5:d0:09:17:4c:41:2e:a8:98 Fingerprint (SHA-256): CB:59:1D:3F:E3:68:96:7F:58:E1:29:28:CC:52:EF:32:59:0F:E2:8B:8F:04:FE:A7:B0:67:F3:B5:91:AE:C0:60 Fingerprint (SHA1): EF:09:2F:80:42:61:7B:2E:5B:8C:4B:C6:C6:11:E2:5A:96:E6:9F:60 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15223: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195842 (0x13bda5c2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:57:16 2017 Not After : Thu Mar 31 20:57:16 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:ec:d9:d9:98:23:cc:15:01:57:5f:b6:7c:94:01:5f: 11:57:e5:94:6d:cc:38:a5:77:43:38:9b:25:72:b0:05: 3f:a3:ac:cb:b1:fc:59:b2:8b:be:d6:fc:93:24:d9:39: a4:8e:6c:76:1c:c3:01:ab:4b:d8:17:b7:ed:aa:6c:18: 3e:03:28:a7:81:1a:a2:d2:bd:bf:54:0e:63:d0:c9:2b: 16:3e:fd:32:58:4f:b9:81:c3:75:aa:f8:cf:fb:6b:2f: fc:93:bf:94:59:05:c9:ad:e1:fd:9e:25:c7:0e:d2:c5: df:f2:fb:0a:42:eb:5d:94:55:8f:c0:fd:5b:22:f0:f2: 09:11:cb:91:6c:8d:87:4e:67:20:8d:7c:f5:14:91:0d: fc:66:09:cf:84:c9:10:45:75:89:02:48:d2:6b:b5:50: 41:e1:e0:10:99:f0:31:87:4c:82:ad:5a:33:bd:c3:8b: 4c:96:d5:3b:75:ed:46:c4:39:64:5e:75:a1:82:7b:2e: e4:68:8e:da:4e:47:21:8c:e2:b6:28:e9:38:b1:07:bd: 12:b9:25:1d:a9:a3:1f:5b:1c:a7:ac:db:49:9a:59:d1: 91:7c:ba:fa:39:d6:6b:e4:f8:74:dd:84:bb:6a:8e:b1: 63:cd:c1:43:95:21:c3:b6:d6:f8:d2:2f:ab:9f:26:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:8b:97:55:26:4c:3c:00:aa:38:b7:da:de:a9:72:4d: e6:24:0c:42:f4:f8:bd:a0:c5:b9:ca:4b:13:7f:26:a6: df:1e:17:23:ad:f3:bb:47:a9:b8:93:e6:75:01:12:a3: 00:37:9f:24:99:15:68:98:de:b3:fb:ca:17:a0:61:c0: ad:2e:f7:f1:50:ca:c9:70:8a:91:d6:60:34:8e:80:d9: e4:35:69:3f:5c:26:0f:91:d4:ca:5d:03:39:bc:2c:fa: 6e:08:6c:ca:e3:0c:30:7d:b0:7b:3b:a3:6b:8c:f1:34: e1:c2:4f:c6:98:35:71:b2:e8:02:b6:f0:c7:a9:ce:2a: 4b:94:62:63:0b:b7:89:26:f8:2f:24:14:e5:f2:d1:94: 52:e8:42:af:2f:64:c6:b1:d8:74:93:fb:da:28:49:3c: 22:04:6c:f2:b4:aa:ed:cb:e7:ea:f8:7d:14:1a:53:ee: 36:9c:43:c2:ed:4b:d5:f3:13:11:af:ee:be:ae:3f:f5: e5:72:c9:b3:35:aa:6d:33:d4:cb:f7:1c:6a:5b:08:0a: 76:aa:a7:e2:4a:44:0c:11:30:c7:62:6a:52:61:3c:28: 37:78:54:e3:79:4c:5f:6f:e8:84:6a:a8:2e:9e:23:1e: 61:fa:16:7a:ba:47:ca:a5:d0:09:17:4c:41:2e:a8:98 Fingerprint (SHA-256): CB:59:1D:3F:E3:68:96:7F:58:E1:29:28:CC:52:EF:32:59:0F:E2:8B:8F:04:FE:A7:B0:67:F3:B5:91:AE:C0:60 Fingerprint (SHA1): EF:09:2F:80:42:61:7B:2E:5B:8C:4B:C6:C6:11:E2:5A:96:E6:9F:60 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15224: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #15225: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195841 (0x13bda5c1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 20:56:58 2017 Not After : Thu Mar 31 20:56:58 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:06:77:00:0b:02:39:7d:a3:e0:46:cc:35:c9:16:68: aa:46:80:f9:05:53:51:bf:82:a3:60:4a:e4:03:ee:67: be:83:91:39:5f:f9:82:99:b8:df:59:f3:a5:64:e8:91: 8b:97:39:2b:c3:4b:74:b5:e2:fb:cb:14:4d:27:73:ab: b5:84:d4:a1:43:64:02:6e:9f:d4:cd:84:db:9f:ad:24: ab:2c:04:32:cf:0d:61:fa:d3:54:22:af:8e:47:f6:33: f2:db:1b:20:d9:7c:b0:5a:a8:d1:8b:94:7a:bb:d9:ab: 7d:e6:d8:86:7d:28:5f:3e:a2:ae:03:05:58:ad:83:d3: e3:1e:2c:32:d5:9e:d1:71:97:96:75:97:5f:69:70:b6: c2:af:83:ca:94:05:9f:53:18:df:d8:71:1c:31:82:3f: 62:91:af:15:3a:1a:a5:22:25:37:d3:5b:01:4d:2a:d6: 1f:fa:13:29:95:a2:53:ba:0e:1b:9a:9e:88:45:2d:34: ef:f6:b9:70:69:22:d5:ac:58:f3:96:08:73:1a:5c:35: 62:1f:5b:9a:94:8e:1a:bd:0f:1f:7a:66:09:48:b4:dc: 47:b2:5a:9e:e0:a3:c5:85:87:26:c6:90:dd:2b:65:fa: 52:16:77:16:a9:49:d1:c4:6d:59:be:c1:3c:5a:93:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ab:f0:6a:5b:47:f4:6b:99:89:6b:09:ba:f4:71:40:9e: 4e:fd:ba:3a:7e:c8:84:bf:ed:96:f7:c4:29:8d:f0:7c: 1f:3f:a2:fa:27:14:71:66:ef:ec:fc:5a:30:91:54:d2: 06:c4:7c:ce:ad:2b:15:0f:6d:1c:f3:24:e1:52:c1:cc: 8e:fa:d7:89:c4:2d:05:e1:bd:69:fb:fe:ba:31:3b:59: 66:40:38:39:c2:06:3b:d8:8c:12:67:80:e4:73:07:d9: fc:11:06:7d:68:c8:9a:53:73:63:6b:9e:4c:23:a2:d4: dc:3d:26:d6:6c:30:f7:bc:29:2a:d9:13:05:86:d1:76: 6b:88:86:1f:bc:2a:2f:14:11:84:df:dd:21:78:55:d2: cf:08:3d:a6:8c:13:1d:2e:ff:e4:db:48:74:10:54:69: 43:33:b3:06:b6:44:76:49:8f:2c:1c:26:08:81:5d:18: 2b:56:7f:f0:a5:73:60:19:4b:a1:d1:c3:fb:f8:56:26: f7:dd:57:10:fc:3e:ae:94:cb:ff:43:39:f5:58:f7:ba: 76:c0:5b:57:13:ae:4d:14:1c:04:d3:d5:08:5a:bb:9c: 98:31:a4:9d:35:f0:72:cd:35:89:87:e9:83:39:71:0a: f2:f1:3b:b7:ac:7a:e0:3d:1f:6b:64:be:b6:c5:59:af Fingerprint (SHA-256): C2:EE:83:17:D0:A5:A4:03:41:BA:80:53:3A:AD:F4:E7:8C:42:6A:FF:D1:63:DF:CF:F9:41:2B:22:66:79:71:F5 Fingerprint (SHA1): 2D:12:3F:04:A0:3D:73:DF:3F:29:3E:2C:61:92:12:FC:AF:E5:20:1E Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15226: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195842 (0x13bda5c2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:57:16 2017 Not After : Thu Mar 31 20:57:16 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:ec:d9:d9:98:23:cc:15:01:57:5f:b6:7c:94:01:5f: 11:57:e5:94:6d:cc:38:a5:77:43:38:9b:25:72:b0:05: 3f:a3:ac:cb:b1:fc:59:b2:8b:be:d6:fc:93:24:d9:39: a4:8e:6c:76:1c:c3:01:ab:4b:d8:17:b7:ed:aa:6c:18: 3e:03:28:a7:81:1a:a2:d2:bd:bf:54:0e:63:d0:c9:2b: 16:3e:fd:32:58:4f:b9:81:c3:75:aa:f8:cf:fb:6b:2f: fc:93:bf:94:59:05:c9:ad:e1:fd:9e:25:c7:0e:d2:c5: df:f2:fb:0a:42:eb:5d:94:55:8f:c0:fd:5b:22:f0:f2: 09:11:cb:91:6c:8d:87:4e:67:20:8d:7c:f5:14:91:0d: fc:66:09:cf:84:c9:10:45:75:89:02:48:d2:6b:b5:50: 41:e1:e0:10:99:f0:31:87:4c:82:ad:5a:33:bd:c3:8b: 4c:96:d5:3b:75:ed:46:c4:39:64:5e:75:a1:82:7b:2e: e4:68:8e:da:4e:47:21:8c:e2:b6:28:e9:38:b1:07:bd: 12:b9:25:1d:a9:a3:1f:5b:1c:a7:ac:db:49:9a:59:d1: 91:7c:ba:fa:39:d6:6b:e4:f8:74:dd:84:bb:6a:8e:b1: 63:cd:c1:43:95:21:c3:b6:d6:f8:d2:2f:ab:9f:26:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:8b:97:55:26:4c:3c:00:aa:38:b7:da:de:a9:72:4d: e6:24:0c:42:f4:f8:bd:a0:c5:b9:ca:4b:13:7f:26:a6: df:1e:17:23:ad:f3:bb:47:a9:b8:93:e6:75:01:12:a3: 00:37:9f:24:99:15:68:98:de:b3:fb:ca:17:a0:61:c0: ad:2e:f7:f1:50:ca:c9:70:8a:91:d6:60:34:8e:80:d9: e4:35:69:3f:5c:26:0f:91:d4:ca:5d:03:39:bc:2c:fa: 6e:08:6c:ca:e3:0c:30:7d:b0:7b:3b:a3:6b:8c:f1:34: e1:c2:4f:c6:98:35:71:b2:e8:02:b6:f0:c7:a9:ce:2a: 4b:94:62:63:0b:b7:89:26:f8:2f:24:14:e5:f2:d1:94: 52:e8:42:af:2f:64:c6:b1:d8:74:93:fb:da:28:49:3c: 22:04:6c:f2:b4:aa:ed:cb:e7:ea:f8:7d:14:1a:53:ee: 36:9c:43:c2:ed:4b:d5:f3:13:11:af:ee:be:ae:3f:f5: e5:72:c9:b3:35:aa:6d:33:d4:cb:f7:1c:6a:5b:08:0a: 76:aa:a7:e2:4a:44:0c:11:30:c7:62:6a:52:61:3c:28: 37:78:54:e3:79:4c:5f:6f:e8:84:6a:a8:2e:9e:23:1e: 61:fa:16:7a:ba:47:ca:a5:d0:09:17:4c:41:2e:a8:98 Fingerprint (SHA-256): CB:59:1D:3F:E3:68:96:7F:58:E1:29:28:CC:52:EF:32:59:0F:E2:8B:8F:04:FE:A7:B0:67:F3:B5:91:AE:C0:60 Fingerprint (SHA1): EF:09:2F:80:42:61:7B:2E:5B:8C:4B:C6:C6:11:E2:5A:96:E6:9F:60 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15227: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195842 (0x13bda5c2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:57:16 2017 Not After : Thu Mar 31 20:57:16 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:ec:d9:d9:98:23:cc:15:01:57:5f:b6:7c:94:01:5f: 11:57:e5:94:6d:cc:38:a5:77:43:38:9b:25:72:b0:05: 3f:a3:ac:cb:b1:fc:59:b2:8b:be:d6:fc:93:24:d9:39: a4:8e:6c:76:1c:c3:01:ab:4b:d8:17:b7:ed:aa:6c:18: 3e:03:28:a7:81:1a:a2:d2:bd:bf:54:0e:63:d0:c9:2b: 16:3e:fd:32:58:4f:b9:81:c3:75:aa:f8:cf:fb:6b:2f: fc:93:bf:94:59:05:c9:ad:e1:fd:9e:25:c7:0e:d2:c5: df:f2:fb:0a:42:eb:5d:94:55:8f:c0:fd:5b:22:f0:f2: 09:11:cb:91:6c:8d:87:4e:67:20:8d:7c:f5:14:91:0d: fc:66:09:cf:84:c9:10:45:75:89:02:48:d2:6b:b5:50: 41:e1:e0:10:99:f0:31:87:4c:82:ad:5a:33:bd:c3:8b: 4c:96:d5:3b:75:ed:46:c4:39:64:5e:75:a1:82:7b:2e: e4:68:8e:da:4e:47:21:8c:e2:b6:28:e9:38:b1:07:bd: 12:b9:25:1d:a9:a3:1f:5b:1c:a7:ac:db:49:9a:59:d1: 91:7c:ba:fa:39:d6:6b:e4:f8:74:dd:84:bb:6a:8e:b1: 63:cd:c1:43:95:21:c3:b6:d6:f8:d2:2f:ab:9f:26:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:8b:97:55:26:4c:3c:00:aa:38:b7:da:de:a9:72:4d: e6:24:0c:42:f4:f8:bd:a0:c5:b9:ca:4b:13:7f:26:a6: df:1e:17:23:ad:f3:bb:47:a9:b8:93:e6:75:01:12:a3: 00:37:9f:24:99:15:68:98:de:b3:fb:ca:17:a0:61:c0: ad:2e:f7:f1:50:ca:c9:70:8a:91:d6:60:34:8e:80:d9: e4:35:69:3f:5c:26:0f:91:d4:ca:5d:03:39:bc:2c:fa: 6e:08:6c:ca:e3:0c:30:7d:b0:7b:3b:a3:6b:8c:f1:34: e1:c2:4f:c6:98:35:71:b2:e8:02:b6:f0:c7:a9:ce:2a: 4b:94:62:63:0b:b7:89:26:f8:2f:24:14:e5:f2:d1:94: 52:e8:42:af:2f:64:c6:b1:d8:74:93:fb:da:28:49:3c: 22:04:6c:f2:b4:aa:ed:cb:e7:ea:f8:7d:14:1a:53:ee: 36:9c:43:c2:ed:4b:d5:f3:13:11:af:ee:be:ae:3f:f5: e5:72:c9:b3:35:aa:6d:33:d4:cb:f7:1c:6a:5b:08:0a: 76:aa:a7:e2:4a:44:0c:11:30:c7:62:6a:52:61:3c:28: 37:78:54:e3:79:4c:5f:6f:e8:84:6a:a8:2e:9e:23:1e: 61:fa:16:7a:ba:47:ca:a5:d0:09:17:4c:41:2e:a8:98 Fingerprint (SHA-256): CB:59:1D:3F:E3:68:96:7F:58:E1:29:28:CC:52:EF:32:59:0F:E2:8B:8F:04:FE:A7:B0:67:F3:B5:91:AE:C0:60 Fingerprint (SHA1): EF:09:2F:80:42:61:7B:2E:5B:8C:4B:C6:C6:11:E2:5A:96:E6:9F:60 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #15228: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #15229: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195849 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15230: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #15231: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #15232: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195850 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15233: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #15234: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #15235: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15236: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 331195851 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15237: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15238: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #15239: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15240: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 331195852 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15241: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15242: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #15243: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15244: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 331195853 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #15245: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15246: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 331195854 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #15247: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15248: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #15249: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15250: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15251: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 331195855 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15252: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15253: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15254: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15255: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 331195856 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15256: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15257: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #15258: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15259: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331195857 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15260: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15261: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #15262: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15263: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 331195858 --extCP < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #15264: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15265: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15266: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195849 (0x13bda5c9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Mar 31 20:58:53 2017 Not After : Thu Mar 31 20:58:53 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:8f:78:19:16:c9:90:83:57:85:cf:48:5d:21:8c:ef: 6c:da:32:12:09:69:df:9e:67:bc:57:d3:97:6b:24:70: c8:69:b9:f3:b5:0e:d1:74:01:be:df:22:13:88:74:df: 9c:57:7c:dc:79:0e:81:6b:85:0b:c8:0a:13:04:1e:a1: a9:dc:fe:ec:85:c8:ac:70:e4:d4:49:0c:d6:19:06:dd: 3c:f9:aa:d2:87:24:63:fa:e8:42:02:3d:10:e8:c4:32: 74:ba:ea:54:92:c4:3e:fd:ff:1d:20:3f:04:d0:46:33: f7:15:0f:9e:56:d0:50:60:52:68:10:28:9d:3b:e0:e4: aa:51:32:74:cc:89:ef:52:5c:90:b3:9d:96:4d:35:e5: 36:e7:4d:0b:5a:f0:2d:13:08:5c:03:00:c3:fc:1c:b1: 13:0b:29:85:64:0f:67:ca:e6:07:ea:6a:17:40:26:1e: 54:80:03:9e:e4:80:62:26:27:bd:66:d2:6f:ab:22:19: b9:f4:94:f5:1c:43:d0:4c:fd:54:a7:46:22:33:37:92: cd:1f:b5:f9:40:a8:d1:a4:c1:1a:84:15:16:e0:b3:46: 03:b6:e0:a6:41:60:0e:30:f6:15:e5:79:11:04:88:cb: 2d:75:30:04:12:7e:f4:4f:66:9b:44:17:56:f6:0a:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:2d:98:c8:a2:24:ce:3b:7e:b9:aa:fd:06:97:92:ec: 02:7c:6d:9e:0c:e7:12:cc:19:23:79:05:4a:b5:da:e1: 36:83:94:25:a0:df:a8:0c:cf:02:aa:81:93:0f:5c:83: 00:76:f9:a2:c9:f8:8b:9b:12:93:e1:2c:8c:64:d3:75: 8b:bc:23:03:01:d2:26:1b:4a:20:9e:3c:10:ec:5c:81: d1:5e:d7:31:87:e9:29:06:2c:28:c2:2c:26:98:eb:66: e0:12:1e:dc:6b:e1:3a:74:77:d7:18:b4:9b:b8:c7:5a: ff:4b:79:c1:2d:74:4c:b9:c2:2f:d3:1a:23:db:3d:58: bf:84:46:22:12:19:38:ff:de:b2:36:55:01:52:57:d0: cd:a7:57:51:df:fc:14:0e:8d:aa:29:53:83:ca:8a:f3: 5f:03:b2:48:e2:6c:fb:1c:af:27:32:26:1c:1c:79:58: 2d:82:8f:d0:14:78:a3:54:73:90:55:cd:c6:bc:7d:5f: ed:a7:da:71:c4:d1:93:24:c2:1f:80:00:3d:a7:3b:5c: 4a:9d:2b:cf:8d:a8:58:f8:f1:48:e5:86:15:70:51:65: 47:1d:41:80:3b:08:8a:36:dc:fe:df:5d:60:c4:82:9e: f3:10:05:a9:21:dd:37:46:66:a8:5d:3e:12:f6:0e:c1 Fingerprint (SHA-256): 7E:AD:E2:D2:52:DB:91:D8:1E:0E:62:FC:33:92:14:82:05:C3:C1:51:DC:65:26:5F:EA:17:94:ED:E9:86:1A:6E Fingerprint (SHA1): 00:A3:88:33:71:DF:B3:40:EF:62:94:4E:E5:ED:0B:05:CE:A7:E7:7A Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #15267: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15268: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15269: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15270: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15271: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15272: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15273: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15274: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15275: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195850 (0x13bda5ca) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Mar 31 20:59:04 2017 Not After : Thu Mar 31 20:59:04 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:10:a4:d7:cb:30:b9:47:07:0f:3a:ed:70:b8:26:c5: 6b:cc:54:c9:40:b9:76:a3:cd:3b:d5:ca:ab:d5:c3:d6: ca:b2:e1:09:b4:42:3d:22:67:66:53:a4:5a:86:65:b3: b7:de:06:9c:a9:b0:5c:23:b4:66:76:b9:1c:41:9b:29: 08:f6:67:5d:94:7e:57:0d:23:eb:68:43:23:db:28:a5: 54:44:78:2b:de:27:8c:93:a7:bb:9a:8b:cb:3b:4d:3a: cb:d4:94:3b:58:be:f7:dc:57:06:3a:f1:7b:24:41:1a: 35:4e:7c:a4:e7:52:2e:c2:90:41:d1:dd:5f:4f:86:1f: 0a:d7:05:ca:c6:66:df:f8:91:c7:fc:e8:32:4b:e2:7b: af:df:61:34:69:c5:98:a0:5e:86:d4:06:5a:01:b5:d2: e3:2e:a5:80:de:98:f2:02:77:2d:48:a0:7d:e0:fc:bb: b9:3a:d9:0b:7e:86:b2:5c:92:bd:3c:2e:9e:a4:99:46: 4f:d9:c7:38:b3:33:7d:6e:eb:bd:49:e1:b9:2c:eb:82: b5:8a:10:24:29:c4:88:aa:f9:19:ef:c6:20:2f:78:aa: 7a:97:98:82:98:15:6b:d7:7f:54:46:ff:60:0a:54:4c: c1:6d:c3:fc:c6:79:ed:a4:dc:03:10:d7:a1:ef:68:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:c0:0b:f6:aa:23:95:90:0e:dc:12:70:b1:62:03:87: d1:03:f5:96:32:64:17:95:5b:f8:60:b6:d1:e4:e4:84: 0b:ed:2b:87:e3:8a:b0:03:f6:a5:a4:da:99:cd:6b:9d: 34:10:6b:7b:56:9d:84:45:b9:08:09:ba:6b:0c:08:ee: 30:9d:61:df:22:4e:62:de:91:3e:ba:24:44:bf:58:02: 56:12:c0:eb:48:c0:69:6a:ce:83:7d:70:e3:e4:79:98: a7:c0:03:1f:65:49:e8:dd:a5:29:09:af:a8:14:5d:02: dd:39:34:00:90:f7:46:d9:18:08:1c:07:56:ef:3c:05: 8b:e3:6d:d3:b2:2f:65:de:e4:47:41:4c:88:fa:02:21: 5a:de:06:e0:2f:db:d1:a5:73:4d:a8:60:18:c7:e9:1b: 48:c7:4a:9d:60:6c:45:c8:e0:2d:f5:12:b6:cd:4b:bf: ec:77:c5:06:26:b2:41:8c:0c:9a:1c:c5:c0:85:41:67: 49:5a:f8:5e:c6:e5:72:52:40:c0:a0:77:eb:f5:56:a6: 0f:06:cb:37:50:f3:c6:b2:1d:43:b7:7a:c3:40:f5:08: 0e:4a:88:ea:dc:7a:0f:0b:69:6b:97:13:99:9d:27:ce: c4:ca:7b:1d:c9:91:ee:2e:d6:c1:67:a6:3c:ae:18:21 Fingerprint (SHA-256): DC:8B:4A:D6:0F:48:98:AD:24:16:53:4A:BE:C0:09:26:09:21:56:11:34:21:06:C1:9F:C1:03:5B:46:40:58:7F Fingerprint (SHA1): 5E:76:80:D5:85:54:2A:A4:69:E2:08:C2:4D:FE:3A:6E:27:1C:DA:32 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #15276: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15277: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15278: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15279: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15280: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #15281: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15282: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #15283: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #15284: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #15285: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #15286: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #15287: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #15288: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #15289: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #15290: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #15291: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #15292: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #15293: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #15294: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195859 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15295: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #15296: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15297: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15298: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 331195860 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15299: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15300: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #15301: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15302: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 331195861 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15303: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15304: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15305: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15306: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 331195862 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15307: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15308: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #15309: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15310: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 331195863 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15311: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15312: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #15313: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15314: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 331195864 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15315: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15316: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #15317: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15318: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 331195865 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15319: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15320: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #15321: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15322: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 331195866 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15323: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15324: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #15325: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15326: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 331195867 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15327: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15328: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15329: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195859 (0x13bda5d3) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 21:00:58 2017 Not After : Thu Mar 31 21:00:58 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 89:3d:d4:07:c3:f5:44:4c:a2:af:3e:e7:a8:97:aa:9a: 81:6b:1e:e4:b2:32:f2:9c:12:46:56:a1:cf:5c:be:61: f6:3b:41:bd:9c:d2:23:fd:0e:34:83:eb:f4:37:29:a9: 00:1e:f0:54:7c:9d:5c:f3:02:72:c6:cf:3b:7b:cd:b5: 2b:57:8f:ae:74:7b:a1:89:3b:af:53:f3:55:50:22:3c: 77:7c:f9:ba:f6:ed:13:fe:ff:82:dd:4f:1a:d6:ce:7f: 78:94:9a:77:ac:84:ab:de:99:1f:c0:30:58:8e:db:8b: 99:3a:18:43:81:94:67:a0:e7:10:43:51:f9:21:6c:21: b2:21:e9:52:78:7a:b1:b6:87:79:b2:b8:92:81:c9:d5: 96:49:0e:9a:f5:81:d6:fb:a7:65:cf:71:c4:57:6e:8e: 47:0b:71:0e:99:e8:72:07:16:2c:fe:88:ab:2f:b1:ff: 7c:27:3c:51:f0:df:60:99:ca:f8:9a:09:38:b8:ec:77: cb:3f:1e:04:7f:30:71:62:3e:a5:af:9d:59:e6:59:1a: 54:4b:06:4e:a6:b5:fd:19:d3:c7:82:3c:4b:25:59:b3: 37:ae:7e:ca:cb:39:57:14:6e:c6:30:7d:35:02:aa:bd: f2:70:19:1a:70:5c:98:f4:1a:d8:0b:87:95:c0:ba:83 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:55:b2:2b:a4:44:92:bc:06:9d:77:c6:fc: 5b:a3:22:b2:59:9f:93:18:f6:42:19:c3:33:cd:bd:04: 02:1c:13:ba:0e:41:57:f0:ac:5c:7b:78:13:5a:ec:7b: 77:75:ef:75:ce:93:2c:72:35:78:3b:e8:5d:8a Fingerprint (SHA-256): 7B:FD:7B:0E:99:6E:BD:D1:C4:60:90:83:79:26:A2:4A:09:3D:C7:6C:33:0F:E9:CA:8E:1C:A9:EA:D3:59:63:8A Fingerprint (SHA1): A2:E9:1F:B8:68:1D:38:08:B3:17:A2:9D:36:5C:F5:EE:FC:D8:63:F6 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15330: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195859 (0x13bda5d3) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 21:00:58 2017 Not After : Thu Mar 31 21:00:58 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 89:3d:d4:07:c3:f5:44:4c:a2:af:3e:e7:a8:97:aa:9a: 81:6b:1e:e4:b2:32:f2:9c:12:46:56:a1:cf:5c:be:61: f6:3b:41:bd:9c:d2:23:fd:0e:34:83:eb:f4:37:29:a9: 00:1e:f0:54:7c:9d:5c:f3:02:72:c6:cf:3b:7b:cd:b5: 2b:57:8f:ae:74:7b:a1:89:3b:af:53:f3:55:50:22:3c: 77:7c:f9:ba:f6:ed:13:fe:ff:82:dd:4f:1a:d6:ce:7f: 78:94:9a:77:ac:84:ab:de:99:1f:c0:30:58:8e:db:8b: 99:3a:18:43:81:94:67:a0:e7:10:43:51:f9:21:6c:21: b2:21:e9:52:78:7a:b1:b6:87:79:b2:b8:92:81:c9:d5: 96:49:0e:9a:f5:81:d6:fb:a7:65:cf:71:c4:57:6e:8e: 47:0b:71:0e:99:e8:72:07:16:2c:fe:88:ab:2f:b1:ff: 7c:27:3c:51:f0:df:60:99:ca:f8:9a:09:38:b8:ec:77: cb:3f:1e:04:7f:30:71:62:3e:a5:af:9d:59:e6:59:1a: 54:4b:06:4e:a6:b5:fd:19:d3:c7:82:3c:4b:25:59:b3: 37:ae:7e:ca:cb:39:57:14:6e:c6:30:7d:35:02:aa:bd: f2:70:19:1a:70:5c:98:f4:1a:d8:0b:87:95:c0:ba:83 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:55:b2:2b:a4:44:92:bc:06:9d:77:c6:fc: 5b:a3:22:b2:59:9f:93:18:f6:42:19:c3:33:cd:bd:04: 02:1c:13:ba:0e:41:57:f0:ac:5c:7b:78:13:5a:ec:7b: 77:75:ef:75:ce:93:2c:72:35:78:3b:e8:5d:8a Fingerprint (SHA-256): 7B:FD:7B:0E:99:6E:BD:D1:C4:60:90:83:79:26:A2:4A:09:3D:C7:6C:33:0F:E9:CA:8E:1C:A9:EA:D3:59:63:8A Fingerprint (SHA1): A2:E9:1F:B8:68:1D:38:08:B3:17:A2:9D:36:5C:F5:EE:FC:D8:63:F6 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #15331: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195859 (0x13bda5d3) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 21:00:58 2017 Not After : Thu Mar 31 21:00:58 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 89:3d:d4:07:c3:f5:44:4c:a2:af:3e:e7:a8:97:aa:9a: 81:6b:1e:e4:b2:32:f2:9c:12:46:56:a1:cf:5c:be:61: f6:3b:41:bd:9c:d2:23:fd:0e:34:83:eb:f4:37:29:a9: 00:1e:f0:54:7c:9d:5c:f3:02:72:c6:cf:3b:7b:cd:b5: 2b:57:8f:ae:74:7b:a1:89:3b:af:53:f3:55:50:22:3c: 77:7c:f9:ba:f6:ed:13:fe:ff:82:dd:4f:1a:d6:ce:7f: 78:94:9a:77:ac:84:ab:de:99:1f:c0:30:58:8e:db:8b: 99:3a:18:43:81:94:67:a0:e7:10:43:51:f9:21:6c:21: b2:21:e9:52:78:7a:b1:b6:87:79:b2:b8:92:81:c9:d5: 96:49:0e:9a:f5:81:d6:fb:a7:65:cf:71:c4:57:6e:8e: 47:0b:71:0e:99:e8:72:07:16:2c:fe:88:ab:2f:b1:ff: 7c:27:3c:51:f0:df:60:99:ca:f8:9a:09:38:b8:ec:77: cb:3f:1e:04:7f:30:71:62:3e:a5:af:9d:59:e6:59:1a: 54:4b:06:4e:a6:b5:fd:19:d3:c7:82:3c:4b:25:59:b3: 37:ae:7e:ca:cb:39:57:14:6e:c6:30:7d:35:02:aa:bd: f2:70:19:1a:70:5c:98:f4:1a:d8:0b:87:95:c0:ba:83 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:55:b2:2b:a4:44:92:bc:06:9d:77:c6:fc: 5b:a3:22:b2:59:9f:93:18:f6:42:19:c3:33:cd:bd:04: 02:1c:13:ba:0e:41:57:f0:ac:5c:7b:78:13:5a:ec:7b: 77:75:ef:75:ce:93:2c:72:35:78:3b:e8:5d:8a Fingerprint (SHA-256): 7B:FD:7B:0E:99:6E:BD:D1:C4:60:90:83:79:26:A2:4A:09:3D:C7:6C:33:0F:E9:CA:8E:1C:A9:EA:D3:59:63:8A Fingerprint (SHA1): A2:E9:1F:B8:68:1D:38:08:B3:17:A2:9D:36:5C:F5:EE:FC:D8:63:F6 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #15332: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195859 (0x13bda5d3) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 21:00:58 2017 Not After : Thu Mar 31 21:00:58 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 89:3d:d4:07:c3:f5:44:4c:a2:af:3e:e7:a8:97:aa:9a: 81:6b:1e:e4:b2:32:f2:9c:12:46:56:a1:cf:5c:be:61: f6:3b:41:bd:9c:d2:23:fd:0e:34:83:eb:f4:37:29:a9: 00:1e:f0:54:7c:9d:5c:f3:02:72:c6:cf:3b:7b:cd:b5: 2b:57:8f:ae:74:7b:a1:89:3b:af:53:f3:55:50:22:3c: 77:7c:f9:ba:f6:ed:13:fe:ff:82:dd:4f:1a:d6:ce:7f: 78:94:9a:77:ac:84:ab:de:99:1f:c0:30:58:8e:db:8b: 99:3a:18:43:81:94:67:a0:e7:10:43:51:f9:21:6c:21: b2:21:e9:52:78:7a:b1:b6:87:79:b2:b8:92:81:c9:d5: 96:49:0e:9a:f5:81:d6:fb:a7:65:cf:71:c4:57:6e:8e: 47:0b:71:0e:99:e8:72:07:16:2c:fe:88:ab:2f:b1:ff: 7c:27:3c:51:f0:df:60:99:ca:f8:9a:09:38:b8:ec:77: cb:3f:1e:04:7f:30:71:62:3e:a5:af:9d:59:e6:59:1a: 54:4b:06:4e:a6:b5:fd:19:d3:c7:82:3c:4b:25:59:b3: 37:ae:7e:ca:cb:39:57:14:6e:c6:30:7d:35:02:aa:bd: f2:70:19:1a:70:5c:98:f4:1a:d8:0b:87:95:c0:ba:83 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:55:b2:2b:a4:44:92:bc:06:9d:77:c6:fc: 5b:a3:22:b2:59:9f:93:18:f6:42:19:c3:33:cd:bd:04: 02:1c:13:ba:0e:41:57:f0:ac:5c:7b:78:13:5a:ec:7b: 77:75:ef:75:ce:93:2c:72:35:78:3b:e8:5d:8a Fingerprint (SHA-256): 7B:FD:7B:0E:99:6E:BD:D1:C4:60:90:83:79:26:A2:4A:09:3D:C7:6C:33:0F:E9:CA:8E:1C:A9:EA:D3:59:63:8A Fingerprint (SHA1): A2:E9:1F:B8:68:1D:38:08:B3:17:A2:9D:36:5C:F5:EE:FC:D8:63:F6 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #15333: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #15334: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15335: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #15336: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #15337: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15338: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15339: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15340: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15341: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15342: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15343: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15344: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #15345: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15346: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15347: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15348: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #15349: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15350: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15351: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15352: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15353: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15354: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15355: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15356: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #15357: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15358: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15359: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15360: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170331210330Z nextupdate=20180331210331Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Mar 31 21:03:30 2017 Next Update: Sat Mar 31 21:03:31 2018 CRL Extensions: chains.sh: #15361: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331210331Z nextupdate=20180331210331Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 21:03:31 2017 Next Update: Sat Mar 31 21:03:31 2018 CRL Extensions: chains.sh: #15362: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170331210332Z nextupdate=20180331210332Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Mar 31 21:03:32 2017 Next Update: Sat Mar 31 21:03:32 2018 CRL Extensions: chains.sh: #15363: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170331210333Z nextupdate=20180331210333Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Mar 31 21:03:33 2017 Next Update: Sat Mar 31 21:03:33 2018 CRL Extensions: chains.sh: #15364: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170331210334Z addcert 14 20170331210334Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Mar 31 21:03:34 2017 Next Update: Sat Mar 31 21:03:32 2018 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Mar 31 21:03:34 2017 CRL Extensions: chains.sh: #15365: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331210335Z addcert 15 20170331210335Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 21:03:35 2017 Next Update: Sat Mar 31 21:03:31 2018 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Mar 31 21:03:35 2017 CRL Extensions: chains.sh: #15366: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15367: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15368: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #15369: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #15370: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #15371: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #15372: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #15373: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #15374: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #15375: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 21:02:13 2017 Not After : Thu Mar 31 21:02:13 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:34:13:c6:3c:b6:06:12:2d:38:cd:90:3f:da:33:6e: 7b:44:b5:7d:ca:64:0b:81:6b:80:7f:35:53:84:d7:3d: 09:c3:fd:19:dc:4f:b3:c8:70:18:a3:41:36:f9:b1:7c: b6:aa:85:e9:92:5c:e7:2f:87:f1:ce:5b:83:30:df:70: 57:81:06:a6:a5:2d:3a:0d:a6:d5:bc:8e:db:55:53:d9: 9d:4a:96:8e:47:5f:37:82:a7:ef:af:e8:7a:51:c0:9c: 00:80:82:5a:2b:e4:37:79:0d:d5:d6:d2:c2:07:5a:3f: 0c:b3:05:bd:cb:45:1f:59:57:6b:02:cc:7d:5d:07:dd: 6a:f1:e0:5e:dc:34:34:33:68:70:39:0f:b1:56:ca:37: 16:95:3c:42:48:97:ed:f9:b9:86:bd:1f:ec:83:b8:8c: c2:e3:b6:06:df:30:0f:f5:ab:0b:93:60:6a:48:20:74: d6:dc:8a:ab:ce:b3:ab:9c:54:a3:72:f1:c5:e3:06:e6: 14:a2:e4:ab:b7:b4:7f:57:40:5a:92:54:c3:e7:85:bd: 84:74:eb:33:79:8f:42:ab:4a:9c:16:b1:1c:66:5e:89: a4:3f:fa:30:34:28:0b:0a:58:f7:90:8d:15:dc:55:d2: 33:da:17:03:6c:eb:19:e4:cf:ed:a1:cf:e4:9d:49:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:cd:ce:f3:c5:5e:19:bf:64:a8:b1:cb:d6:7e:af:8b: af:a3:6e:ca:28:e2:7a:01:a9:ab:44:5a:45:c0:f1:01: 96:17:57:08:bb:e2:4e:28:2c:2d:23:56:21:0c:81:20: 7f:11:72:3e:56:7b:a7:90:d3:f2:d8:77:92:b0:a4:9e: 71:d6:d6:b3:59:17:fc:1c:e7:87:d2:5c:88:fc:d9:5d: 9f:19:32:9b:f0:67:f5:60:69:e9:d2:54:4b:76:e5:0d: 3b:8f:d4:69:0c:39:16:05:f7:de:89:fb:45:cf:b6:e2: e3:0c:3d:15:30:5e:fb:57:a2:ed:74:25:79:0a:6c:6c: 15:48:52:af:4f:e3:be:0a:d0:e2:c0:6e:5f:28:fb:ec: a7:80:79:52:22:ce:d7:4d:08:57:b2:51:62:d8:57:7d: 83:ca:3f:5c:0c:ff:34:8e:9d:dc:d9:2e:f8:d4:84:15: b9:56:08:de:18:15:d4:44:a7:d9:93:e7:31:d3:b0:50: e6:b5:11:e5:ad:58:b2:3c:a5:1c:37:a2:0c:17:bc:ba: 19:98:2f:11:14:c0:a4:2a:c4:6a:c0:99:74:40:e8:b0: 00:f6:17:5b:25:38:98:d5:b9:a5:98:52:b0:ae:8c:83: e0:66:d3:5d:ce:d8:56:50:d5:5d:ea:a5:d6:78:68:d0 Fingerprint (SHA-256): A7:9B:73:37:03:1F:4A:77:C3:B3:D3:FD:86:E6:14:8F:BE:D6:96:F0:A8:21:FC:C8:D4:91:F4:A7:A6:B8:8C:E5 Fingerprint (SHA1): 85:07:87:57:EA:18:02:C0:55:61:71:0A:D2:65:84:09:84:42:60:35 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #15376: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #15377: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 21:02:13 2017 Not After : Thu Mar 31 21:02:13 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:34:13:c6:3c:b6:06:12:2d:38:cd:90:3f:da:33:6e: 7b:44:b5:7d:ca:64:0b:81:6b:80:7f:35:53:84:d7:3d: 09:c3:fd:19:dc:4f:b3:c8:70:18:a3:41:36:f9:b1:7c: b6:aa:85:e9:92:5c:e7:2f:87:f1:ce:5b:83:30:df:70: 57:81:06:a6:a5:2d:3a:0d:a6:d5:bc:8e:db:55:53:d9: 9d:4a:96:8e:47:5f:37:82:a7:ef:af:e8:7a:51:c0:9c: 00:80:82:5a:2b:e4:37:79:0d:d5:d6:d2:c2:07:5a:3f: 0c:b3:05:bd:cb:45:1f:59:57:6b:02:cc:7d:5d:07:dd: 6a:f1:e0:5e:dc:34:34:33:68:70:39:0f:b1:56:ca:37: 16:95:3c:42:48:97:ed:f9:b9:86:bd:1f:ec:83:b8:8c: c2:e3:b6:06:df:30:0f:f5:ab:0b:93:60:6a:48:20:74: d6:dc:8a:ab:ce:b3:ab:9c:54:a3:72:f1:c5:e3:06:e6: 14:a2:e4:ab:b7:b4:7f:57:40:5a:92:54:c3:e7:85:bd: 84:74:eb:33:79:8f:42:ab:4a:9c:16:b1:1c:66:5e:89: a4:3f:fa:30:34:28:0b:0a:58:f7:90:8d:15:dc:55:d2: 33:da:17:03:6c:eb:19:e4:cf:ed:a1:cf:e4:9d:49:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:cd:ce:f3:c5:5e:19:bf:64:a8:b1:cb:d6:7e:af:8b: af:a3:6e:ca:28:e2:7a:01:a9:ab:44:5a:45:c0:f1:01: 96:17:57:08:bb:e2:4e:28:2c:2d:23:56:21:0c:81:20: 7f:11:72:3e:56:7b:a7:90:d3:f2:d8:77:92:b0:a4:9e: 71:d6:d6:b3:59:17:fc:1c:e7:87:d2:5c:88:fc:d9:5d: 9f:19:32:9b:f0:67:f5:60:69:e9:d2:54:4b:76:e5:0d: 3b:8f:d4:69:0c:39:16:05:f7:de:89:fb:45:cf:b6:e2: e3:0c:3d:15:30:5e:fb:57:a2:ed:74:25:79:0a:6c:6c: 15:48:52:af:4f:e3:be:0a:d0:e2:c0:6e:5f:28:fb:ec: a7:80:79:52:22:ce:d7:4d:08:57:b2:51:62:d8:57:7d: 83:ca:3f:5c:0c:ff:34:8e:9d:dc:d9:2e:f8:d4:84:15: b9:56:08:de:18:15:d4:44:a7:d9:93:e7:31:d3:b0:50: e6:b5:11:e5:ad:58:b2:3c:a5:1c:37:a2:0c:17:bc:ba: 19:98:2f:11:14:c0:a4:2a:c4:6a:c0:99:74:40:e8:b0: 00:f6:17:5b:25:38:98:d5:b9:a5:98:52:b0:ae:8c:83: e0:66:d3:5d:ce:d8:56:50:d5:5d:ea:a5:d6:78:68:d0 Fingerprint (SHA-256): A7:9B:73:37:03:1F:4A:77:C3:B3:D3:FD:86:E6:14:8F:BE:D6:96:F0:A8:21:FC:C8:D4:91:F4:A7:A6:B8:8C:E5 Fingerprint (SHA1): 85:07:87:57:EA:18:02:C0:55:61:71:0A:D2:65:84:09:84:42:60:35 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #15378: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #15379: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #15380: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195868 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15381: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #15382: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #15383: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15384: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 331195869 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15385: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15386: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15387: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331195640.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #15388: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331195614.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15389: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15390: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #15391: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331195640.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #15392: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 331195870 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15393: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15394: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15395: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331195640.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #15396: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331195615.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15397: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15398: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #15399: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15400: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 331195871 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15401: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15402: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #15403: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331195640.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #15404: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331195616.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15405: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15406: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #15407: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0-331195640.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #15408: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9636/localhost-2460-CA0Root-331195617.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #15409: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15410: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170331210553Z nextupdate=20180331210553Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Mar 31 21:05:53 2017 Next Update: Sat Mar 31 21:05:53 2018 CRL Extensions: chains.sh: #15411: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331210554Z nextupdate=20180331210554Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 21:05:54 2017 Next Update: Sat Mar 31 21:05:54 2018 CRL Extensions: chains.sh: #15412: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170331210555Z nextupdate=20180331210555Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Mar 31 21:05:55 2017 Next Update: Sat Mar 31 21:05:55 2018 CRL Extensions: chains.sh: #15413: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170331210555Z nextupdate=20180331210555Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Mar 31 21:05:55 2017 Next Update: Sat Mar 31 21:05:55 2018 CRL Extensions: chains.sh: #15414: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331210556Z addcert 20 20170331210556Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 21:05:56 2017 Next Update: Sat Mar 31 21:05:54 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Mar 31 21:05:56 2017 CRL Extensions: chains.sh: #15415: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170331210558Z addcert 40 20170331210558Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Mar 31 21:05:58 2017 Next Update: Sat Mar 31 21:05:54 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Mar 31 21:05:56 2017 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Mar 31 21:05:58 2017 CRL Extensions: chains.sh: #15416: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #15417: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15418: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #15419: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195868 (0x13bda5dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 21:04:08 2017 Not After : Thu Mar 31 21:04:08 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:7e:60:db:3c:64:af:27:a2:03:73:cd:f2:a3:37:7a: ae:9e:3a:28:8d:09:0f:53:8b:26:9e:2c:9e:64:ce:8b: 31:70:00:25:40:04:5c:ce:99:bd:47:2e:eb:73:dc:3f: 49:6d:78:03:d8:b3:d1:b9:28:fc:eb:01:8e:4f:eb:0d: 96:69:a7:12:e9:2a:97:53:ef:a6:36:00:dc:da:0d:f5: 58:ea:d9:db:2f:fe:24:76:76:36:a9:7f:17:1a:f2:b3: 27:b8:df:29:f2:19:a3:f2:e3:91:37:86:7f:75:c3:79: c3:39:ed:e6:26:21:40:11:49:cd:f5:f8:14:d9:7d:c4: 74:34:c6:8a:e9:04:e9:16:16:c7:1d:6a:5d:6e:55:fd: 02:8e:e1:41:94:6c:c3:fc:c4:87:2c:55:01:7e:8d:f7: 6a:5e:43:6c:59:b3:02:28:98:df:64:44:32:80:28:54: 98:c3:b5:ac:38:e2:bd:33:71:7f:e6:95:77:1d:93:8d: 73:84:df:a0:2a:8f:88:98:d1:81:14:bc:83:50:86:4c: 51:d2:15:31:b6:91:27:f2:d8:b3:40:c6:9f:2a:e6:bf: 11:1a:f9:e7:81:48:98:e7:0b:9f:4b:5c:52:9b:31:5c: d0:59:75:85:52:e8:f8:0f:a5:7e:5b:0a:37:bf:66:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:52:3c:b4:aa:c3:ff:cc:74:e4:10:58:02:ad:ef:55: 16:ca:ef:7f:08:d7:a8:e4:6e:25:23:91:8a:88:81:6d: 9a:69:04:2d:75:2e:06:19:c9:ab:7b:9b:a0:8a:88:ee: 08:ba:5c:8c:ab:ed:ab:19:f7:53:ef:97:c6:bc:0c:97: c5:fd:23:35:4a:19:92:0e:15:09:fd:d7:be:cb:45:0b: 26:fe:e4:d0:1c:d4:0e:f4:a1:d0:8a:db:df:39:37:7d: f6:4b:ce:2a:37:f0:00:d3:76:81:fd:ba:aa:cf:8a:39: cb:53:86:f2:d8:68:3a:02:80:e7:e4:c7:7a:0b:28:8c: 9e:eb:b0:53:b8:02:8e:93:1e:e8:9d:41:19:6b:08:e5: 90:a1:73:e3:5e:d3:c5:ba:67:87:17:91:07:99:7c:be: 90:91:c0:e8:40:63:e7:b0:d0:5d:d0:b7:16:81:d8:c9: 7d:44:f6:09:87:eb:68:8c:d7:85:b7:96:b9:45:c5:79: cd:a9:90:09:fd:77:73:91:97:c0:0f:5a:75:47:c3:ee: 95:72:77:45:c3:64:13:b9:b9:e3:84:d0:99:5d:b4:ed: b7:af:eb:3e:6c:88:da:53:90:19:a0:cc:7a:55:72:ee: 37:30:48:db:ba:ca:27:95:91:df:fd:7b:b5:d8:a3:53 Fingerprint (SHA-256): BA:3B:B3:11:3F:F3:A2:0F:95:12:CC:03:AD:A5:34:37:9E:AC:E2:B3:CB:62:79:ED:1D:90:53:E3:04:F8:9D:01 Fingerprint (SHA1): 61:FA:59:C3:CB:06:E3:C2:55:05:75:D9:BC:8E:74:F5:06:68:7E:D6 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #15420: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #15421: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195868 (0x13bda5dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Mar 31 21:04:08 2017 Not After : Thu Mar 31 21:04:08 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:7e:60:db:3c:64:af:27:a2:03:73:cd:f2:a3:37:7a: ae:9e:3a:28:8d:09:0f:53:8b:26:9e:2c:9e:64:ce:8b: 31:70:00:25:40:04:5c:ce:99:bd:47:2e:eb:73:dc:3f: 49:6d:78:03:d8:b3:d1:b9:28:fc:eb:01:8e:4f:eb:0d: 96:69:a7:12:e9:2a:97:53:ef:a6:36:00:dc:da:0d:f5: 58:ea:d9:db:2f:fe:24:76:76:36:a9:7f:17:1a:f2:b3: 27:b8:df:29:f2:19:a3:f2:e3:91:37:86:7f:75:c3:79: c3:39:ed:e6:26:21:40:11:49:cd:f5:f8:14:d9:7d:c4: 74:34:c6:8a:e9:04:e9:16:16:c7:1d:6a:5d:6e:55:fd: 02:8e:e1:41:94:6c:c3:fc:c4:87:2c:55:01:7e:8d:f7: 6a:5e:43:6c:59:b3:02:28:98:df:64:44:32:80:28:54: 98:c3:b5:ac:38:e2:bd:33:71:7f:e6:95:77:1d:93:8d: 73:84:df:a0:2a:8f:88:98:d1:81:14:bc:83:50:86:4c: 51:d2:15:31:b6:91:27:f2:d8:b3:40:c6:9f:2a:e6:bf: 11:1a:f9:e7:81:48:98:e7:0b:9f:4b:5c:52:9b:31:5c: d0:59:75:85:52:e8:f8:0f:a5:7e:5b:0a:37:bf:66:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:52:3c:b4:aa:c3:ff:cc:74:e4:10:58:02:ad:ef:55: 16:ca:ef:7f:08:d7:a8:e4:6e:25:23:91:8a:88:81:6d: 9a:69:04:2d:75:2e:06:19:c9:ab:7b:9b:a0:8a:88:ee: 08:ba:5c:8c:ab:ed:ab:19:f7:53:ef:97:c6:bc:0c:97: c5:fd:23:35:4a:19:92:0e:15:09:fd:d7:be:cb:45:0b: 26:fe:e4:d0:1c:d4:0e:f4:a1:d0:8a:db:df:39:37:7d: f6:4b:ce:2a:37:f0:00:d3:76:81:fd:ba:aa:cf:8a:39: cb:53:86:f2:d8:68:3a:02:80:e7:e4:c7:7a:0b:28:8c: 9e:eb:b0:53:b8:02:8e:93:1e:e8:9d:41:19:6b:08:e5: 90:a1:73:e3:5e:d3:c5:ba:67:87:17:91:07:99:7c:be: 90:91:c0:e8:40:63:e7:b0:d0:5d:d0:b7:16:81:d8:c9: 7d:44:f6:09:87:eb:68:8c:d7:85:b7:96:b9:45:c5:79: cd:a9:90:09:fd:77:73:91:97:c0:0f:5a:75:47:c3:ee: 95:72:77:45:c3:64:13:b9:b9:e3:84:d0:99:5d:b4:ed: b7:af:eb:3e:6c:88:da:53:90:19:a0:cc:7a:55:72:ee: 37:30:48:db:ba:ca:27:95:91:df:fd:7b:b5:d8:a3:53 Fingerprint (SHA-256): BA:3B:B3:11:3F:F3:A2:0F:95:12:CC:03:AD:A5:34:37:9E:AC:E2:B3:CB:62:79:ED:1D:90:53:E3:04:F8:9D:01 Fingerprint (SHA1): 61:FA:59:C3:CB:06:E3:C2:55:05:75:D9:BC:8E:74:F5:06:68:7E:D6 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #15422: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #15423: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #15424: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195872 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15425: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #15426: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #15427: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15428: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 331195873 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15429: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15430: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #15431: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15432: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 331195874 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15433: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15434: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #15435: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15436: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 331195875 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15437: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15438: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #15439: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -m 331195876 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #15440: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #15441: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #15442: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #15443: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 331195877 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15444: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15445: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #15446: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #15447: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 331195878 < /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #15448: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #15449: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #15450: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #15451: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #15452: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195872 (0x13bda5e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 21:06:15 2017 Not After : Thu Mar 31 21:06:15 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:f4:7d:65:d6:45:06:86:aa:89:df:ef:54:73:d0:0f: 22:4d:72:10:ee:64:e3:aa:95:2f:d9:00:7c:bb:f2:c4: 35:9e:08:e1:c7:03:d6:2a:67:a7:83:03:d6:9f:8b:5e: 51:60:14:5b:37:20:31:37:d6:59:0a:7a:f2:41:39:b6: 5e:ae:5c:83:a5:8f:d1:d8:c3:c0:b5:c9:5e:3b:71:d3: 41:ca:7c:b0:0e:30:47:e2:96:60:6b:2e:5d:b4:91:32: 90:18:57:8e:87:76:9c:e0:11:ab:79:2c:e3:fa:ca:00: 4a:51:3b:88:09:08:d2:bd:5d:a4:ac:45:5a:95:3c:f5: 35:c4:c9:aa:04:35:d9:df:da:da:12:3c:fe:34:e0:e8: ba:57:c2:34:4e:18:b8:64:26:0e:36:66:bb:20:0f:da: 5e:ad:9f:5d:d9:0b:2e:dc:9c:5e:e8:be:b2:49:34:64: 20:a1:4d:95:0f:19:60:04:8c:99:9e:ab:29:28:61:9a: 60:34:f5:d9:b5:ea:e4:aa:5d:95:30:f9:04:aa:4a:1f: 62:4e:99:e6:73:d5:5c:83:82:11:9c:3f:28:55:be:63: c9:3c:34:1d:8a:58:d4:7f:49:88:c0:9e:0d:73:48:6d: 1f:d9:ad:65:bb:45:60:2b:0b:4a:0c:7a:30:d9:40:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:45:f2:0a:4c:4f:fa:44:f8:a6:8f:7b:d0:33:25:dc: 8d:2b:75:56:52:97:f1:c4:01:44:e4:19:d3:a5:95:1e: a7:51:db:2b:40:d2:b6:29:4c:96:e0:c5:c4:98:cb:3c: d7:30:c3:ab:ac:f9:44:f3:4b:f5:55:d2:6c:de:9d:43: e1:db:60:81:8a:c7:60:d1:9d:b3:f3:fb:07:d3:82:2a: 12:f3:8c:7b:f2:d9:42:d3:ee:7b:bb:eb:67:41:82:eb: 04:c7:68:f3:bd:85:db:79:e3:4c:3e:8f:f4:72:01:82: fb:a7:5e:b2:87:55:67:7e:7e:f8:bb:e3:06:ea:c6:1e: fb:02:c8:36:2f:6d:91:fc:48:3c:f4:ca:39:12:c8:59: d4:4d:5f:c1:36:f6:73:77:48:7c:42:a9:37:25:7d:c3: c0:a4:9a:33:43:9c:54:45:55:ca:35:b5:b5:03:6b:76: 5f:da:35:2c:29:ca:29:3f:30:ae:c2:ed:56:1c:c9:12: c9:5a:2a:1f:e9:c7:12:66:71:b6:db:3d:85:34:77:2a: fa:f2:3e:89:9a:f7:f0:19:6e:8f:17:8a:26:ff:39:6c: 51:9c:a1:18:b4:a9:aa:77:ff:12:1d:0c:12:8c:7a:e4: 4a:b6:32:81:31:c9:43:39:5a:22:87:97:3b:d7:c1:ec Fingerprint (SHA-256): 88:8C:54:B8:4E:11:B6:E7:A1:0E:DD:74:91:7A:4B:72:8F:10:50:1D:D9:68:3E:8B:19:1B:4B:3D:84:68:AC:39 Fingerprint (SHA1): 5B:0A:49:76:47:3D:67:49:0A:F0:15:3B:69:AD:99:A6:D1:B9:4D:6D Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15453: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195874 (0x13bda5e2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 21:06:48 2017 Not After : Thu Mar 31 21:06:48 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:62:a5:3e:19:10:e9:88:f5:a2:cc:c8:2a:3a:bb:ee: 37:7b:c4:51:9b:db:93:b4:2b:1a:57:57:3b:42:67:91: de:7a:f4:53:0d:24:29:df:a8:a4:b0:9e:15:22:ac:d7: 0f:b6:da:91:85:b5:06:fc:bc:4c:a1:b9:b2:26:58:5a: 9e:5c:05:17:e9:e3:80:18:40:83:fb:d4:22:35:8e:03: b8:9a:4b:e0:87:c3:bb:04:0c:a1:c7:a3:e0:f5:d8:49: 59:1e:c6:bb:31:f1:a0:02:b6:1f:d8:a0:0f:80:73:ae: 10:f3:85:86:a8:92:5f:3c:1a:8d:2a:25:93:d5:86:c2: 15:b7:13:27:53:ae:af:a5:9b:c1:4f:fe:08:a2:33:c3: b4:6a:c3:85:71:03:57:a1:d4:89:34:a0:6d:8a:77:9d: f4:25:79:9c:91:f3:42:e3:f0:0d:4d:3a:77:87:03:c2: 96:89:d2:85:25:dd:61:0a:76:ed:ed:d3:4a:ea:08:f5: 69:98:be:de:fe:84:ca:57:c0:2d:fb:01:7d:c5:fb:db: 74:d7:3b:d2:1e:5c:1a:b4:0f:b0:3e:2d:e0:c6:1d:45: bf:f9:41:7a:ae:35:8e:c8:f1:41:6b:7c:2c:49:17:3d: 06:f6:49:cc:8c:27:ed:94:c3:48:6c:10:08:65:5a:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:35:ff:65:04:7b:63:f1:33:df:28:58:bd:3b:dc:98: 1b:a2:08:fc:de:64:92:1b:e6:09:5b:b8:b7:6e:47:f3: e7:ea:97:89:40:37:51:e9:d9:fe:82:7c:61:a5:54:3b: 6a:4b:fb:47:40:36:99:d5:6f:9a:c7:34:21:fb:86:43: f4:0a:f3:cf:63:9d:06:a8:75:28:5b:77:84:57:d0:bf: 6c:ea:ea:e7:6b:52:e0:be:94:52:3b:1e:23:f5:fb:e6: 21:8d:d0:73:af:8a:70:a1:54:3c:8e:30:d9:80:15:b9: 6c:70:0c:ac:e6:c1:12:f9:dc:36:26:6f:9c:b1:07:44: 5f:31:6e:88:03:a5:3f:21:bb:95:14:de:da:11:94:96: c5:6d:cf:6e:17:0c:86:62:51:32:b2:43:3d:88:bb:5c: f8:27:58:d7:29:15:5a:57:45:49:32:7d:a9:82:43:18: 96:26:f3:3d:35:bc:35:21:4f:fa:3c:85:d3:bf:5c:c0: 8d:59:02:06:de:5d:5b:e6:90:12:68:44:1d:e6:25:cd: 47:39:78:25:17:50:3b:f8:b2:ea:9a:f5:6c:47:70:5b: dd:82:04:89:41:07:00:9b:07:1e:bf:b9:d7:ea:e0:91: 34:d1:80:17:b6:fb:82:e0:6e:60:ac:63:dd:5a:9d:be Fingerprint (SHA-256): 2B:18:47:F2:36:26:60:AA:C0:34:AF:CA:DD:82:02:81:36:80:BD:C8:6B:B6:B2:D1:90:BE:1E:C3:22:02:51:A8 Fingerprint (SHA1): 7B:C7:C5:2E:08:64:ED:05:96:EB:3F:C4:9F:14:0A:B2:FD:E9:6E:DB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #15454: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195872 (0x13bda5e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 21:06:15 2017 Not After : Thu Mar 31 21:06:15 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:f4:7d:65:d6:45:06:86:aa:89:df:ef:54:73:d0:0f: 22:4d:72:10:ee:64:e3:aa:95:2f:d9:00:7c:bb:f2:c4: 35:9e:08:e1:c7:03:d6:2a:67:a7:83:03:d6:9f:8b:5e: 51:60:14:5b:37:20:31:37:d6:59:0a:7a:f2:41:39:b6: 5e:ae:5c:83:a5:8f:d1:d8:c3:c0:b5:c9:5e:3b:71:d3: 41:ca:7c:b0:0e:30:47:e2:96:60:6b:2e:5d:b4:91:32: 90:18:57:8e:87:76:9c:e0:11:ab:79:2c:e3:fa:ca:00: 4a:51:3b:88:09:08:d2:bd:5d:a4:ac:45:5a:95:3c:f5: 35:c4:c9:aa:04:35:d9:df:da:da:12:3c:fe:34:e0:e8: ba:57:c2:34:4e:18:b8:64:26:0e:36:66:bb:20:0f:da: 5e:ad:9f:5d:d9:0b:2e:dc:9c:5e:e8:be:b2:49:34:64: 20:a1:4d:95:0f:19:60:04:8c:99:9e:ab:29:28:61:9a: 60:34:f5:d9:b5:ea:e4:aa:5d:95:30:f9:04:aa:4a:1f: 62:4e:99:e6:73:d5:5c:83:82:11:9c:3f:28:55:be:63: c9:3c:34:1d:8a:58:d4:7f:49:88:c0:9e:0d:73:48:6d: 1f:d9:ad:65:bb:45:60:2b:0b:4a:0c:7a:30:d9:40:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:45:f2:0a:4c:4f:fa:44:f8:a6:8f:7b:d0:33:25:dc: 8d:2b:75:56:52:97:f1:c4:01:44:e4:19:d3:a5:95:1e: a7:51:db:2b:40:d2:b6:29:4c:96:e0:c5:c4:98:cb:3c: d7:30:c3:ab:ac:f9:44:f3:4b:f5:55:d2:6c:de:9d:43: e1:db:60:81:8a:c7:60:d1:9d:b3:f3:fb:07:d3:82:2a: 12:f3:8c:7b:f2:d9:42:d3:ee:7b:bb:eb:67:41:82:eb: 04:c7:68:f3:bd:85:db:79:e3:4c:3e:8f:f4:72:01:82: fb:a7:5e:b2:87:55:67:7e:7e:f8:bb:e3:06:ea:c6:1e: fb:02:c8:36:2f:6d:91:fc:48:3c:f4:ca:39:12:c8:59: d4:4d:5f:c1:36:f6:73:77:48:7c:42:a9:37:25:7d:c3: c0:a4:9a:33:43:9c:54:45:55:ca:35:b5:b5:03:6b:76: 5f:da:35:2c:29:ca:29:3f:30:ae:c2:ed:56:1c:c9:12: c9:5a:2a:1f:e9:c7:12:66:71:b6:db:3d:85:34:77:2a: fa:f2:3e:89:9a:f7:f0:19:6e:8f:17:8a:26:ff:39:6c: 51:9c:a1:18:b4:a9:aa:77:ff:12:1d:0c:12:8c:7a:e4: 4a:b6:32:81:31:c9:43:39:5a:22:87:97:3b:d7:c1:ec Fingerprint (SHA-256): 88:8C:54:B8:4E:11:B6:E7:A1:0E:DD:74:91:7A:4B:72:8F:10:50:1D:D9:68:3E:8B:19:1B:4B:3D:84:68:AC:39 Fingerprint (SHA1): 5B:0A:49:76:47:3D:67:49:0A:F0:15:3B:69:AD:99:A6:D1:B9:4D:6D Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15455: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #15456: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195872 (0x13bda5e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 21:06:15 2017 Not After : Thu Mar 31 21:06:15 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:f4:7d:65:d6:45:06:86:aa:89:df:ef:54:73:d0:0f: 22:4d:72:10:ee:64:e3:aa:95:2f:d9:00:7c:bb:f2:c4: 35:9e:08:e1:c7:03:d6:2a:67:a7:83:03:d6:9f:8b:5e: 51:60:14:5b:37:20:31:37:d6:59:0a:7a:f2:41:39:b6: 5e:ae:5c:83:a5:8f:d1:d8:c3:c0:b5:c9:5e:3b:71:d3: 41:ca:7c:b0:0e:30:47:e2:96:60:6b:2e:5d:b4:91:32: 90:18:57:8e:87:76:9c:e0:11:ab:79:2c:e3:fa:ca:00: 4a:51:3b:88:09:08:d2:bd:5d:a4:ac:45:5a:95:3c:f5: 35:c4:c9:aa:04:35:d9:df:da:da:12:3c:fe:34:e0:e8: ba:57:c2:34:4e:18:b8:64:26:0e:36:66:bb:20:0f:da: 5e:ad:9f:5d:d9:0b:2e:dc:9c:5e:e8:be:b2:49:34:64: 20:a1:4d:95:0f:19:60:04:8c:99:9e:ab:29:28:61:9a: 60:34:f5:d9:b5:ea:e4:aa:5d:95:30:f9:04:aa:4a:1f: 62:4e:99:e6:73:d5:5c:83:82:11:9c:3f:28:55:be:63: c9:3c:34:1d:8a:58:d4:7f:49:88:c0:9e:0d:73:48:6d: 1f:d9:ad:65:bb:45:60:2b:0b:4a:0c:7a:30:d9:40:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:45:f2:0a:4c:4f:fa:44:f8:a6:8f:7b:d0:33:25:dc: 8d:2b:75:56:52:97:f1:c4:01:44:e4:19:d3:a5:95:1e: a7:51:db:2b:40:d2:b6:29:4c:96:e0:c5:c4:98:cb:3c: d7:30:c3:ab:ac:f9:44:f3:4b:f5:55:d2:6c:de:9d:43: e1:db:60:81:8a:c7:60:d1:9d:b3:f3:fb:07:d3:82:2a: 12:f3:8c:7b:f2:d9:42:d3:ee:7b:bb:eb:67:41:82:eb: 04:c7:68:f3:bd:85:db:79:e3:4c:3e:8f:f4:72:01:82: fb:a7:5e:b2:87:55:67:7e:7e:f8:bb:e3:06:ea:c6:1e: fb:02:c8:36:2f:6d:91:fc:48:3c:f4:ca:39:12:c8:59: d4:4d:5f:c1:36:f6:73:77:48:7c:42:a9:37:25:7d:c3: c0:a4:9a:33:43:9c:54:45:55:ca:35:b5:b5:03:6b:76: 5f:da:35:2c:29:ca:29:3f:30:ae:c2:ed:56:1c:c9:12: c9:5a:2a:1f:e9:c7:12:66:71:b6:db:3d:85:34:77:2a: fa:f2:3e:89:9a:f7:f0:19:6e:8f:17:8a:26:ff:39:6c: 51:9c:a1:18:b4:a9:aa:77:ff:12:1d:0c:12:8c:7a:e4: 4a:b6:32:81:31:c9:43:39:5a:22:87:97:3b:d7:c1:ec Fingerprint (SHA-256): 88:8C:54:B8:4E:11:B6:E7:A1:0E:DD:74:91:7A:4B:72:8F:10:50:1D:D9:68:3E:8B:19:1B:4B:3D:84:68:AC:39 Fingerprint (SHA1): 5B:0A:49:76:47:3D:67:49:0A:F0:15:3B:69:AD:99:A6:D1:B9:4D:6D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15457: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195874 (0x13bda5e2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Mar 31 21:06:48 2017 Not After : Thu Mar 31 21:06:48 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:62:a5:3e:19:10:e9:88:f5:a2:cc:c8:2a:3a:bb:ee: 37:7b:c4:51:9b:db:93:b4:2b:1a:57:57:3b:42:67:91: de:7a:f4:53:0d:24:29:df:a8:a4:b0:9e:15:22:ac:d7: 0f:b6:da:91:85:b5:06:fc:bc:4c:a1:b9:b2:26:58:5a: 9e:5c:05:17:e9:e3:80:18:40:83:fb:d4:22:35:8e:03: b8:9a:4b:e0:87:c3:bb:04:0c:a1:c7:a3:e0:f5:d8:49: 59:1e:c6:bb:31:f1:a0:02:b6:1f:d8:a0:0f:80:73:ae: 10:f3:85:86:a8:92:5f:3c:1a:8d:2a:25:93:d5:86:c2: 15:b7:13:27:53:ae:af:a5:9b:c1:4f:fe:08:a2:33:c3: b4:6a:c3:85:71:03:57:a1:d4:89:34:a0:6d:8a:77:9d: f4:25:79:9c:91:f3:42:e3:f0:0d:4d:3a:77:87:03:c2: 96:89:d2:85:25:dd:61:0a:76:ed:ed:d3:4a:ea:08:f5: 69:98:be:de:fe:84:ca:57:c0:2d:fb:01:7d:c5:fb:db: 74:d7:3b:d2:1e:5c:1a:b4:0f:b0:3e:2d:e0:c6:1d:45: bf:f9:41:7a:ae:35:8e:c8:f1:41:6b:7c:2c:49:17:3d: 06:f6:49:cc:8c:27:ed:94:c3:48:6c:10:08:65:5a:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:35:ff:65:04:7b:63:f1:33:df:28:58:bd:3b:dc:98: 1b:a2:08:fc:de:64:92:1b:e6:09:5b:b8:b7:6e:47:f3: e7:ea:97:89:40:37:51:e9:d9:fe:82:7c:61:a5:54:3b: 6a:4b:fb:47:40:36:99:d5:6f:9a:c7:34:21:fb:86:43: f4:0a:f3:cf:63:9d:06:a8:75:28:5b:77:84:57:d0:bf: 6c:ea:ea:e7:6b:52:e0:be:94:52:3b:1e:23:f5:fb:e6: 21:8d:d0:73:af:8a:70:a1:54:3c:8e:30:d9:80:15:b9: 6c:70:0c:ac:e6:c1:12:f9:dc:36:26:6f:9c:b1:07:44: 5f:31:6e:88:03:a5:3f:21:bb:95:14:de:da:11:94:96: c5:6d:cf:6e:17:0c:86:62:51:32:b2:43:3d:88:bb:5c: f8:27:58:d7:29:15:5a:57:45:49:32:7d:a9:82:43:18: 96:26:f3:3d:35:bc:35:21:4f:fa:3c:85:d3:bf:5c:c0: 8d:59:02:06:de:5d:5b:e6:90:12:68:44:1d:e6:25:cd: 47:39:78:25:17:50:3b:f8:b2:ea:9a:f5:6c:47:70:5b: dd:82:04:89:41:07:00:9b:07:1e:bf:b9:d7:ea:e0:91: 34:d1:80:17:b6:fb:82:e0:6e:60:ac:63:dd:5a:9d:be Fingerprint (SHA-256): 2B:18:47:F2:36:26:60:AA:C0:34:AF:CA:DD:82:02:81:36:80:BD:C8:6B:B6:B2:D1:90:BE:1E:C3:22:02:51:A8 Fingerprint (SHA1): 7B:C7:C5:2E:08:64:ED:05:96:EB:3F:C4:9F:14:0A:B2:FD:E9:6E:DB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #15458: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #15459: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #15460: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #15461: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195872 (0x13bda5e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 21:06:15 2017 Not After : Thu Mar 31 21:06:15 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:f4:7d:65:d6:45:06:86:aa:89:df:ef:54:73:d0:0f: 22:4d:72:10:ee:64:e3:aa:95:2f:d9:00:7c:bb:f2:c4: 35:9e:08:e1:c7:03:d6:2a:67:a7:83:03:d6:9f:8b:5e: 51:60:14:5b:37:20:31:37:d6:59:0a:7a:f2:41:39:b6: 5e:ae:5c:83:a5:8f:d1:d8:c3:c0:b5:c9:5e:3b:71:d3: 41:ca:7c:b0:0e:30:47:e2:96:60:6b:2e:5d:b4:91:32: 90:18:57:8e:87:76:9c:e0:11:ab:79:2c:e3:fa:ca:00: 4a:51:3b:88:09:08:d2:bd:5d:a4:ac:45:5a:95:3c:f5: 35:c4:c9:aa:04:35:d9:df:da:da:12:3c:fe:34:e0:e8: ba:57:c2:34:4e:18:b8:64:26:0e:36:66:bb:20:0f:da: 5e:ad:9f:5d:d9:0b:2e:dc:9c:5e:e8:be:b2:49:34:64: 20:a1:4d:95:0f:19:60:04:8c:99:9e:ab:29:28:61:9a: 60:34:f5:d9:b5:ea:e4:aa:5d:95:30:f9:04:aa:4a:1f: 62:4e:99:e6:73:d5:5c:83:82:11:9c:3f:28:55:be:63: c9:3c:34:1d:8a:58:d4:7f:49:88:c0:9e:0d:73:48:6d: 1f:d9:ad:65:bb:45:60:2b:0b:4a:0c:7a:30:d9:40:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:45:f2:0a:4c:4f:fa:44:f8:a6:8f:7b:d0:33:25:dc: 8d:2b:75:56:52:97:f1:c4:01:44:e4:19:d3:a5:95:1e: a7:51:db:2b:40:d2:b6:29:4c:96:e0:c5:c4:98:cb:3c: d7:30:c3:ab:ac:f9:44:f3:4b:f5:55:d2:6c:de:9d:43: e1:db:60:81:8a:c7:60:d1:9d:b3:f3:fb:07:d3:82:2a: 12:f3:8c:7b:f2:d9:42:d3:ee:7b:bb:eb:67:41:82:eb: 04:c7:68:f3:bd:85:db:79:e3:4c:3e:8f:f4:72:01:82: fb:a7:5e:b2:87:55:67:7e:7e:f8:bb:e3:06:ea:c6:1e: fb:02:c8:36:2f:6d:91:fc:48:3c:f4:ca:39:12:c8:59: d4:4d:5f:c1:36:f6:73:77:48:7c:42:a9:37:25:7d:c3: c0:a4:9a:33:43:9c:54:45:55:ca:35:b5:b5:03:6b:76: 5f:da:35:2c:29:ca:29:3f:30:ae:c2:ed:56:1c:c9:12: c9:5a:2a:1f:e9:c7:12:66:71:b6:db:3d:85:34:77:2a: fa:f2:3e:89:9a:f7:f0:19:6e:8f:17:8a:26:ff:39:6c: 51:9c:a1:18:b4:a9:aa:77:ff:12:1d:0c:12:8c:7a:e4: 4a:b6:32:81:31:c9:43:39:5a:22:87:97:3b:d7:c1:ec Fingerprint (SHA-256): 88:8C:54:B8:4E:11:B6:E7:A1:0E:DD:74:91:7A:4B:72:8F:10:50:1D:D9:68:3E:8B:19:1B:4B:3D:84:68:AC:39 Fingerprint (SHA1): 5B:0A:49:76:47:3D:67:49:0A:F0:15:3B:69:AD:99:A6:D1:B9:4D:6D Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15462: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195876 (0x13bda5e4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Mar 31 21:07:12 2017 Not After : Thu Mar 31 21:07:12 2067 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:b6:22:44:9f:88:9f:a8:17:04:ee:55:9a:46:04:59: 72:a8:45:e1:b0:4e:51:47:cd:8e:02:4a:5b:ac:43:60: 65:c4:ca:20:8f:79:8d:e1:ef:9d:dd:9a:44:cd:56:9a: c0:14:ed:cc:a6:d6:6a:de:05:cc:fc:6f:3c:6c:15:b1: 83:99:26:e6:45:b1:a0:88:c2:44:cf:b3:53:bf:fa:f3: 2c:6b:e1:60:8b:be:7c:a7:02:a6:c7:01:20:84:31:c1: dd:3a:b6:e8:d1:5d:87:29:c2:df:63:da:95:be:8a:97: 26:b4:ff:39:88:09:61:5b:25:84:45:09:a2:89:a9:1d: 6f:75:1f:dd:0b:6a:c8:86:fb:e8:2d:f4:7b:c0:16:32: b6:bd:c8:b1:1e:f3:b2:82:85:5a:06:4a:15:c0:82:25: 23:1f:06:fb:d6:7c:ff:98:02:28:50:27:3f:73:e6:fb: 57:f6:6c:4e:7c:b3:6b:a5:be:c2:2d:75:19:c2:29:62: 8e:30:e5:e9:56:f5:ff:91:7c:14:6d:dc:b8:c8:eb:39: c3:9d:5e:9c:06:e5:ab:6f:74:fd:21:1b:e5:99:90:c6: 85:31:3e:c7:89:68:48:c1:9e:9e:06:20:3c:61:00:a9: 18:55:e5:50:ad:21:0b:1b:54:26:d7:a8:70:96:1a:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:31:77:b3:6f:00:20:8c:b9:00:5c:d7:44:c6:4d:d6: 76:b5:9f:8f:d3:4d:b4:0b:cb:c9:2a:ac:8b:3f:58:df: b8:fa:3c:b1:c9:14:fe:9a:fc:a0:46:28:69:70:dc:fe: 8d:03:5a:0d:ee:e5:08:0a:21:33:d4:a4:6a:d1:88:48: 66:be:db:8b:bb:a2:38:2d:50:ef:23:2a:b1:23:7b:af: 56:12:38:cc:7b:fd:f4:74:29:1b:62:5a:4c:8e:18:41: a6:f4:bc:94:84:3e:c2:be:e0:5c:3f:06:4b:4b:4d:86: 44:c1:d8:7b:58:8a:f2:d0:c7:43:e6:b3:c7:9b:0b:48: 86:30:5a:78:68:eb:85:a5:6b:8c:ce:00:26:09:2b:2d: 0e:99:13:29:bb:25:f1:db:3e:03:ef:5c:86:75:95:5d: 9d:56:5f:62:de:ab:8b:48:2b:49:a6:25:97:fb:76:65: 86:5f:30:85:20:56:63:5f:e4:3e:21:df:17:55:41:08: 0f:97:b1:31:48:bb:bb:67:44:6d:73:cf:5d:71:8b:80: ec:51:18:33:3d:62:c1:81:9a:b5:52:6a:48:98:48:33: 95:77:1a:f3:c7:fb:39:dd:16:00:b0:5a:e5:b0:8f:5c: 69:cb:d8:c0:c0:a5:dc:71:16:87:a0:5b:59:63:db:87 Fingerprint (SHA-256): 2D:96:45:5C:99:E5:8C:6C:5F:A7:FC:9B:91:D2:01:CA:C2:9D:71:7B:7A:DD:5D:18:3A:44:5D:05:87:BB:1E:1B Fingerprint (SHA1): 0C:F4:1D:B9:59:45:BE:08:A2:B4:5C:C9:99:37:21:60:71:83:93:4B Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #15463: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195872 (0x13bda5e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Mar 31 21:06:15 2017 Not After : Thu Mar 31 21:06:15 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:f4:7d:65:d6:45:06:86:aa:89:df:ef:54:73:d0:0f: 22:4d:72:10:ee:64:e3:aa:95:2f:d9:00:7c:bb:f2:c4: 35:9e:08:e1:c7:03:d6:2a:67:a7:83:03:d6:9f:8b:5e: 51:60:14:5b:37:20:31:37:d6:59:0a:7a:f2:41:39:b6: 5e:ae:5c:83:a5:8f:d1:d8:c3:c0:b5:c9:5e:3b:71:d3: 41:ca:7c:b0:0e:30:47:e2:96:60:6b:2e:5d:b4:91:32: 90:18:57:8e:87:76:9c:e0:11:ab:79:2c:e3:fa:ca:00: 4a:51:3b:88:09:08:d2:bd:5d:a4:ac:45:5a:95:3c:f5: 35:c4:c9:aa:04:35:d9:df:da:da:12:3c:fe:34:e0:e8: ba:57:c2:34:4e:18:b8:64:26:0e:36:66:bb:20:0f:da: 5e:ad:9f:5d:d9:0b:2e:dc:9c:5e:e8:be:b2:49:34:64: 20:a1:4d:95:0f:19:60:04:8c:99:9e:ab:29:28:61:9a: 60:34:f5:d9:b5:ea:e4:aa:5d:95:30:f9:04:aa:4a:1f: 62:4e:99:e6:73:d5:5c:83:82:11:9c:3f:28:55:be:63: c9:3c:34:1d:8a:58:d4:7f:49:88:c0:9e:0d:73:48:6d: 1f:d9:ad:65:bb:45:60:2b:0b:4a:0c:7a:30:d9:40:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:45:f2:0a:4c:4f:fa:44:f8:a6:8f:7b:d0:33:25:dc: 8d:2b:75:56:52:97:f1:c4:01:44:e4:19:d3:a5:95:1e: a7:51:db:2b:40:d2:b6:29:4c:96:e0:c5:c4:98:cb:3c: d7:30:c3:ab:ac:f9:44:f3:4b:f5:55:d2:6c:de:9d:43: e1:db:60:81:8a:c7:60:d1:9d:b3:f3:fb:07:d3:82:2a: 12:f3:8c:7b:f2:d9:42:d3:ee:7b:bb:eb:67:41:82:eb: 04:c7:68:f3:bd:85:db:79:e3:4c:3e:8f:f4:72:01:82: fb:a7:5e:b2:87:55:67:7e:7e:f8:bb:e3:06:ea:c6:1e: fb:02:c8:36:2f:6d:91:fc:48:3c:f4:ca:39:12:c8:59: d4:4d:5f:c1:36:f6:73:77:48:7c:42:a9:37:25:7d:c3: c0:a4:9a:33:43:9c:54:45:55:ca:35:b5:b5:03:6b:76: 5f:da:35:2c:29:ca:29:3f:30:ae:c2:ed:56:1c:c9:12: c9:5a:2a:1f:e9:c7:12:66:71:b6:db:3d:85:34:77:2a: fa:f2:3e:89:9a:f7:f0:19:6e:8f:17:8a:26:ff:39:6c: 51:9c:a1:18:b4:a9:aa:77:ff:12:1d:0c:12:8c:7a:e4: 4a:b6:32:81:31:c9:43:39:5a:22:87:97:3b:d7:c1:ec Fingerprint (SHA-256): 88:8C:54:B8:4E:11:B6:E7:A1:0E:DD:74:91:7A:4B:72:8F:10:50:1D:D9:68:3E:8B:19:1B:4B:3D:84:68:AC:39 Fingerprint (SHA1): 5B:0A:49:76:47:3D:67:49:0A:F0:15:3B:69:AD:99:A6:D1:B9:4D:6D Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #15464: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #15465: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #15466: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #15467: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #15468: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #15469: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 331195877 (0x13bda5e5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Mar 31 21:07:20 2017 Not After : Thu Mar 31 21:07:20 2022 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:4b:21:8c:0e:a5:e2:50:a1:ce:67:b1:f2:79:d0:c0: c9:6e:a6:04:e6:ba:38:5c:9f:c7:64:65:13:b8:a5:71: 05:97:7b:da:b2:65:b8:a0:73:a3:bb:dd:05:a4:6f:6b: 0d:16:7d:1a:28:7e:c0:f1:39:c4:61:e8:61:7c:ea:06: 1f:12:ad:fb:dc:48:36:fa:a5:99:c7:d6:06:e9:87:d8: b3:e9:c4:a6:5e:4b:e3:41:ee:8f:09:3d:d8:96:66:60: ba:ef:3f:ba:b2:3a:83:9e:26:90:4c:86:85:ac:ca:1b: ad:c5:80:df:5a:e3:29:17:91:a0:e4:37:05:5b:71:92: d5:d4:c0:14:db:69:a1:74:ac:5a:60:fe:64:12:a8:6d: 2d:72:86:f1:d6:42:fc:6a:16:95:89:28:15:b6:65:4f: 98:5f:71:7e:c5:98:68:34:3c:5a:00:0f:97:b3:dd:22: 64:90:78:ea:eb:a4:76:98:9b:32:4c:0e:47:b0:0d:6a: 16:6c:81:af:35:62:67:d3:c9:65:62:b6:fe:10:bf:b1: b2:6d:b4:fb:11:ca:8a:fe:be:d0:0c:be:1b:2d:9e:88: e5:19:92:ee:47:27:f0:fb:7b:44:c9:97:15:12:ff:51: 7c:09:7f:03:c0:7e:f2:a4:8a:65:fd:d3:9b:ee:0d:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:55:02:1f:15:97:b7:2d:b6:46:16:83:97:15:09:9e: 99:a4:3b:bc:ce:b0:8e:fa:e9:1e:73:b3:fb:46:10:ff: 33:15:3e:f8:e9:f4:e5:cc:40:39:dc:21:4b:b4:87:08: cf:d6:b2:48:e9:d6:a8:c4:64:ca:a4:3a:28:01:c5:0a: db:d2:df:65:a5:15:20:7a:1c:eb:d6:25:88:7e:64:a5: e6:a5:8d:94:77:1e:7a:60:35:90:c9:7b:38:42:c4:d2: 52:46:75:97:2a:22:a6:e2:bd:93:4a:a1:62:c9:52:8c: de:32:47:f8:91:bb:74:ac:0c:53:ee:1d:f4:ad:b6:a3: 8f:16:b5:ec:1a:a4:57:b0:7e:88:05:d3:fb:17:04:15: 59:29:30:3b:ba:e4:8a:04:31:d4:59:df:61:07:0d:6c: 10:e5:8d:cd:e1:58:a3:4e:6c:1f:d4:43:6d:96:58:a9: cc:d1:5b:db:5b:50:ca:90:87:ed:67:6d:3f:2c:bd:79: fc:8e:dc:6d:c9:cb:8b:5e:3f:ea:92:df:2d:7f:30:c4: 11:d4:f5:d1:6a:98:09:e6:78:44:38:69:2c:b2:e3:49: 43:5a:35:43:de:37:f4:df:34:c7:a3:80:4f:4c:48:56: 71:5a:1a:7e:1e:69:14:d3:c2:55:ec:ed:e0:19:8c:f9 Fingerprint (SHA-256): 87:E1:8D:81:D3:19:5F:F4:31:92:4C:EF:34:5D:5E:22:14:1F:8F:AC:47:DC:56:1D:CF:0A:2A:20:44:79:B1:23 Fingerprint (SHA1): AC:F9:FD:15:DD:EB:36:F9:4B:21:B3:F8:96:AB:F8:06:72:2C:C1:C6 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #15470: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #15471: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #15472: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #15473: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #15474: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #15475: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15476: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #15477: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #15478: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15479: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #15480: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #15481: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #15482: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #15483: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15484: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #15485: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15486: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #15487: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15488: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #15489: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15490: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #15491: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #15492: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.28.2/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #15493: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 11684 at Fri Mar 31 21:08:15 UTC 2017 kill -USR1 11684 httpserv: normal termination httpserv -b -p 9636 2>/dev/null; httpserv with PID 11684 killed at Fri Mar 31 21:08:15 UTC 2017 TIMESTAMP chains END: Fri Mar 31 21:08:15 UTC 2017 Running tests for ec TIMESTAMP ec BEGIN: Fri Mar 31 21:08:15 UTC 2017 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Fri Mar 31 21:08:15 UTC 2017 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #15494: ec(perf) test - PASSED TIMESTAMP ecperf END: Fri Mar 31 21:08:16 UTC 2017 Running ec tests for ectest TIMESTAMP ectest BEGIN: Fri Mar 31 21:08:16 UTC 2017 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #15495: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #15496: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #15497: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #15498: ec test certutil keygen - secp521r1 - PASSED 32 256 generic 6e64fb2c4c176b1385e3eb18723c447ccd1f7af83e3c5d46920e654dd98e507d okay (OID 208) - PK11 test 48 384 generic 2dd45eeb8a15c509f88ef93020ac96db665e21f7470b10414bc13122ccf13627401f42febf3e342bb93f2f7b08b9e56f okay (OID 220) - PK11 test 66 528 generic 00ad465bfa8ccc612be6dc5eab4161fc5db9c4176738ed4a3bb7cbe199627061fefefee7bcf53ceb2d2c8524af0d4dd99eb3abeb6c59dc57beac6d55099b15213349 okay (OID 221) - PK11 test ectest.sh: #15499: pk11 ec tests - PASSED TIMESTAMP ectest END: Fri Mar 31 21:08:23 UTC 2017 TIMESTAMP ec END: Fri Mar 31 21:08:23 UTC 2017 Running tests for gtests TIMESTAMP gtests BEGIN: Fri Mar 31 21:08:23 UTC 2017 gtests: der_gtest pk11_gtest gtests.sh: der_gtest =============================== executing der_gtest [==========] Running 16 tests from 2 test cases. [----------] Global test environment set-up. [----------] 13 tests from DERIntegerDecodingTest [ RUN ] DERIntegerDecodingTest.DecodeLongMinus126 [ OK ] DERIntegerDecodingTest.DecodeLongMinus126 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130 [ OK ] DERIntegerDecodingTest.DecodeLong130 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130Padded [ OK ] DERIntegerDecodingTest.DecodeLong130Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong0 [ OK ] DERIntegerDecodingTest.DecodeLong0 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong1 [ OK ] DERIntegerDecodingTest.DecodeLong1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1Padded [ OK ] DERIntegerDecodingTest.DecodeLongMinus1Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMax [ OK ] DERIntegerDecodingTest.DecodeLongMax (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMin [ OK ] DERIntegerDecodingTest.DecodeLongMin (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinPlus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxPlus1 (0 ms) [----------] 13 tests from DERIntegerDecodingTest (1 ms total) [----------] 3 tests from DERPrivateKeyImportTest [ RUN ] DERPrivateKeyImportTest.ImportPrivateRSAKey [ OK ] DERPrivateKeyImportTest.ImportPrivateRSAKey (1 ms) [ RUN ] DERPrivateKeyImportTest.ImportInvalidPrivateKey [ OK ] DERPrivateKeyImportTest.ImportInvalidPrivateKey (0 ms) [ RUN ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey [ OK ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey (0 ms) [----------] 3 tests from DERPrivateKeyImportTest (2 ms total) [----------] Global test environment tear-down [==========] 16 tests from 2 test cases ran. (4 ms total) [ PASSED ] 16 tests. gtests.sh: #15500: der_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/der_gtest/report.xml executing sed to parse the xml report processing the parsed report gtests.sh: #15501: 'DERIntegerDecodingTest: DecodeLongMinus126' - PASSED gtests.sh: #15502: 'DERIntegerDecodingTest: DecodeLong130' - PASSED gtests.sh: #15503: 'DERIntegerDecodingTest: DecodeLong130Padded' - PASSED gtests.sh: #15504: 'DERIntegerDecodingTest: DecodeLong0' - PASSED gtests.sh: #15505: 'DERIntegerDecodingTest: DecodeLong1' - PASSED gtests.sh: #15506: 'DERIntegerDecodingTest: DecodeLongMinus1' - PASSED gtests.sh: #15507: 'DERIntegerDecodingTest: DecodeLongMinus1Padded' - PASSED gtests.sh: #15508: 'DERIntegerDecodingTest: DecodeLongMax' - PASSED gtests.sh: #15509: 'DERIntegerDecodingTest: DecodeLongMin' - PASSED gtests.sh: #15510: 'DERIntegerDecodingTest: DecodeLongMaxMinus1' - PASSED gtests.sh: #15511: 'DERIntegerDecodingTest: DecodeLongMinPlus1' - PASSED gtests.sh: #15512: 'DERIntegerDecodingTest: DecodeLongMinMinus1' - PASSED gtests.sh: #15513: 'DERIntegerDecodingTest: DecodeLongMaxPlus1' - PASSED gtests.sh: #15514: 'DERPrivateKeyImportTest: ImportPrivateRSAKey' - PASSED gtests.sh: #15515: 'DERPrivateKeyImportTest: ImportInvalidPrivateKey' - PASSED gtests.sh: #15516: 'DERPrivateKeyImportTest: ImportZeroLengthPrivateKey' - PASSED gtests.sh: pk11_gtest =============================== executing pk11_gtest [==========] Running 11 tests from 5 test cases. [----------] Global test environment set-up. [----------] 6 tests from Pkcs11AESKeyWrapTest [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest1 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest1 (0 ms) [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest2 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest2 (0 ms) [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest3 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest3 (0 ms) [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest4 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest4 (1 ms) [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest5 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest5 (0 ms) [ RUN ] Pkcs11AESKeyWrapTest.WrapUnwrepTest6 [ OK ] Pkcs11AESKeyWrapTest.WrapUnwrepTest6 (0 ms) [----------] 6 tests from Pkcs11AESKeyWrapTest (2 ms total) [----------] 1 test from Pkcs11ExportTest [ RUN ] Pkcs11ExportTest.DeriveNonExport [ OK ] Pkcs11ExportTest.DeriveNonExport (0 ms) [----------] 1 test from Pkcs11ExportTest (0 ms total) [----------] 1 test from TlsPrfTest [ RUN ] TlsPrfTest.ExtendedMsParamErr [ OK ] TlsPrfTest.ExtendedMsParamErr (1 ms) [----------] 1 test from TlsPrfTest (1 ms total) [----------] 1 test from Pkcs11RsaPssTest [ RUN ] Pkcs11RsaPssTest.GenerateAndSignAndVerify [ OK ] Pkcs11RsaPssTest.GenerateAndSignAndVerify (616 ms) [----------] 1 test from Pkcs11RsaPssTest (616 ms total) [----------] 2 tests from Pkcs11RsaPssVectorTest [ RUN ] Pkcs11RsaPssVectorTest.VerifyKnownSignature1 [ OK ] Pkcs11RsaPssVectorTest.VerifyKnownSignature1 (2 ms) [ RUN ] Pkcs11RsaPssVectorTest.VerifyKnownSignature2 [ OK ] Pkcs11RsaPssVectorTest.VerifyKnownSignature2 (3 ms) [----------] 2 tests from Pkcs11RsaPssVectorTest (5 ms total) [----------] Global test environment tear-down [==========] 11 tests from 5 test cases ran. (625 ms total) [ PASSED ] 11 tests. gtests.sh: #15517: pk11_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.28.2/tests_results/security/localhost.1/sharedb/pk11_gtest/report.xml executing sed to parse the xml report processing the parsed report gtests.sh: #15518: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest1' - PASSED gtests.sh: #15519: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest2' - PASSED gtests.sh: #15520: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest3' - PASSED gtests.sh: #15521: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest4' - PASSED gtests.sh: #15522: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest5' - PASSED gtests.sh: #15523: 'Pkcs11AESKeyWrapTest: WrapUnwrepTest6' - PASSED gtests.sh: #15524: 'Pkcs11ExportTest: DeriveNonExport' - PASSED gtests.sh: #15525: 'TlsPrfTest: ExtendedMsParamErr' - PASSED gtests.sh: #15526: 'Pkcs11RsaPssTest: GenerateAndSignAndVerify' - PASSED gtests.sh: #15527: 'Pkcs11RsaPssVectorTest: VerifyKnownSignature1' - PASSED gtests.sh: #15528: 'Pkcs11RsaPssVectorTest: VerifyKnownSignature2' - PASSED TIMESTAMP gtests END: Fri Mar 31 21:08:26 UTC 2017 Running tests for ssl_gtests TIMESTAMP ssl_gtests BEGIN: Fri Mar 31 21:08:26 UTC 2017 ssl_gtest.sh: SSL Gtests =============================== ssl_gtest.sh: #15529: create ssl_gtest database - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #15530: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #15531: create certificate: sign kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #15532: create certificate: sign kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #15533: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #15534: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #15535: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #15536: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #15537: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #15538: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #15539: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #15540: create certificate: ca - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #15541: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #15542: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #15543: create certificate: sign - PASSED executing ssl_gtest [==========] Running 785 tests from 14 test cases. [----------] Global test environment set-up. [----------] 60 tests from CipherSuiteRC4/TlsCipherSuiteTest [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/0 (427 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/1 (93 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/2 (109 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/3 (150 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/4 (103 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/5 (82 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/6 (92 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/7 (103 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/8 (149 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/9 (102 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/10 (82 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/11 (92 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/12 (102 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/13 (149 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/14 (101 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/0 (191 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/1 (238 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/2 (249 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/3 (327 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/4 (265 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/5 (193 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/6 (239 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/7 (250 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/8 (326 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/9 (261 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/10 (188 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/11 (238 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/12 (252 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/13 (326 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/14 (263 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/0 (83 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/1 (93 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/2 (104 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/3 (150 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/4 (102 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/5 (82 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/6 (93 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/7 (103 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/8 (149 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/9 (102 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/10 (82 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/11 (92 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/12 (103 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/13 (150 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/14 (102 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/0 (82 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/1 (92 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/2 (103 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/3 (150 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/4 (108 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/5 (82 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/6 (92 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/7 (102 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/8 (148 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/9 (101 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/10 (81 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/11 (91 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/12 (101 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/13 (149 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/14 (101 ms) [----------] 60 tests from CipherSuiteRC4/TlsCipherSuiteTest (8924 ms total) [----------] 48 tests from CipherSuiteAEAD12/TlsCipherSuiteTest [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/0 (81 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/1 (82 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/2 (294 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/3 (295 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/4 (103 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/5 (103 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/6 (81 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/7 (82 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/8 (295 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/9 (296 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/10 (103 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/11 (103 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/0 (188 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/1 (189 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/2 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/3 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/4 (256 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/5 (265 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/6 (190 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/7 (191 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/8 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/9 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/10 (254 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/11 (267 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/0 (81 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/1 (82 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/2 (297 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/3 (296 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/4 (103 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/5 (103 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/6 (81 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/7 (82 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/8 (296 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/9 (297 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/10 (104 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/11 (103 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/0 (83 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/1 (82 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/2 (296 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/3 (295 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/4 (103 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/5 (103 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/6 (81 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/7 (81 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/8 (295 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/9 (299 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/10 (103 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/11 (102 ms) [----------] 48 tests from CipherSuiteAEAD12/TlsCipherSuiteTest (7588 ms total) [----------] 48 tests from CipherSuiteAEAD/TlsCipherSuiteTest [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/0 (101 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/1 (101 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/2 (100 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/3 (101 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/4 (181 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/5 (181 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/6 (101 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/7 (102 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/8 (101 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/9 (101 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/10 (183 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/11 (182 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/0 (249 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/1 (250 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/2 (260 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/3 (263 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/4 (341 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/5 (341 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/6 (250 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/7 (252 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/8 (262 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/9 (267 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/10 (342 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/11 (344 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/0 (101 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/1 (103 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/2 (101 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/3 (102 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/4 (182 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/5 (182 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/6 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/6 (102 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/7 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/7 (102 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/8 (101 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/9 (103 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/10 (182 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/11 (182 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/0 (102 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/1 (102 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/2 (101 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/3 (103 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/4 (181 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/5 (181 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/6 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/6 (102 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/7 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/7 (103 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/8 (102 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/9 (101 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/10 (181 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/11 (184 ms) [----------] 48 tests from CipherSuiteAEAD/TlsCipherSuiteTest (8049 ms total) [----------] 64 tests from CipherSuiteCBC12/TlsCipherSuiteTest [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/0 (182 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/1 (82 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/2 (102 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/3 (102 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/4 (185 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/5 (81 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/6 (293 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/7 (294 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/8 (180 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/9 (81 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/10 (101 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/11 (102 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/12 (181 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/13 (82 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/14 (295 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/15 (295 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/0 (340 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/1 (189 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/2 (250 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/3 (261 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/4 (340 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/5 (189 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/6 (5 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/7 (5 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/8 (342 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/9 (190 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/10 (251 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/11 (262 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/12 (341 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/13 (191 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/14 (5 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/15 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/0 (182 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/1 (82 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/2 (101 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/3 (101 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/4 (181 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/5 (81 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/6 (294 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/7 (295 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/8 (181 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/9 (82 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/10 (102 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/11 (103 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/12 (181 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/13 (82 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/14 (296 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/15 (295 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/0 (180 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/1 (80 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/2 (101 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/3 (101 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/4 (181 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/5 (81 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/6 (293 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/7 (293 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/8 (181 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/9 (82 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/10 (103 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/11 (104 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/12 (181 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/13 (81 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/14 (295 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/15 (295 ms) [----------] 64 tests from CipherSuiteCBC12/TlsCipherSuiteTest (11082 ms total) [----------] 192 tests from CipherSuiteCBCStream/TlsCipherSuiteTest [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/0 (90 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/1 (92 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/2 (91 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/3 (91 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/4 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/5 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/6 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/7 (104 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/8 (146 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/9 (148 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/10 (148 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/11 (148 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/12 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/13 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/14 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/15 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/16 (90 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/17 (91 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/18 (91 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/19 (91 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/20 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/21 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/22 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/23 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/24 (148 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/25 (147 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/26 (148 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/27 (148 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/28 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/29 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/30 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/31 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/32 (89 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/33 (90 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/34 (90 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/35 (93 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/36 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/37 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/38 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/39 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/40 (147 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/41 (147 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/42 (148 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/43 (147 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/44 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/45 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/46 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/47 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/0 (237 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/1 (256 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/2 (239 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/3 (242 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/4 (248 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/5 (249 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/6 (250 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/7 (250 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/8 (329 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/9 (325 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/10 (324 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/11 (325 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/12 (260 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/13 (262 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/14 (261 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/15 (262 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/16 (238 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/17 (240 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/18 (240 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/19 (239 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/20 (248 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/21 (250 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/22 (249 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/23 (250 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/24 (322 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/25 (326 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/26 (325 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/27 (325 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/28 (259 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/29 (263 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/30 (262 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/31 (264 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/32 (237 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/33 (239 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/34 (239 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/35 (238 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/36 (247 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/37 (249 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/38 (249 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/39 (249 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/40 (322 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/41 (324 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/42 (324 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/43 (323 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/44 (258 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/45 (265 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/46 (313 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/47 (302 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/0 (95 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/1 (95 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/2 (92 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/3 (93 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/4 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/5 (106 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/6 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/7 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/8 (148 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/9 (149 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/10 (148 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/11 (149 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/12 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/13 (103 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/14 (103 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/15 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/16 (90 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/17 (92 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/18 (92 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/19 (92 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/20 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/21 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/22 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/23 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/24 (148 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/25 (149 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/26 (148 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/27 (148 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/28 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/29 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/30 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/31 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/32 (91 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/33 (91 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/34 (91 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/35 (91 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/36 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/37 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/38 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/39 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/40 (148 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/41 (148 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/42 (148 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/43 (148 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/44 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/45 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/46 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/47 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/0 (90 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/1 (92 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/2 (91 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/3 (92 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/4 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/5 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/6 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/7 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/8 (146 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/9 (148 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/10 (148 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/11 (148 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/12 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/13 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/14 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/15 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/16 (90 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/17 (91 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/18 (91 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/19 (91 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/20 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/21 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/22 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/23 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/24 (146 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/25 (147 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/26 (147 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/27 (147 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/28 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/29 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/30 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/31 (102 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/32 (89 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/33 (90 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/34 (91 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/35 (90 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/36 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/37 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/38 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/39 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/40 (147 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/41 (147 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/42 (147 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/43 (148 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/44 (100 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/45 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/46 (101 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/47 (101 ms) [----------] 192 tests from CipherSuiteCBCStream/TlsCipherSuiteTest (28921 ms total) [----------] 96 tests from CipherSuiteCBCDatagram/TlsCipherSuiteTest [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/0 (92 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/1 (91 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/2 (91 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/3 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/4 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/5 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/6 (148 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/7 (149 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/8 (149 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/9 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/10 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/11 (101 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/12 (91 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/13 (91 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/14 (90 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/15 (101 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/16 (101 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/17 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/18 (148 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/19 (148 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/20 (148 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/21 (101 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/22 (101 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/23 (101 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/0 (240 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/1 (240 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/2 (254 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/3 (251 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/4 (251 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/5 (250 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/6 (325 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/7 (327 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/8 (326 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/9 (262 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/10 (262 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/11 (264 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/12 (239 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/13 (240 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/14 (240 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/15 (250 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/16 (250 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/17 (250 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/18 (326 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/19 (325 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/20 (325 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/21 (261 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/22 (261 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/23 (263 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/0 (92 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/1 (92 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/2 (92 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/3 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/4 (104 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/5 (103 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/6 (148 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/7 (149 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/8 (149 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/9 (103 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/10 (103 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/11 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/12 (92 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/13 (92 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/14 (92 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/15 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/16 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/17 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/18 (148 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/19 (148 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/20 (148 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/21 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/22 (101 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/23 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/0 (92 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/1 (92 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/2 (92 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/3 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/4 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/5 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/6 (148 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/7 (149 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/8 (148 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/9 (101 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/10 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/11 (101 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/12 (91 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/13 (91 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/14 (91 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/15 (101 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/16 (102 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/17 (101 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/18 (148 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/19 (148 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/20 (148 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/21 (101 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/22 (101 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/23 (101 ms) [----------] 96 tests from CipherSuiteCBCDatagram/TlsCipherSuiteTest (14473 ms total) [----------] 7 tests from TestSecurityStatus/SecurityStatusTest [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/0 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/0 (100 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/1 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/1 (81 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/2 (102 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/3 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/3 (81 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/4 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/4 (81 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/5 (81 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/6 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/6 (81 ms) [----------] 7 tests from TestSecurityStatus/SecurityStatusTest (607 ms total) [----------] 72 tests from DamageYStream/TlsDamageDHYTest [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301a64109a3b7f84e44e32857d4323bebb59afb53040a2f24904e57... record new: [1184] 020000510301a64109a3b7f84e44e32857d4323bebb59afb53040a2f24904e57... server: Original packet: [1189] 16030104a0020000510301a64109a3b7f84e44e32857d4323bebb59afb53040a... server: Filtered packet: [1189] 16030104a0020000510301a64109a3b7f84e44e32857d4323bebb59afb53040a... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/0 (104 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/1 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103018166b2ffacdc89942527fc522864318e24caaef8af4bb48900c4... record new: [1184] 0200005103018166b2ffacdc89942527fc522864318e24caaef8af4bb48900c4... server: Original packet: [1189] 16030104a00200005103018166b2ffacdc89942527fc522864318e24caaef8af... server: Filtered packet: [1189] 16030104a00200005103018166b2ffacdc89942527fc522864318e24caaef8af... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/1 (104 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/2 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301df71d1c48fdbe939232ce8d058419c5d7ec93e91f3ba6adc4393... record new: [1184] 020000510301df71d1c48fdbe939232ce8d058419c5d7ec93e91f3ba6adc4393... server: Original packet: [1189] 16030104a0020000510301df71d1c48fdbe939232ce8d058419c5d7ec93e91f3... server: Filtered packet: [1189] 16030104a0020000510301df71d1c48fdbe939232ce8d058419c5d7ec93e91f3... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/2 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301453d178d3e14a090ca983462ab20a5b47494f222c4fbf87459c5... record new: [1184] 020000510301453d178d3e14a090ca983462ab20a5b47494f222c4fbf87459c5... server: Original packet: [1189] 16030104a0020000510301453d178d3e14a090ca983462ab20a5b47494f222c4... server: Filtered packet: [1189] 16030104a0020000510301453d178d3e14a090ca983462ab20a5b47494f222c4... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/3 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/4 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301f9d7f94f0d1edf0c0d179f3e620959af7375f35ee72baa607083... record new: [1184] 020000510301f9d7f94f0d1edf0c0d179f3e620959af7375f35ee72baa607083... server: Original packet: [1189] 16030104a0020000510301f9d7f94f0d1edf0c0d179f3e620959af7375f35ee7... server: Filtered packet: [1189] 16030104a0020000510301f9d7f94f0d1edf0c0d179f3e620959af7375f35ee7... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/4 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/5 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301043f77f1b31eae6d5bebb82ff818827e63ad26fc7d7f60510763... record new: [1184] 020000510301043f77f1b31eae6d5bebb82ff818827e63ad26fc7d7f60510763... server: Original packet: [1189] 16030104a0020000510301043f77f1b31eae6d5bebb82ff818827e63ad26fc7d... server: Filtered packet: [1189] 16030104a0020000510301043f77f1b31eae6d5bebb82ff818827e63ad26fc7d... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/5 (104 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301d65aa0bab2aeb00a9214d76d3d175bdffeafe4da745b519b161d... record new: [1184] 020000510301d65aa0bab2aeb00a9214d76d3d175bdffeafe4da745b519b161d... server: Original packet: [1189] 16030104a0020000510301d65aa0bab2aeb00a9214d76d3d175bdffeafe4da74... server: Filtered packet: [1189] 16030104a0020000510301d65aa0bab2aeb00a9214d76d3d175bdffeafe4da74... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/6 (104 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103012df57dd1e8c1e86189b8c7456df6caf7b6c0515d2a0c3e402e95... record new: [1184] 0200005103012df57dd1e8c1e86189b8c7456df6caf7b6c0515d2a0c3e402e95... server: Original packet: [1189] 16030104a00200005103012df57dd1e8c1e86189b8c7456df6caf7b6c0515d2a... server: Filtered packet: [1189] 16030104a00200005103012df57dd1e8c1e86189b8c7456df6caf7b6c0515d2a... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/7 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/8 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103017b6ce901ce46e409bbe755a9c126c5bfc7c481b4e84bbf711264... record new: [1185] 0200005103017b6ce901ce46e409bbe755a9c126c5bfc7c481b4e84bbf711264... server: Original packet: [1189] 16030104a00200005103017b6ce901ce46e409bbe755a9c126c5bfc7c481b4e8... server: Filtered packet: [1190] 16030104a10200005103017b6ce901ce46e409bbe755a9c126c5bfc7c481b4e8... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/8 (105 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/9 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103016f0d17197d04290d6a09dc12e0b0419c222e3643e4c93bcae193... record new: [1185] 0200005103016f0d17197d04290d6a09dc12e0b0419c222e3643e4c93bcae193... server: Original packet: [1189] 16030104a00200005103016f0d17197d04290d6a09dc12e0b0419c222e3643e4... server: Filtered packet: [1190] 16030104a10200005103016f0d17197d04290d6a09dc12e0b0419c222e3643e4... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/9 (104 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/10 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510301c898901a61e9cdf3ba2bb36ee2896aa72e0f9cc0e7017a8910f1... record new: [1185] 020000510301c898901a61e9cdf3ba2bb36ee2896aa72e0f9cc0e7017a8910f1... server: Original packet: [1189] 16030104a0020000510301c898901a61e9cdf3ba2bb36ee2896aa72e0f9cc0e7... server: Filtered packet: [1190] 16030104a1020000510301c898901a61e9cdf3ba2bb36ee2896aa72e0f9cc0e7... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/10 (104 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/11 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 02000051030104759b106192bcadccbe22d5bb9d41ca1bd0a4e6d1fb2abee8d9... record new: [1185] 02000051030104759b106192bcadccbe22d5bb9d41ca1bd0a4e6d1fb2abee8d9... server: Original packet: [1189] 16030104a002000051030104759b106192bcadccbe22d5bb9d41ca1bd0a4e6d1... server: Filtered packet: [1190] 16030104a102000051030104759b106192bcadccbe22d5bb9d41ca1bd0a4e6d1... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/11 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/12 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103021d469eedc2f3adc3bb22c775fdbc38b6860660e51edca9288a95... record new: [1184] 0200005103021d469eedc2f3adc3bb22c775fdbc38b6860660e51edca9288a95... server: Original packet: [1189] 16030204a00200005103021d469eedc2f3adc3bb22c775fdbc38b6860660e51e... server: Filtered packet: [1189] 16030204a00200005103021d469eedc2f3adc3bb22c775fdbc38b6860660e51e... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/12 (104 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/13 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103022ebbb7b88884dd44c6e765c8dadd7c1c4a8f67032c60a145f745... record new: [1184] 0200005103022ebbb7b88884dd44c6e765c8dadd7c1c4a8f67032c60a145f745... server: Original packet: [1189] 16030204a00200005103022ebbb7b88884dd44c6e765c8dadd7c1c4a8f67032c... server: Filtered packet: [1189] 16030204a00200005103022ebbb7b88884dd44c6e765c8dadd7c1c4a8f67032c... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/13 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/14 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302f1b239f59251693716bde1183d8b2b4165a5b0c4641c3a1fa534... record new: [1184] 020000510302f1b239f59251693716bde1183d8b2b4165a5b0c4641c3a1fa534... server: Original packet: [1189] 16030204a0020000510302f1b239f59251693716bde1183d8b2b4165a5b0c464... server: Filtered packet: [1189] 16030204a0020000510302f1b239f59251693716bde1183d8b2b4165a5b0c464... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/14 (104 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/15 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302bf7d4a3eb0ccf14a9c213279b857caaed50b223bbad90f90523c... record new: [1184] 020000510302bf7d4a3eb0ccf14a9c213279b857caaed50b223bbad90f90523c... server: Original packet: [1189] 16030204a0020000510302bf7d4a3eb0ccf14a9c213279b857caaed50b223bba... server: Filtered packet: [1189] 16030204a0020000510302bf7d4a3eb0ccf14a9c213279b857caaed50b223bba... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/15 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/16 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 02000051030291221e95258ee08c542276e7d04f5adac649d60db7a99af9b3d5... record new: [1184] 02000051030291221e95258ee08c542276e7d04f5adac649d60db7a99af9b3d5... server: Original packet: [1189] 16030204a002000051030291221e95258ee08c542276e7d04f5adac649d60db7... server: Filtered packet: [1189] 16030204a002000051030291221e95258ee08c542276e7d04f5adac649d60db7... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/16 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/17 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302235ad5a16f01206ac8925603ff5c1258283492fd6b37c4dc0799... record new: [1184] 020000510302235ad5a16f01206ac8925603ff5c1258283492fd6b37c4dc0799... server: Original packet: [1189] 16030204a0020000510302235ad5a16f01206ac8925603ff5c1258283492fd6b... server: Filtered packet: [1189] 16030204a0020000510302235ad5a16f01206ac8925603ff5c1258283492fd6b... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/17 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/18 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302f02a530c6d38a4e927264f8a0cac3c2ad9baad9d83166a950855... record new: [1184] 020000510302f02a530c6d38a4e927264f8a0cac3c2ad9baad9d83166a950855... server: Original packet: [1189] 16030204a0020000510302f02a530c6d38a4e927264f8a0cac3c2ad9baad9d83... server: Filtered packet: [1189] 16030204a0020000510302f02a530c6d38a4e927264f8a0cac3c2ad9baad9d83... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/18 (104 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/19 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103020ffba83a3a50487b590ab8b5d622201329637aa80750e24b939b... record new: [1184] 0200005103020ffba83a3a50487b590ab8b5d622201329637aa80750e24b939b... server: Original packet: [1189] 16030204a00200005103020ffba83a3a50487b590ab8b5d622201329637aa807... server: Filtered packet: [1189] 16030204a00200005103020ffba83a3a50487b590ab8b5d622201329637aa807... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/19 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/20 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302284b9f74b7412ae1cbb1933d7ed478d95362857488f6dd57b0a6... record new: [1185] 020000510302284b9f74b7412ae1cbb1933d7ed478d95362857488f6dd57b0a6... server: Original packet: [1189] 16030204a0020000510302284b9f74b7412ae1cbb1933d7ed478d95362857488... server: Filtered packet: [1190] 16030204a1020000510302284b9f74b7412ae1cbb1933d7ed478d95362857488... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/20 (104 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/21 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302739278cedd31b0e4c4d532cc2fc48594a1339f016143b1fb1c69... record new: [1185] 020000510302739278cedd31b0e4c4d532cc2fc48594a1339f016143b1fb1c69... server: Original packet: [1189] 16030204a0020000510302739278cedd31b0e4c4d532cc2fc48594a1339f0161... server: Filtered packet: [1190] 16030204a1020000510302739278cedd31b0e4c4d532cc2fc48594a1339f0161... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/21 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/22 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 020000510302749168aa9e5cf8a55288713bd033862e6f8bb72c2603fd40f2ac... record new: [1185] 020000510302749168aa9e5cf8a55288713bd033862e6f8bb72c2603fd40f2ac... server: Original packet: [1189] 16030204a0020000510302749168aa9e5cf8a55288713bd033862e6f8bb72c26... server: Filtered packet: [1190] 16030204a1020000510302749168aa9e5cf8a55288713bd033862e6f8bb72c26... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/22 (104 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/23 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1184] 0200005103028fb6e3666feb16de3a40cdec8acaecf0ea09ce23a82e3d72e341... record new: [1185] 0200005103028fb6e3666feb16de3a40cdec8acaecf0ea09ce23a82e3d72e341... server: Original packet: [1189] 16030204a00200005103028fb6e3666feb16de3a40cdec8acaecf0ea09ce23a8... server: Filtered packet: [1190] 16030204a10200005103028fb6e3666feb16de3a40cdec8acaecf0ea09ce23a8... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/23 (104 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/24 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 02000051030304ed3d18c4f367f55b4095982c4e55c862ed10779e6a771c18ad... record new: [1186] 02000051030304ed3d18c4f367f55b4095982c4e55c862ed10779e6a771c18ad... server: Original packet: [1191] 16030304a202000051030304ed3d18c4f367f55b4095982c4e55c862ed10779e... server: Filtered packet: [1191] 16030304a202000051030304ed3d18c4f367f55b4095982c4e55c862ed10779e... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/24 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/25 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 020000510303b45a0fdb1cf6828e17bb3ba6f0d8ce23fd87b23b4a774d7dbafa... record new: [1186] 020000510303b45a0fdb1cf6828e17bb3ba6f0d8ce23fd87b23b4a774d7dbafa... server: Original packet: [1191] 16030304a2020000510303b45a0fdb1cf6828e17bb3ba6f0d8ce23fd87b23b4a... server: Filtered packet: [1191] 16030304a2020000510303b45a0fdb1cf6828e17bb3ba6f0d8ce23fd87b23b4a... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/25 (104 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/26 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 0200005103039a6b6878d4e2ac64962ba88b2ecfb15ff99c8df52aabb93c6cae... record new: [1186] 0200005103039a6b6878d4e2ac64962ba88b2ecfb15ff99c8df52aabb93c6cae... server: Original packet: [1191] 16030304a20200005103039a6b6878d4e2ac64962ba88b2ecfb15ff99c8df52a... server: Filtered packet: [1191] 16030304a20200005103039a6b6878d4e2ac64962ba88b2ecfb15ff99c8df52a... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/26 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/27 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 0200005103036aafcdba5a90c39baf426c6540a182891ec92fc4a113412f3b40... record new: [1186] 0200005103036aafcdba5a90c39baf426c6540a182891ec92fc4a113412f3b40... server: Original packet: [1191] 16030304a20200005103036aafcdba5a90c39baf426c6540a182891ec92fc4a1... server: Filtered packet: [1191] 16030304a20200005103036aafcdba5a90c39baf426c6540a182891ec92fc4a1... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/27 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/28 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 02000051030334e69a4352c5db99ca4e9ed910ea6db97a47998f3e03d085e381... record new: [1186] 02000051030334e69a4352c5db99ca4e9ed910ea6db97a47998f3e03d085e381... server: Original packet: [1191] 16030304a202000051030334e69a4352c5db99ca4e9ed910ea6db97a47998f3e... server: Filtered packet: [1191] 16030304a202000051030334e69a4352c5db99ca4e9ed910ea6db97a47998f3e... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/28 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/29 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 0200005103037577c218985c25b09875781b998b433cd4638b38dcff880b03fe... record new: [1186] 0200005103037577c218985c25b09875781b998b433cd4638b38dcff880b03fe... server: Original packet: [1191] 16030304a20200005103037577c218985c25b09875781b998b433cd4638b38dc... server: Filtered packet: [1191] 16030304a20200005103037577c218985c25b09875781b998b433cd4638b38dc... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/29 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/30 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 0200005103036158189c2a5e1be2ec9ffa625e7e335e9968b3db9badf9f18f4b... record new: [1186] 0200005103036158189c2a5e1be2ec9ffa625e7e335e9968b3db9badf9f18f4b... server: Original packet: [1191] 16030304a20200005103036158189c2a5e1be2ec9ffa625e7e335e9968b3db9b... server: Filtered packet: [1191] 16030304a20200005103036158189c2a5e1be2ec9ffa625e7e335e9968b3db9b... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/30 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/31 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 0200005103033417565efc87df53b77811a1b18927d2550986bb927862025d58... record new: [1186] 0200005103033417565efc87df53b77811a1b18927d2550986bb927862025d58... server: Original packet: [1191] 16030304a20200005103033417565efc87df53b77811a1b18927d2550986bb92... server: Filtered packet: [1191] 16030304a20200005103033417565efc87df53b77811a1b18927d2550986bb92... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/31 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/32 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 0200005103031b50c56ba5884cbcae125dd8acf7e99846800a9c5793ba966981... record new: [1187] 0200005103031b50c56ba5884cbcae125dd8acf7e99846800a9c5793ba966981... server: Original packet: [1191] 16030304a20200005103031b50c56ba5884cbcae125dd8acf7e99846800a9c57... server: Filtered packet: [1192] 16030304a30200005103031b50c56ba5884cbcae125dd8acf7e99846800a9c57... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/32 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/33 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 0200005103035f1cfef571786dbfe541284f632b7adb73777b3ab43e98075a47... record new: [1187] 0200005103035f1cfef571786dbfe541284f632b7adb73777b3ab43e98075a47... server: Original packet: [1191] 16030304a20200005103035f1cfef571786dbfe541284f632b7adb73777b3ab4... server: Filtered packet: [1192] 16030304a30200005103035f1cfef571786dbfe541284f632b7adb73777b3ab4... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/33 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/34 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 0200005103038be8e6fb4e27d94b7a800e8a36ecc2e625dcc582855c2f0205e9... record new: [1187] 0200005103038be8e6fb4e27d94b7a800e8a36ecc2e625dcc582855c2f0205e9... server: Original packet: [1191] 16030304a20200005103038be8e6fb4e27d94b7a800e8a36ecc2e625dcc58285... server: Filtered packet: [1192] 16030304a30200005103038be8e6fb4e27d94b7a800e8a36ecc2e625dcc58285... client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/34 (104 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/35 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1186] 0200005103031fcaa1eca0e553674730c0c354973316818236c95356e3fddcc7... record new: [1187] 0200005103031fcaa1eca0e553674730c0c354973316818236c95356e3fddcc7... server: Original packet: [1191] 16030304a20200005103031fcaa1eca0e553674730c0c354973316818236c953... server: Filtered packet: [1192] 16030304a30200005103031fcaa1eca0e553674730c0c354973316818236c953... client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/35 (103 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100973146c1791a4019f46087030776fe3870e9790955c1cf945b4468b8d7c2... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100973146c1791a4019f46087030776fe3870e9790955c1cf945b44... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [326] 1603010106100001020100973146c1791a4019f46087030776fe3870e9790955... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/0 (155 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/1 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100224acf9dbd29c27c2903c2a163865ba4a0df5b53338589b25c5320d3533a... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100224acf9dbd29c27c2903c2a163865ba4a0df5b53338589b25c53... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [326] 1603010106100001020100224acf9dbd29c27c2903c2a163865ba4a0df5b5333... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/1 (155 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/2 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01007470deab315dbf4edb4ba85363bba56c14105898d969b3f31c7856dc3fbf... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201007470deab315dbf4edb4ba85363bba56c14105898d969b3f31c78... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [326] 16030101061000010201007470deab315dbf4edb4ba85363bba56c14105898d9... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/2 (154 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010003efd639046784f44534158e5788021fc64f83c3c8e003db0a7696bb12eb... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 10000102010003efd639046784f44534158e5788021fc64f83c3c8e003db0a76... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [326] 160301010610000102010003efd639046784f44534158e5788021fc64f83c3c8... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/3 (154 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/4 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010052973aa5a5863b5ef787f193017483eb598533d3909de26db3a83fffe8f1... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 10000102010052973aa5a5863b5ef787f193017483eb598533d3909de26db3a8... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [326] 160301010610000102010052973aa5a5863b5ef787f193017483eb598533d390... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/4 (155 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/5 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010007df62d8464c074d0dec8617afea84e0f93d1df8924e387f1210cc72791d... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 10000102010007df62d8464c074d0dec8617afea84e0f93d1df8924e387f1210... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [326] 160301010610000102010007df62d8464c074d0dec8617afea84e0f93d1df892... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/5 (155 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010006d44e73d47bd78397b219ebbf51fa27d5648c348d63930b1667f0481d77... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 10000102010006d44e73d47bd78397b219ebbf51fa27d5648c348d63930b1667... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [326] 160301010610000102010006d44e73d47bd78397b219ebbf51fa27d5648c348d... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/6 (155 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004085312dd695cf6633617c6b39f6eeaa3f8c4e8374b94b204201ab573a07... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 1000010201004085312dd695cf6633617c6b39f6eeaa3f8c4e8374b94b204201... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [326] 16030101061000010201004085312dd695cf6633617c6b39f6eeaa3f8c4e8374... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/7 (154 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/8 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b725eb40d250bc475a2adac1cda39ce0ad9b027d6f8f8cb8af759c047140... handshake new: [259] 010101b725eb40d250bc475a2adac1cda39ce0ad9b027d6f8f8cb8af759c0471... record old: [262] 100001020100b725eb40d250bc475a2adac1cda39ce0ad9b027d6f8f8cb8af75... record new: [263] 10000103010101b725eb40d250bc475a2adac1cda39ce0ad9b027d6f8f8cb8af... client: Original packet: [326] 1603010106100001020100b725eb40d250bc475a2adac1cda39ce0ad9b027d6f... client: Filtered packet: [327] 160301010710000103010101b725eb40d250bc475a2adac1cda39ce0ad9b027d... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/8 (155 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/9 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01000e100c0eeec1ef728e11946ef5693e99ae0804d076282b4ce8c5256ffaa3... handshake new: [259] 0101010e100c0eeec1ef728e11946ef5693e99ae0804d076282b4ce8c5256ffa... record old: [262] 1000010201000e100c0eeec1ef728e11946ef5693e99ae0804d076282b4ce8c5... record new: [263] 100001030101010e100c0eeec1ef728e11946ef5693e99ae0804d076282b4ce8... client: Original packet: [326] 16030101061000010201000e100c0eeec1ef728e11946ef5693e99ae0804d076... client: Filtered packet: [327] 1603010107100001030101010e100c0eeec1ef728e11946ef5693e99ae0804d0... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/9 (154 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/10 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01005fd6f45316a3a74d3b271810984cff9675779f1c9d8ed0fd34074c8517d6... handshake new: [259] 0101005fd6f45316a3a74d3b271810984cff9675779f1c9d8ed0fd34074c8517... record old: [262] 1000010201005fd6f45316a3a74d3b271810984cff9675779f1c9d8ed0fd3407... record new: [263] 100001030101005fd6f45316a3a74d3b271810984cff9675779f1c9d8ed0fd34... client: Original packet: [326] 16030101061000010201005fd6f45316a3a74d3b271810984cff9675779f1c9d... client: Filtered packet: [327] 1603010107100001030101005fd6f45316a3a74d3b271810984cff9675779f1c... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/10 (190 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/11 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010001d073d77d7c4447f542182ddd6ff7e8881ef99366ae695a43cfadd1c062... handshake new: [259] 01010001d073d77d7c4447f542182ddd6ff7e8881ef99366ae695a43cfadd1c0... record old: [262] 10000102010001d073d77d7c4447f542182ddd6ff7e8881ef99366ae695a43cf... record new: [263] 1000010301010001d073d77d7c4447f542182ddd6ff7e8881ef99366ae695a43... client: Original packet: [326] 160301010610000102010001d073d77d7c4447f542182ddd6ff7e8881ef99366... client: Filtered packet: [327] 16030101071000010301010001d073d77d7c4447f542182ddd6ff7e8881ef993... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/11 (180 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/12 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01002642bfeee8b0fc8645809deb43901ee043c2f33844423e6dc91de2bb00d2... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201002642bfeee8b0fc8645809deb43901ee043c2f33844423e6dc91d... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [342] 16030201061000010201002642bfeee8b0fc8645809deb43901ee043c2f33844... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/12 (152 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/13 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010025059b1b5fce154d97021d3c37b87acd7d4c74a3848233485a51533ad3dc... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 10000102010025059b1b5fce154d97021d3c37b87acd7d4c74a3848233485a51... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [342] 160302010610000102010025059b1b5fce154d97021d3c37b87acd7d4c74a384... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/13 (155 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/14 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010017aeb06dbe8e75947acb8b44172439df33ed38b2751a4be2fcc648098d5a... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 10000102010017aeb06dbe8e75947acb8b44172439df33ed38b2751a4be2fcc6... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [342] 160302010610000102010017aeb06dbe8e75947acb8b44172439df33ed38b275... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/14 (154 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/15 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01006ca86a551257b2be38c6d4559733e5b9eb5dfcf76ba7e9de4860d0432706... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201006ca86a551257b2be38c6d4559733e5b9eb5dfcf76ba7e9de4860... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [342] 16030201061000010201006ca86a551257b2be38c6d4559733e5b9eb5dfcf76b... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/15 (156 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/16 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100f22e7c07595cbbd0e06be6cb6b193e7e81b89667144e28de876a8504240f... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100f22e7c07595cbbd0e06be6cb6b193e7e81b89667144e28de876a... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [342] 1603020106100001020100f22e7c07595cbbd0e06be6cb6b193e7e81b8966714... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/16 (156 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/17 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e4dc6ff9fb3003eaf79ec8de7cfa855097719cea51c7a15b627166685a8c... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100e4dc6ff9fb3003eaf79ec8de7cfa855097719cea51c7a15b6271... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [342] 1603020106100001020100e4dc6ff9fb3003eaf79ec8de7cfa855097719cea51... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/17 (155 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/18 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010029da017ba6b72cc239f8b54bb691979de37d40a0a3342d6d3021facb8d0e... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 10000102010029da017ba6b72cc239f8b54bb691979de37d40a0a3342d6d3021... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [342] 160302010610000102010029da017ba6b72cc239f8b54bb691979de37d40a0a3... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/18 (155 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/19 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01001e3acda63569eb401536c40a2d70676b303e493641c630e2ce98ba4a875d... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 1000010201001e3acda63569eb401536c40a2d70676b303e493641c630e2ce98... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [342] 16030201061000010201001e3acda63569eb401536c40a2d70676b303e493641... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/19 (155 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/20 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100740564eda21646136c013bb69f7a2b320488f46ae9afbf9a8bbc06603ca4... handshake new: [259] 010101740564eda21646136c013bb69f7a2b320488f46ae9afbf9a8bbc06603c... record old: [262] 100001020100740564eda21646136c013bb69f7a2b320488f46ae9afbf9a8bbc... record new: [263] 10000103010101740564eda21646136c013bb69f7a2b320488f46ae9afbf9a8b... client: Original packet: [342] 1603020106100001020100740564eda21646136c013bb69f7a2b320488f46ae9... client: Filtered packet: [343] 160302010710000103010101740564eda21646136c013bb69f7a2b320488f46a... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/20 (155 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/21 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d46d7f759965972e13eaed5e3bd456747296c4cb3e7d0f821b8f7fc15773... handshake new: [259] 010101d46d7f759965972e13eaed5e3bd456747296c4cb3e7d0f821b8f7fc157... record old: [262] 100001020100d46d7f759965972e13eaed5e3bd456747296c4cb3e7d0f821b8f... record new: [263] 10000103010101d46d7f759965972e13eaed5e3bd456747296c4cb3e7d0f821b... client: Original packet: [342] 1603020106100001020100d46d7f759965972e13eaed5e3bd456747296c4cb3e... client: Filtered packet: [343] 160302010710000103010101d46d7f759965972e13eaed5e3bd456747296c4cb... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/21 (155 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/22 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01008f5412e95e6ce72d3a41d6099405bd27ec186ec68de8682d203e691cc40f... handshake new: [259] 0101008f5412e95e6ce72d3a41d6099405bd27ec186ec68de8682d203e691cc4... record old: [262] 1000010201008f5412e95e6ce72d3a41d6099405bd27ec186ec68de8682d203e... record new: [263] 100001030101008f5412e95e6ce72d3a41d6099405bd27ec186ec68de8682d20... client: Original packet: [342] 16030201061000010201008f5412e95e6ce72d3a41d6099405bd27ec186ec68d... client: Filtered packet: [343] 1603020107100001030101008f5412e95e6ce72d3a41d6099405bd27ec186ec6... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/22 (181 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/23 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010017cd266d800bff7bd4bd5fe77eeeb50fd394f9ca0612d18377c5df8ca4f4... handshake new: [259] 01010017cd266d800bff7bd4bd5fe77eeeb50fd394f9ca0612d18377c5df8ca4... record old: [262] 10000102010017cd266d800bff7bd4bd5fe77eeeb50fd394f9ca0612d18377c5... record new: [263] 1000010301010017cd266d800bff7bd4bd5fe77eeeb50fd394f9ca0612d18377... client: Original packet: [342] 160302010610000102010017cd266d800bff7bd4bd5fe77eeeb50fd394f9ca06... client: Filtered packet: [343] 16030201071000010301010017cd266d800bff7bd4bd5fe77eeeb50fd394f9ca... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/23 (181 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/24 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100fbcfd043a051fae0eba55f4d35370601769b9ac9fafca7df57e776d583fa... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100fbcfd043a051fae0eba55f4d35370601769b9ac9fafca7df57e7... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [318] 1603030106100001020100fbcfd043a051fae0eba55f4d35370601769b9ac9fa... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/24 (154 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/25 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100224a44d3d3ced617f4ab41259c4e91c839d4df8fb71078dfc430ea92a426... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100224a44d3d3ced617f4ab41259c4e91c839d4df8fb71078dfc430... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [318] 1603030106100001020100224a44d3d3ced617f4ab41259c4e91c839d4df8fb7... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/25 (155 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/26 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100669512aa58cc224ce9891cc35265ec9435a7e5a680aca9e765f2e57fd36c... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100669512aa58cc224ce9891cc35265ec9435a7e5a680aca9e765f2... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [318] 1603030106100001020100669512aa58cc224ce9891cc35265ec9435a7e5a680... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/26 (154 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/27 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010073492cb2a750f8aa6573bf72845c720a4d742dae223e736a210a959cb89a... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 10000102010073492cb2a750f8aa6573bf72845c720a4d742dae223e736a210a... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Original packet: [318] 160303010610000102010073492cb2a750f8aa6573bf72845c720a4d742dae22... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/27 (155 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/28 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01002d83c45103987a5b0ff58023f4c782ae18436bacd0e6edfdf0a2bd193881... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 1000010201002d83c45103987a5b0ff58023f4c782ae18436bacd0e6edfdf0a2... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [318] 16030301061000010201002d83c45103987a5b0ff58023f4c782ae18436bacd0... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/28 (155 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/29 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01003fd27902b5226813348bf22576fe52c6d886f1411fe5e73f6ebfe153f0d3... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 1000010201003fd27902b5226813348bf22576fe52c6d886f1411fe5e73f6ebf... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Original packet: [318] 16030301061000010201003fd27902b5226813348bf22576fe52c6d886f1411f... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/29 (155 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/30 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d347e29fd6164ce7f40bd87a81c398c1f9593657faa932ad57866651e40b... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100d347e29fd6164ce7f40bd87a81c398c1f9593657faa932ad5786... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [318] 1603030106100001020100d347e29fd6164ce7f40bd87a81c398c1f9593657fa... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/30 (154 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/31 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01005802896b1aef30b378f9fee34845a4baea4cf56082682222753e3ce2cae6... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 1000010201005802896b1aef30b378f9fee34845a4baea4cf56082682222753e... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Original packet: [318] 16030301061000010201005802896b1aef30b378f9fee34845a4baea4cf56082... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/31 (155 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/32 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e07f7d77d7e934149e9fe2b04178c5af2b6b660cd7617cd3ccd1d20e3bc7... handshake new: [259] 010101e07f7d77d7e934149e9fe2b04178c5af2b6b660cd7617cd3ccd1d20e3b... record old: [262] 100001020100e07f7d77d7e934149e9fe2b04178c5af2b6b660cd7617cd3ccd1... record new: [263] 10000103010101e07f7d77d7e934149e9fe2b04178c5af2b6b660cd7617cd3cc... client: Original packet: [318] 1603030106100001020100e07f7d77d7e934149e9fe2b04178c5af2b6b660cd7... client: Filtered packet: [319] 160303010710000103010101e07f7d77d7e934149e9fe2b04178c5af2b6b660c... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/32 (154 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/33 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010067e09027e2f4651ca46ab8ab2cf0e16a6f10cb8c04cc811fece8cfa1eba3... handshake new: [259] 01010167e09027e2f4651ca46ab8ab2cf0e16a6f10cb8c04cc811fece8cfa1eb... record old: [262] 10000102010067e09027e2f4651ca46ab8ab2cf0e16a6f10cb8c04cc811fece8... record new: [263] 1000010301010167e09027e2f4651ca46ab8ab2cf0e16a6f10cb8c04cc811fec... client: Original packet: [318] 160303010610000102010067e09027e2f4651ca46ab8ab2cf0e16a6f10cb8c04... client: Filtered packet: [319] 16030301071000010301010167e09027e2f4651ca46ab8ab2cf0e16a6f10cb8c... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/33 (154 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/34 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100cdd30e46e49150581502170b655b9bbd0b89593f19f1c44aa696544877ea... handshake new: [259] 010100cdd30e46e49150581502170b655b9bbd0b89593f19f1c44aa696544877... record old: [262] 100001020100cdd30e46e49150581502170b655b9bbd0b89593f19f1c44aa696... record new: [263] 10000103010100cdd30e46e49150581502170b655b9bbd0b89593f19f1c44aa6... client: Original packet: [318] 1603030106100001020100cdd30e46e49150581502170b655b9bbd0b89593f19... client: Filtered packet: [319] 160303010710000103010100cdd30e46e49150581502170b655b9bbd0b89593f... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/34 (181 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/35 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100ec80f29935accb2aee2cfe07c9a36b68f701b2843e2b1ca8a429d238f51e... handshake new: [259] 010100ec80f29935accb2aee2cfe07c9a36b68f701b2843e2b1ca8a429d238f5... record old: [262] 100001020100ec80f29935accb2aee2cfe07c9a36b68f701b2843e2b1ca8a429... record new: [263] 10000103010100ec80f29935accb2aee2cfe07c9a36b68f701b2843e2b1ca8a4... client: Original packet: [318] 1603030106100001020100ec80f29935accb2aee2cfe07c9a36b68f701b2843e... client: Filtered packet: [319] 160303010710000103010100ec80f29935accb2aee2cfe07c9a36b68f701b284... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/35 (179 ms) [----------] 72 tests from DamageYStream/TlsDamageDHYTest (9465 ms total) [----------] 48 tests from DamageYDatagram/TlsDamageDHYTest [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff99abcbc792... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff99abcbc792... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/0 (104 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/1 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feffb8a3c3b5d5... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feffb8a3c3b5d5... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/1 (104 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff088cc1d684... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff088cc1d684... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/2 (104 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff2f2335ea82... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff2f2335ea82... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/3 (104 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff19e38459b9... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff19e38459b9... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/4 (103 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff5482e3111d... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff5482e3111d... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/5 (104 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/6 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff75392efb2e... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051feff75392efb2e... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/6 (104 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/7 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051fefffed981e51e... server: Filtered packet: [1268] 16feff0000000000000000005d020000510000000000000051fefffed981e51e... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/7 (103 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/8 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff2351768665... server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feff2351768665... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/8 (103 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/9 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff365a490e48... server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feff365a490e48... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/9 (104 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/10 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff3c33e9d0a2... server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feff3c33e9d0a2... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/10 (104 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/11 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1268] 16feff0000000000000000005d020000510000000000000051feff2bf00fcf96... server: Filtered packet: [1269] 16feff0000000000000000005d020000510000000000000051feff2bf00fcf96... client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/11 (105 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/12 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd22ba9ee8b9... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd22ba9ee8b9... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/12 (103 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/13 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd58ed3d4348... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd58ed3d4348... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/13 (103 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/14 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd270767f51e... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd270767f51e... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/14 (104 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/15 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd896379cf11... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd896379cf11... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/15 (103 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/16 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd0a5e193d2b... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd0a5e193d2b... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/16 (103 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/17 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdf47436ca50... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdf47436ca50... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/17 (103 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/18 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd4f120a8989... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd4f120a8989... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/18 (103 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/19 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd0afb708c50... server: Filtered packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd0afb708c50... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/19 (104 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/20 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd5eaa1b1668... server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefd5eaa1b1668... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/20 (103 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/21 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefd30e872de6a... server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefd30e872de6a... client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/21 (103 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/22 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdc312dffec3... server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefdc312dffec3... client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/22 (104 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/23 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Original packet: [1270] 16fefd0000000000000000005d020000510000000000000051fefdb90cd240f8... server: Filtered packet: [1271] 16fefd0000000000000000005d020000510000000000000051fefdb90cd240f8... client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/23 (103 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100328ca9a603c325ebf6b204b6dc2a195711d71a8226414b6188035730ac28... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100328ca9a603c325ebf6b204b6dc2a195711d7... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100328ca9a603... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/0 (155 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/1 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01005026f4dcdcd9de21792a71575f0bc1b684508a4364590885dba75aa9e000... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 10000102000100000000010201005026f4dcdcd9de21792a71575f0bc1b68450... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201005026f4dcdc... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/1 (155 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01006118e88912c12cc4e37b457d8c59c0f2676a5df80182a1a1ea5e909e451a... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 10000102000100000000010201006118e88912c12cc4e37b457d8c59c0f2676a... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201006118e88912... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/2 (155 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100131c5146f988e80ec621506ecec49160cd7a4ae0f628a5e0abe38d2d06de... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100131c5146f988e80ec621506ecec49160cd7a... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100131c5146f9... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/3 (155 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010051f17cca4a3a9e582bee6f779f32417d6be864e7d6d88cbdb56a8a91c167... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 100001020001000000000102010051f17cca4a3a9e582bee6f779f32417d6be8... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Original packet: [374] 16feff0000000000000001010e100001020001000000000102010051f17cca4a... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/4 (155 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100993a6f4dbea449d0c1ffb30b1ebd73470bde092fd994b2831490000d9d3e... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 1000010200010000000001020100993a6f4dbea449d0c1ffb30b1ebd73470bde... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100993a6f4dbe... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/5 (155 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/6 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01002c20b2a62135b0c26e326df8239b6ec4ba42b63172b9e6783bb98db5a72d... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 10000102000100000000010201002c20b2a62135b0c26e326df8239b6ec4ba42... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201002c20b2a621... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/6 (156 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/7 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004f81dd112703d17a1369d5ef6ef6c32f53088145caa109fb3076ccd38bcc... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 10000102000100000000010201004f81dd112703d17a1369d5ef6ef6c32f5308... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201004f81dd1127... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/7 (155 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100349eb169c2093bf9a3de43d8bd2815b86e007c35ea92b618de88051b7cc8... handshake new: [259] 010101349eb169c2093bf9a3de43d8bd2815b86e007c35ea92b618de88051b7c... record old: [270] 1000010200010000000001020100349eb169c2093bf9a3de43d8bd2815b86e00... record new: [271] 100001030001000000000103010101349eb169c2093bf9a3de43d8bd2815b86e... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100349eb169c2... client: Filtered packet: [375] 16feff0000000000000001010f100001030001000000000103010101349eb169... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8 (155 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/9 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01000327d1571735bce4a9a3d58410cb46b4766fe6916e8c348c963b9d907278... handshake new: [259] 0101010327d1571735bce4a9a3d58410cb46b4766fe6916e8c348c963b9d9072... record old: [270] 10000102000100000000010201000327d1571735bce4a9a3d58410cb46b4766f... record new: [271] 1000010300010000000001030101010327d1571735bce4a9a3d58410cb46b476... client: Original packet: [374] 16feff0000000000000001010e10000102000100000000010201000327d15717... client: Filtered packet: [375] 16feff0000000000000001010f1000010300010000000001030101010327d157... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/9 (155 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/10 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010002db58af2a5f08ac037a4204f991c664b96a3be4cfc6dd31031acab1261b... handshake new: [259] 01010002db58af2a5f08ac037a4204f991c664b96a3be4cfc6dd31031acab126... record old: [270] 100001020001000000000102010002db58af2a5f08ac037a4204f991c664b96a... record new: [271] 10000103000100000000010301010002db58af2a5f08ac037a4204f991c664b9... client: Original packet: [374] 16feff0000000000000001010e100001020001000000000102010002db58af2a... client: Filtered packet: [375] 16feff0000000000000001010f10000103000100000000010301010002db58af... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/10 (181 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/11 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100fa63c08d03ba894232d6d500c4a551637f44d8366e3ae443db1afdf17266... handshake new: [259] 010100fa63c08d03ba894232d6d500c4a551637f44d8366e3ae443db1afdf172... record old: [270] 1000010200010000000001020100fa63c08d03ba894232d6d500c4a551637f44... record new: [271] 100001030001000000000103010100fa63c08d03ba894232d6d500c4a551637f... client: Original packet: [374] 16feff0000000000000001010e1000010200010000000001020100fa63c08d03... client: Filtered packet: [375] 16feff0000000000000001010f100001030001000000000103010100fa63c08d... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/11 (180 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/12 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004b888038fe510e1b6abe0b76c72ecd5c3e1415ec0c604602689e29c537e9... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 10000102000100000000010201004b888038fe510e1b6abe0b76c72ecd5c3e14... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201004b888038fe... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/12 (154 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/13 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b3d67d43e2bf58e7cf6efe29408da06ebb5182a20ec19186cf80e30244b6... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100b3d67d43e2bf58e7cf6efe29408da06ebb51... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100b3d67d43e2... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/13 (155 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/14 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100842ed2eff4e6c7ab7c818c097d1b531006caeb22f73cb8d98a7ba9a7e70f... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100842ed2eff4e6c7ab7c818c097d1b531006ca... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100842ed2eff4... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/14 (155 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/15 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100a224779a8566e2c7b701279225e93dd3f0f0ad7c1a646267a8f0406a2c40... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100a224779a8566e2c7b701279225e93dd3f0f0... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100a224779a85... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/15 (155 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/16 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010070bfc1f4b7f59850bda9c04ed87226d9c7efdc2b35f88f895be3cb1db534... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 100001020001000000000102010070bfc1f4b7f59850bda9c04ed87226d9c7ef... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Original packet: [358] 16fefd0000000000000001010e100001020001000000000102010070bfc1f4b7... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/16 (155 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/17 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01000f064f6e28e50f0d6a674b4062bf62c99529cd9af7be741941cf0c8ca54c... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 10000102000100000000010201000f064f6e28e50f0d6a674b4062bf62c99529... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201000f064f6e28... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/17 (154 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/18 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100ee43198223095ae43442d1f22aaf90c876a8f6f79b80033b681ed3452558... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 1000010200010000000001020100ee43198223095ae43442d1f22aaf90c876a8... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ee43198223... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/18 (155 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/19 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b37faa738360da7b01f6eef4e90276514089d5d3122c250e0f758e867396... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 1000010200010000000001020100b37faa738360da7b01f6eef4e90276514089... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100b37faa7383... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/19 (155 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/20 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100405c35fcf2b0dbc3237cc257c4436e63e363e6ad9d3f6b6a6e5ab7ef5d14... handshake new: [259] 010101405c35fcf2b0dbc3237cc257c4436e63e363e6ad9d3f6b6a6e5ab7ef5d... record old: [270] 1000010200010000000001020100405c35fcf2b0dbc3237cc257c4436e63e363... record new: [271] 100001030001000000000103010101405c35fcf2b0dbc3237cc257c4436e63e3... client: Original packet: [358] 16fefd0000000000000001010e1000010200010000000001020100405c35fcf2... client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010101405c35fc... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/20 (155 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/21 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01007522a643764bed6eafad0b5e603d2b7da0a76ff4b28aecc4ef291b10b0f6... handshake new: [259] 0101017522a643764bed6eafad0b5e603d2b7da0a76ff4b28aecc4ef291b10b0... record old: [270] 10000102000100000000010201007522a643764bed6eafad0b5e603d2b7da0a7... record new: [271] 1000010300010000000001030101017522a643764bed6eafad0b5e603d2b7da0... client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201007522a64376... client: Filtered packet: [359] 16fefd0000000000000001010f1000010300010000000001030101017522a643... server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/21 (154 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/22 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01003a84a4e63095b8371981c19d12b0b8ab5bf0327cfdf31fdf16c325d0a587... handshake new: [259] 0101003a84a4e63095b8371981c19d12b0b8ab5bf0327cfdf31fdf16c325d0a5... record old: [270] 10000102000100000000010201003a84a4e63095b8371981c19d12b0b8ab5bf0... record new: [271] 1000010300010000000001030101003a84a4e63095b8371981c19d12b0b8ab5b... client: Original packet: [358] 16fefd0000000000000001010e10000102000100000000010201003a84a4e630... client: Filtered packet: [359] 16fefd0000000000000001010f1000010300010000000001030101003a84a4e6... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/22 (182 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/23 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010084fe8daa6f35e189b045c6a03eb33881f2a81a4743206098775a59d05c79... handshake new: [259] 01010084fe8daa6f35e189b045c6a03eb33881f2a81a4743206098775a59d05c... record old: [270] 100001020001000000000102010084fe8daa6f35e189b045c6a03eb33881f2a8... record new: [271] 10000103000100000000010301010084fe8daa6f35e189b045c6a03eb33881f2... client: Original packet: [358] 16fefd0000000000000001010e100001020001000000000102010084fe8daa6f... client: Filtered packet: [359] 16fefd0000000000000001010f10000103000100000000010301010084fe8daa... server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/23 (180 ms) [----------] 48 tests from DamageYDatagram/TlsDamageDHYTest (6311 ms total) [----------] 12 tests from KeyExchangeTest/TlsKeyExchangeTest [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/0 (264 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/1 (218 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/2 (217 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/3 (220 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/0 (218 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/1 (218 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/2 (219 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/3 (218 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/0 (217 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/1 (218 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/2 (218 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Handshake success client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Handshake success Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/3 (218 ms) [----------] 12 tests from KeyExchangeTest/TlsKeyExchangeTest (2665 ms total) [----------] 88 tests from TlsPadding/TlsPaddingTest [ RUN ] TlsPadding/TlsPaddingTest.Correct/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fefefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.Correct/0 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0e0e [ OK ] TlsPadding/TlsPaddingTest.Correct/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fcfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.Correct/2 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0c0c [ OK ] TlsPadding/TlsPaddingTest.Correct/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fbfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.Correct/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0b0b [ OK ] TlsPadding/TlsPaddingTest.Correct/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f1f1... [ OK ] TlsPadding/TlsPaddingTest.Correct/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410101 [ OK ] TlsPadding/TlsPaddingTest.Correct/7 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f0... [ OK ] TlsPadding/TlsPaddingTest.Correct/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/9 Content length=31 padding length=0 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141414100 [ OK ] TlsPadding/TlsPaddingTest.Correct/9 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/12 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/14 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/16 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/19 Content length=287 padding length=0 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/21 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/0 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0e10 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/2 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0c20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/3 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/4 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0b20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/6 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410120 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/7 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/8 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/9 Content length=31 padding length=0 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141414120 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/10 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/11 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/12 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/14 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/15 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/16 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/17 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/17 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/18 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/19 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/21 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/21 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fffefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410f0e0e0e0e0e0e0e0e0e0e0e0e0e0e [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/1 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fdfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410d0c0c0c0c0c0c0c0c0c0c0c0c [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fcfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410c0b0b0b0b0b0b0b0b0b0b0b [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f2f1... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/6 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410201 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f1... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/8 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/9 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/11 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/14 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/16 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/19 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/21 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fefefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/0 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0f0e [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fcfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/2 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0d0c [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fbfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0c0b [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/5 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f1f1... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410201 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/7 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f0... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/9 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/13 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/16 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/18 (1 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/19 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/21 (0 ms) [----------] 88 tests from TlsPadding/TlsPaddingTest (30 ms total) [----------] 8 tests from SkipTls10/TlsSkipTest [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateRsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [531] 020000510301668f0dcdc6dfed2875ef38445f88d222b509f1219c91dc659c03... record new: [89] 020000510301668f0dcdc6dfed2875ef38445f88d222b509f1219c91dc659c03... server: Original packet: [536] 1603010213020000510301668f0dcdc6dfed2875ef38445f88d222b509f1219c... server: Filtered packet: [94] 1603010059020000510301668f0dcdc6dfed2875ef38445f88d222b509f1219c... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateRsa/0 (75 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateDhe/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 020000570301f1c40952c755d2d2b072722438bd590d4b164fafa31c3d69bc10... record new: [298] 020000570301f1c40952c755d2d2b072722438bd590d4b164fafa31c3d69bc10... server: Original packet: [745] 16030102e4020000570301f1c40952c755d2d2b072722438bd590d4b164fafa3... server: Filtered packet: [303] 160301012a020000570301f1c40952c755d2d2b072722438bd590d4b164fafa3... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateDhe/0 (86 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateEcdhe/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 0200005703019c5bf1ddc34fbfa0646271f840064a33ea254ac3d5b7b6131b09... record new: [298] 0200005703019c5bf1ddc34fbfa0646271f840064a33ea254ac3d5b7b6131b09... server: Original packet: [745] 16030102e40200005703019c5bf1ddc34fbfa0646271f840064a33ea254ac3d5... server: Filtered packet: [303] 160301012a0200005703019c5bf1ddc34fbfa0646271f840064a33ea254ac3d5... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateEcdhe/0 (85 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateEcdsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [557] 020000570301d637a46a773ffa4178c3403a3680fd3feb4bbb0fa587adbec2ee... record new: [241] 020000570301d637a46a773ffa4178c3403a3680fd3feb4bbb0fa587adbec2ee... server: Original packet: [562] 160301022d020000570301d637a46a773ffa4178c3403a3680fd3feb4bbb0fa5... server: Filtered packet: [246] 16030100f1020000570301d637a46a773ffa4178c3403a3680fd3feb4bbb0fa5... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateEcdsa/0 (65 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipServerKeyExchange/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [740] 020000570301f9f1355f05bd5232a5df39074b511fc9f02f62e3858137ecc7aa... record new: [537] 020000570301f9f1355f05bd5232a5df39074b511fc9f02f62e3858137ecc7aa... server: Original packet: [745] 16030102e4020000570301f9f1355f05bd5232a5df39074b511fc9f02f62e385... server: Filtered packet: [542] 1603010219020000570301f9f1355f05bd5232a5df39074b511fc9f02f62e385... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipServerKeyExchange/0 (85 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [556] 020000570301dd8ca46a0b63402110fffcdec08e054626d256e4763398ae1182... record new: [411] 020000570301dd8ca46a0b63402110fffcdec08e054626d256e4763398ae1182... server: Original packet: [561] 160301022c020000570301dd8ca46a0b63402110fffcdec08e054626d256e476... server: Filtered packet: [416] 160301019b020000570301dd8ca46a0b63402110fffcdec08e054626d256e476... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 (64 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertAndKeyExch/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 0200005703012a1c024988ebf84d8b24d091459ef62addef7f5c5da638e32e1e... record new: [298] 0200005703012a1c024988ebf84d8b24d091459ef62addef7f5c5da638e32e1e... Dropping handshake: 12 record old: [298] 0200005703012a1c024988ebf84d8b24d091459ef62addef7f5c5da638e32e1e... record new: [95] 0200005703012a1c024988ebf84d8b24d091459ef62addef7f5c5da638e32e1e... server: Original packet: [745] 16030102e40200005703012a1c024988ebf84d8b24d091459ef62addef7f5c5d... server: Filtered packet: [100] 160301005f0200005703012a1c024988ebf84d8b24d091459ef62addef7f5c5d... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertAndKeyExch/0 (78 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [557] 020000570301be34757ac182a137458ee5ae41d2794a81c7d4346f06838a5c52... record new: [241] 020000570301be34757ac182a137458ee5ae41d2794a81c7d4346f06838a5c52... Dropping handshake: 12 record old: [241] 020000570301be34757ac182a137458ee5ae41d2794a81c7d4346f06838a5c52... record new: [95] 020000570301be34757ac182a137458ee5ae41d2794a81c7d4346f06838a5c52... server: Original packet: [562] 160301022d020000570301be34757ac182a137458ee5ae41d2794a81c7d4346f... server: Filtered packet: [100] 160301005f020000570301be34757ac182a137458ee5ae41d2794a81c7d4346f... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 (60 ms) [----------] 8 tests from SkipTls10/TlsSkipTest (600 ms total) [----------] 32 tests from SkipVariants/TlsSkipTest [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [531] 02000051030241bd5ef1052e78ad101fc70537a268154edf9c267dfe48512fb5... record new: [89] 02000051030241bd5ef1052e78ad101fc70537a268154edf9c267dfe48512fb5... server: Original packet: [536] 160302021302000051030241bd5ef1052e78ad101fc70537a268154edf9c267d... server: Filtered packet: [94] 160302005902000051030241bd5ef1052e78ad101fc70537a268154edf9c267d... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/0 (69 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [531] 020000510303d5c94dd365f52e235e2169387300d8aa5c6e08045b6f08074e86... record new: [89] 020000510303d5c94dd365f52e235e2169387300d8aa5c6e08045b6f08074e86... server: Original packet: [536] 1603030213020000510303d5c94dd365f52e235e2169387300d8aa5c6e08045b... server: Filtered packet: [94] 1603030059020000510303d5c94dd365f52e235e2169387300d8aa5c6e08045b... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/1 (69 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [594] 16feff0000000000000000005d020000510000000000000051fefff69f1e5278... server: Filtered packet: [144] 16feff0000000000000000005d020000510000000000000051fefff69f1e5278... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/2 (69 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [594] 16fefd0000000000000000005d020000510000000000000051fefd9f50fffcac... server: Filtered packet: [144] 16fefd0000000000000000005d020000510000000000000051fefd9f50fffcac... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/3 (70 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 020000570302d9c16f3281c276a0f49bd0884834575467a611e6c6a518e12d14... record new: [298] 020000570302d9c16f3281c276a0f49bd0884834575467a611e6c6a518e12d14... server: Original packet: [745] 16030202e4020000570302d9c16f3281c276a0f49bd0884834575467a611e6c6... server: Filtered packet: [303] 160302012a020000570302d9c16f3281c276a0f49bd0884834575467a611e6c6... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/0 (78 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [742] 02000057030334017382e86076a884367db27afbefbf1fdbf25db110dc91a289... record new: [300] 02000057030334017382e86076a884367db27afbefbf1fdbf25db110dc91a289... server: Original packet: [747] 16030302e602000057030334017382e86076a884367db27afbefbf1fdbf25db1... server: Filtered packet: [305] 160303012c02000057030334017382e86076a884367db27afbefbf1fdbf25db1... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/1 (77 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [211] 0c0000c700020000000000c703001741049e5b1933e840a6adfa7eb89fa9fcdd... record new: [211] 0c0000c700010000000000c703001741049e5b1933e840a6adfa7eb89fa9fcdd... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feff3cf4c5eea9... server: Filtered packet: [374] 16feff00000000000000000063020000570000000000000057feff3cf4c5eea9... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/2 (80 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [213] 0c0000c900020000000000c903001741049e5b1933e840a6adfa7eb89fa9fcdd... record new: [213] 0c0000c900010000000000c903001741049e5b1933e840a6adfa7eb89fa9fcdd... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefd30b7e65365... server: Filtered packet: [376] 16fefd00000000000000000063020000570000000000000057fefd30b7e65365... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/3 (79 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 0200005703027fa9a57c82c85b095ee5142458e27c1350f88e8563f582a28319... record new: [298] 0200005703027fa9a57c82c85b095ee5142458e27c1350f88e8563f582a28319... server: Original packet: [745] 16030202e40200005703027fa9a57c82c85b095ee5142458e27c1350f88e8563... server: Filtered packet: [303] 160302012a0200005703027fa9a57c82c85b095ee5142458e27c1350f88e8563... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/0 (79 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [742] 0200005703037b94993bc381c129a6982141bdfce317da898bd0f17ef9c7f76a... record new: [300] 0200005703037b94993bc381c129a6982141bdfce317da898bd0f17ef9c7f76a... server: Original packet: [747] 16030302e60200005703037b94993bc381c129a6982141bdfce317da898bd0f1... server: Filtered packet: [305] 160303012c0200005703037b94993bc381c129a6982141bdfce317da898bd0f1... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/1 (78 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [211] 0c0000c700020000000000c703001741049e5b1933e840a6adfa7eb89fa9fcdd... record new: [211] 0c0000c700010000000000c703001741049e5b1933e840a6adfa7eb89fa9fcdd... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feff328fa6702f... server: Filtered packet: [374] 16feff00000000000000000063020000570000000000000057feff328fa6702f... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/2 (79 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [213] 0c0000c900020000000000c903001741049e5b1933e840a6adfa7eb89fa9fcdd... record new: [213] 0c0000c900010000000000c903001741049e5b1933e840a6adfa7eb89fa9fcdd... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefd34fe7813ff... server: Filtered packet: [376] 16fefd00000000000000000063020000570000000000000057fefd34fe7813ff... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/3 (79 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [556] 020000570302bf53600e99572daea02a9e4e8b20137eeded998d51f736d6a55b... record new: [240] 020000570302bf53600e99572daea02a9e4e8b20137eeded998d51f736d6a55b... server: Original packet: [561] 160302022c020000570302bf53600e99572daea02a9e4e8b20137eeded998d51... server: Filtered packet: [245] 16030200f0020000570302bf53600e99572daea02a9e4e8b20137eeded998d51... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/0 (59 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [558] 020000570303cf61ec848e5054951d768e851c48feec9f42a72e30b9bcd96220... record new: [242] 020000570303cf61ec848e5054951d768e851c48feec9f42a72e30b9bcd96220... server: Original packet: [563] 160303022e020000570303cf61ec848e5054951d768e851c48feec9f42a72e30... server: Filtered packet: [247] 16030300f2020000570303cf61ec848e5054951d768e851c48feec9f42a72e30... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/1 (58 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [324] 0b00013800010000000001380001350001323082012e3081d5a0030201020201... record new: [0] record old: [153] 0c00008d000200000000008d03001741049e5b1933e840a6adfa7eb89fa9fcdd... record new: [153] 0c00008d000100000000008d03001741049e5b1933e840a6adfa7eb89fa9fcdd... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [640] 16feff00000000000000000063020000570000000000000057feffc525eac9a7... server: Filtered packet: [316] 16feff00000000000000000063020000570000000000000057feffc525eac9a7... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/2 (60 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [324] 0b00013800010000000001380001350001323082012e3081d5a0030201020201... record new: [0] record old: [156] 0c000090000200000000009003001741049e5b1933e840a6adfa7eb89fa9fcdd... record new: [156] 0c000090000100000000009003001741049e5b1933e840a6adfa7eb89fa9fcdd... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [643] 16fefd00000000000000000063020000570000000000000057fefd7120b2ee31... server: Filtered packet: [319] 16fefd00000000000000000063020000570000000000000057fefd7120b2ee31... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/3 (59 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [740] 020000570302a663767771803d9fd503ed5509c05a320e9cfcfeee46d8a251e8... record new: [537] 020000570302a663767771803d9fd503ed5509c05a320e9cfcfeee46d8a251e8... server: Original packet: [745] 16030202e4020000570302a663767771803d9fd503ed5509c05a320e9cfcfeee... server: Filtered packet: [542] 1603020219020000570302a663767771803d9fd503ed5509c05a320e9cfcfeee... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/0 (79 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [742] 02000057030381103db0697f3f4b51e9eea971e22be8b0321b247489febf1409... record new: [537] 02000057030381103db0697f3f4b51e9eea971e22be8b0321b247489febf1409... server: Original packet: [747] 16030302e602000057030381103db0697f3f4b51e9eea971e22be8b0321b2474... server: Filtered packet: [542] 160303021902000057030381103db0697f3f4b51e9eea971e22be8b0321b2474... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/1 (78 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [211] 0c0000c700020000000000c703001741049e5b1933e840a6adfa7eb89fa9fcdd... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feff659ebebcfa... server: Filtered packet: [613] 16feff00000000000000000063020000570000000000000057feff659ebebcfa... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/2 (79 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [213] 0c0000c900020000000000c903001741049e5b1933e840a6adfa7eb89fa9fcdd... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefd28cc4ea70c... server: Filtered packet: [613] 16fefd00000000000000000063020000570000000000000057fefd28cc4ea70c... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/3 (78 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [558] 0200005703022f39bb7b8230d3213750b441d1797cda9e9b5c6c0c6107d54603... record new: [411] 0200005703022f39bb7b8230d3213750b441d1797cda9e9b5c6c0c6107d54603... server: Original packet: [563] 160302022e0200005703022f39bb7b8230d3213750b441d1797cda9e9b5c6c0c... server: Filtered packet: [416] 160302019b0200005703022f39bb7b8230d3213750b441d1797cda9e9b5c6c0c... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 (60 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [560] 0200005703039c11f34d1d2dfa7e2c004a846f11f7805590bd508786386e9eab... record new: [411] 0200005703039c11f34d1d2dfa7e2c004a846f11f7805590bd508786386e9eab... server: Original packet: [565] 16030302300200005703039c11f34d1d2dfa7e2c004a846f11f7805590bd5087... server: Filtered packet: [416] 160303019b0200005703039c11f34d1d2dfa7e2c004a846f11f7805590bd5087... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/1 (58 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [155] 0c00008f000200000000008f03001741049e5b1933e840a6adfa7eb89fa9fcdd... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [642] 16feff00000000000000000063020000570000000000000057feff3946d9db18... server: Filtered packet: [487] 16feff00000000000000000063020000570000000000000057feff3946d9db18... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/2 (60 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [156] 0c000090000200000000009003001741049e5b1933e840a6adfa7eb89fa9fcdd... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Original packet: [643] 16fefd00000000000000000063020000570000000000000057fefd0410cb194f... server: Filtered packet: [487] 16fefd00000000000000000063020000570000000000000057fefd0410cb194f... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/3 (59 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [740] 02000057030246c0d879d2d063fd0368a0f3a3d1d653f71ab3d4ba9e1643ddab... record new: [298] 02000057030246c0d879d2d063fd0368a0f3a3d1d653f71ab3d4ba9e1643ddab... Dropping handshake: 12 record old: [298] 02000057030246c0d879d2d063fd0368a0f3a3d1d653f71ab3d4ba9e1643ddab... record new: [95] 02000057030246c0d879d2d063fd0368a0f3a3d1d653f71ab3d4ba9e1643ddab... server: Original packet: [745] 16030202e402000057030246c0d879d2d063fd0368a0f3a3d1d653f71ab3d4ba... server: Filtered packet: [100] 160302005f02000057030246c0d879d2d063fd0368a0f3a3d1d653f71ab3d4ba... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/0 (79 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [742] 020000570303b1d9b5eaeb60534559342519737afa64f4ca275cf36cb2aa1f93... record new: [300] 020000570303b1d9b5eaeb60534559342519737afa64f4ca275cf36cb2aa1f93... Dropping handshake: 12 record old: [300] 020000570303b1d9b5eaeb60534559342519737afa64f4ca275cf36cb2aa1f93... record new: [95] 020000570303b1d9b5eaeb60534559342519737afa64f4ca275cf36cb2aa1f93... server: Original packet: [747] 16030302e6020000570303b1d9b5eaeb60534559342519737afa64f4ca275cf3... server: Filtered packet: [100] 160303005f020000570303b1d9b5eaeb60534559342519737afa64f4ca275cf3... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/1 (79 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [211] 0c0000c700020000000000c703001741049e5b1933e840a6adfa7eb89fa9fcdd... record new: [211] 0c0000c700010000000000c703001741049e5b1933e840a6adfa7eb89fa9fcdd... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [211] 0c0000c700010000000000c703001741049e5b1933e840a6adfa7eb89fa9fcdd... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [824] 16feff00000000000000000063020000570000000000000057feff8ecb9e8e05... server: Filtered packet: [163] 16feff00000000000000000063020000570000000000000057feff8ecb9e8e05... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/2 (79 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [213] 0c0000c900020000000000c903001741049e5b1933e840a6adfa7eb89fa9fcdd... record new: [213] 0c0000c900010000000000c903001741049e5b1933e840a6adfa7eb89fa9fcdd... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [213] 0c0000c900010000000000c903001741049e5b1933e840a6adfa7eb89fa9fcdd... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [826] 16fefd00000000000000000063020000570000000000000057fefdf1dcfeb7b7... server: Filtered packet: [163] 16fefd00000000000000000063020000570000000000000057fefdf1dcfeb7b7... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/3 (80 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [557] 0200005703022d27d878e5cf833236a1c03adf7b3d17202f2a452ebea0148e58... record new: [241] 0200005703022d27d878e5cf833236a1c03adf7b3d17202f2a452ebea0148e58... Dropping handshake: 12 record old: [241] 0200005703022d27d878e5cf833236a1c03adf7b3d17202f2a452ebea0148e58... record new: [95] 0200005703022d27d878e5cf833236a1c03adf7b3d17202f2a452ebea0148e58... server: Original packet: [562] 160302022d0200005703022d27d878e5cf833236a1c03adf7b3d17202f2a452e... server: Filtered packet: [100] 160302005f0200005703022d27d878e5cf833236a1c03adf7b3d17202f2a452e... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 (60 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [560] 020000570303e0dd354eaa345d7333d637b0d4eadbecfd7ae5d6d5666a880f47... record new: [244] 020000570303e0dd354eaa345d7333d637b0d4eadbecfd7ae5d6d5666a880f47... Dropping handshake: 12 record old: [244] 020000570303e0dd354eaa345d7333d637b0d4eadbecfd7ae5d6d5666a880f47... record new: [95] 020000570303e0dd354eaa345d7333d637b0d4eadbecfd7ae5d6d5666a880f47... server: Original packet: [565] 1603030230020000570303e0dd354eaa345d7333d637b0d4eadbecfd7ae5d6d5... server: Filtered packet: [100] 160303005f020000570303e0dd354eaa345d7333d637b0d4eadbecfd7ae5d6d5... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/1 (59 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [324] 0b00013800010000000001380001350001323082012e3081d5a0030201020201... record new: [0] record old: [155] 0c00008f000200000000008f03001741049e5b1933e840a6adfa7eb89fa9fcdd... record new: [155] 0c00008f000100000000008f03001741049e5b1933e840a6adfa7eb89fa9fcdd... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [155] 0c00008f000100000000008f03001741049e5b1933e840a6adfa7eb89fa9fcdd... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [642] 16feff00000000000000000063020000570000000000000057feff1e4cbcfa3e... server: Filtered packet: [163] 16feff00000000000000000063020000570000000000000057feff1e4cbcfa3e... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/2 (60 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [324] 0b00013800010000000001380001350001323082012e3081d5a0030201020201... record new: [0] record old: [157] 0c000091000200000000009103001741049e5b1933e840a6adfa7eb89fa9fcdd... record new: [157] 0c000091000100000000009103001741049e5b1933e840a6adfa7eb89fa9fcdd... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [157] 0c000091000100000000009103001741049e5b1933e840a6adfa7eb89fa9fcdd... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Original packet: [644] 16fefd00000000000000000063020000570000000000000057fefd65a5098f06... server: Filtered packet: [163] 16fefd00000000000000000063020000570000000000000057fefd65a5098f06... Alert: [2] 020a client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/3 (60 ms) [----------] 32 tests from SkipVariants/TlsSkipTest (2253 ms total) [----------] 10 tests from AllHashFuncs/TlsHkdfTest [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/0 Hash = SHA-256 Output: [32] 33ad0a1c607ec03b09e6cd9893680ce210adf300aa1f2660e1b22e10f170f92a [ OK ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/0 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/1 Hash = SHA-384 Output: [48] 7ee8206f5570023e6dc7519eb1073bc4e791ad37b5c382aa10ba18e2357e7169... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/1 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/0 Hash = SHA-256 Output: [32] 11873828a9197811339124b58a1bb09f7f0d8dbb10f49c54bd1fd885cd153033 [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/0 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/1 Hash = SHA-384 Output: [48] 51b1d5b4597979084a15b2db84d3d6bcfc9345d9dc74da1a57c2769f3f83452f... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/1 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/0 Hash = SHA-256 Output: [32] 2f5f78d0a4c436ee6c8a4ef9d043810213fd4783633ad2e1406d2d9800fdc187 [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/1 Hash = SHA-384 Output: [48] 7b40f9ef91ffc9d129245cbff8827668ae4b63e803dd39a8d46af6e5eceaf87d... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/0 Hash = SHA-256 Output: [32] 7953b8dd6b98ce00b7dce803708ce3ac068b22fd0e3448e6e5e08ad61618e548 [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/0 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/1 Hash = SHA-384 Output: [48] 0193c0073f6a830e2e4fb258e400085c689c37320037ffc31c5b980b02923ffd... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/1 (1 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/0 Hash = SHA-256 Output: [32] 347c6780ff0bbad71c283b16eb2f9cf62d24e6cdb613d51776548cb07dcde74c [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/1 Hash = SHA-384 Output: [48] 4b1e5ec1493078ea35bd3f0104e61aea14cc182ad1c47621c464c04e4b361605... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/1 (0 ms) [----------] 10 tests from AllHashFuncs/TlsHkdfTest (8 ms total) [----------] Global test environment tear-down [==========] 785 tests from 14 test cases ran. (100979 ms total) [ PASSED ] 785 tests. ssl_gtest.sh: #15544: ssl_gtest run successfully - PASSED executing sed to parse the xml report processing the parsed report ssl_gtest.sh: #15545: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/0 ("TLS", 769, 5, 65537, 0)' - PASSED ssl_gtest.sh: #15546: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/1 ("TLS", 769, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #15547: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/2 ("TLS", 769, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #15548: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/3 ("TLS", 769, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #15549: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/4 ("TLS", 769, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #15550: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/5 ("TLS", 770, 5, 65537, 0)' - PASSED ssl_gtest.sh: #15551: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/6 ("TLS", 770, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #15552: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/7 ("TLS", 770, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #15553: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/8 ("TLS", 770, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #15554: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/9 ("TLS", 770, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #15555: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/10 ("TLS", 771, 5, 65537, 0)' - PASSED ssl_gtest.sh: #15556: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/11 ("TLS", 771, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #15557: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/12 ("TLS", 771, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #15558: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/13 ("TLS", 771, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #15559: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/14 ("TLS", 771, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #15560: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/0 ("TLS", 769, 5, 65537, 0)' - PASSED ssl_gtest.sh: #15561: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/1 ("TLS", 769, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #15562: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/2 ("TLS", 769, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #15563: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/3 ("TLS", 769, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #15564: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/4 ("TLS", 769, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #15565: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/5 ("TLS", 770, 5, 65537, 0)' - PASSED ssl_gtest.sh: #15566: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/6 ("TLS", 770, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #15567: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/7 ("TLS", 770, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #15568: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/8 ("TLS", 770, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #15569: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/9 ("TLS", 770, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #15570: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/10 ("TLS", 771, 5, 65537, 0)' - PASSED ssl_gtest.sh: #15571: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/11 ("TLS", 771, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #15572: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/12 ("TLS", 771, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #15573: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/13 ("TLS", 771, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #15574: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/14 ("TLS", 771, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #15575: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/0 ("TLS", 769, 5, 65537, 0)' - PASSED ssl_gtest.sh: #15576: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/1 ("TLS", 769, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #15577: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/2 ("TLS", 769, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #15578: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/3 ("TLS", 769, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #15579: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/4 ("TLS", 769, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #15580: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/5 ("TLS", 770, 5, 65537, 0)' - PASSED ssl_gtest.sh: #15581: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/6 ("TLS", 770, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #15582: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/7 ("TLS", 770, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #15583: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/8 ("TLS", 770, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #15584: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/9 ("TLS", 770, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #15585: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/10 ("TLS", 771, 5, 65537, 0)' - PASSED ssl_gtest.sh: #15586: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/11 ("TLS", 771, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #15587: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/12 ("TLS", 771, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #15588: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/13 ("TLS", 771, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #15589: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/14 ("TLS", 771, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #15590: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/0 ("TLS", 769, 5, 65537, 0)' - PASSED ssl_gtest.sh: #15591: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/1 ("TLS", 769, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #15592: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/2 ("TLS", 769, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #15593: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/3 ("TLS", 769, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #15594: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/4 ("TLS", 769, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #15595: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/5 ("TLS", 770, 5, 65537, 0)' - PASSED ssl_gtest.sh: #15596: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/6 ("TLS", 770, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #15597: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/7 ("TLS", 770, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #15598: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/8 ("TLS", 770, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #15599: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/9 ("TLS", 770, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #15600: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/10 ("TLS", 771, 5, 65537, 0)' - PASSED ssl_gtest.sh: #15601: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/11 ("TLS", 771, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #15602: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/12 ("TLS", 771, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #15603: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/13 ("TLS", 771, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #15604: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/14 ("TLS", 771, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #15605: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/0 ("TLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #15606: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/1 ("TLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #15607: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/2 ("TLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #15608: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/3 ("TLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #15609: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/4 ("TLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #15610: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/5 ("TLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #15611: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/6 ("DTLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #15612: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/7 ("DTLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #15613: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/8 ("DTLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #15614: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/9 ("DTLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #15615: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/10 ("DTLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #15616: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/11 ("DTLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #15617: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/0 ("TLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #15618: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/1 ("TLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #15619: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/2 ("TLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #15620: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/3 ("TLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #15621: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/4 ("TLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #15622: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/5 ("TLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #15623: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/6 ("DTLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #15624: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/7 ("DTLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #15625: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/8 ("DTLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #15626: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/9 ("DTLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #15627: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/10 ("DTLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #15628: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/11 ("DTLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #15629: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/0 ("TLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #15630: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/1 ("TLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #15631: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/2 ("TLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #15632: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/3 ("TLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #15633: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/4 ("TLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #15634: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/5 ("TLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #15635: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/6 ("DTLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #15636: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/7 ("DTLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #15637: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/8 ("DTLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #15638: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/9 ("DTLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #15639: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/10 ("DTLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #15640: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/11 ("DTLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #15641: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/0 ("TLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #15642: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/1 ("TLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #15643: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/2 ("TLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #15644: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/3 ("TLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #15645: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/4 ("TLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #15646: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/5 ("TLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #15647: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/6 ("DTLS", 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #15648: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/7 ("DTLS", 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #15649: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/8 ("DTLS", 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #15650: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/9 ("DTLS", 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #15651: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/10 ("DTLS", 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #15652: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/11 ("DTLS", 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #15653: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/0 ("TLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #15654: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/1 ("TLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #15655: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/2 ("TLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #15656: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/3 ("TLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #15657: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/4 ("TLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #15658: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/5 ("TLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #15659: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/6 ("DTLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #15660: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/7 ("DTLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #15661: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/8 ("DTLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #15662: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/9 ("DTLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #15663: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/10 ("DTLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #15664: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/11 ("DTLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #15665: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/0 ("TLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #15666: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/1 ("TLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #15667: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/2 ("TLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #15668: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/3 ("TLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #15669: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/4 ("TLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #15670: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/5 ("TLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #15671: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/6 ("DTLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #15672: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/7 ("DTLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #15673: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/8 ("DTLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #15674: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/9 ("DTLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #15675: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/10 ("DTLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #15676: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/11 ("DTLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #15677: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/0 ("TLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #15678: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/1 ("TLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #15679: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/2 ("TLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #15680: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/3 ("TLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #15681: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/4 ("TLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #15682: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/5 ("TLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #15683: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/6 ("DTLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #15684: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/7 ("DTLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #15685: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/8 ("DTLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #15686: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/9 ("DTLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #15687: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/10 ("DTLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #15688: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/11 ("DTLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #15689: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/0 ("TLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #15690: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/1 ("TLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #15691: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/2 ("TLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #15692: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/3 ("TLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #15693: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/4 ("TLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #15694: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/5 ("TLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #15695: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/6 ("DTLS", 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #15696: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/7 ("DTLS", 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #15697: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/8 ("DTLS", 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #15698: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/9 ("DTLS", 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #15699: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/10 ("DTLS", 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #15700: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/11 ("DTLS", 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #15701: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/0 ("TLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #15702: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/1 ("TLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #15703: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/2 ("TLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #15704: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/3 ("TLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #15705: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/4 ("TLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #15706: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/5 ("TLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #15707: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/6 ("TLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #15708: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/7 ("TLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #15709: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/8 ("DTLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #15710: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/9 ("DTLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #15711: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/10 ("DTLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #15712: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/11 ("DTLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #15713: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/12 ("DTLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #15714: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/13 ("DTLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #15715: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/14 ("DTLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #15716: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/15 ("DTLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #15717: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/0 ("TLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #15718: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/1 ("TLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #15719: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/2 ("TLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #15720: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/3 ("TLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #15721: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/4 ("TLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #15722: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/5 ("TLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #15723: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/6 ("TLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #15724: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/7 ("TLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #15725: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/8 ("DTLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #15726: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/9 ("DTLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #15727: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/10 ("DTLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #15728: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/11 ("DTLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #15729: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/12 ("DTLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #15730: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/13 ("DTLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #15731: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/14 ("DTLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #15732: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/15 ("DTLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #15733: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/0 ("TLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #15734: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/1 ("TLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #15735: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/2 ("TLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #15736: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/3 ("TLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #15737: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/4 ("TLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #15738: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/5 ("TLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #15739: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/6 ("TLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #15740: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/7 ("TLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #15741: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/8 ("DTLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #15742: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/9 ("DTLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #15743: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/10 ("DTLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #15744: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/11 ("DTLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #15745: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/12 ("DTLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #15746: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/13 ("DTLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #15747: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/14 ("DTLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #15748: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/15 ("DTLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #15749: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/0 ("TLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #15750: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/1 ("TLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #15751: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/2 ("TLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #15752: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/3 ("TLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #15753: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/4 ("TLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #15754: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/5 ("TLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #15755: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/6 ("TLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #15756: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/7 ("TLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #15757: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/8 ("DTLS", 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #15758: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/9 ("DTLS", 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #15759: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/10 ("DTLS", 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #15760: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/11 ("DTLS", 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #15761: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/12 ("DTLS", 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #15762: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/13 ("DTLS", 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #15763: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/14 ("DTLS", 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #15764: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/15 ("DTLS", 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #15765: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/0 ("TLS", 769, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #15766: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/1 ("TLS", 769, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #15767: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/2 ("TLS", 769, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #15768: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/3 ("TLS", 769, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #15769: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/4 ("TLS", 769, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #15770: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/5 ("TLS", 769, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #15771: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/6 ("TLS", 769, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #15772: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/7 ("TLS", 769, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #15773: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/8 ("TLS", 769, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #15774: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/9 ("TLS", 769, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #15775: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/10 ("TLS", 769, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #15776: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/11 ("TLS", 769, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #15777: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/12 ("TLS", 769, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #15778: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/13 ("TLS", 769, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #15779: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/14 ("TLS", 769, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #15780: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/15 ("TLS", 769, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #15781: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/16 ("TLS", 770, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #15782: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/17 ("TLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #15783: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/18 ("TLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #15784: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/19 ("TLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #15785: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/20 ("TLS", 770, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #15786: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/21 ("TLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #15787: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/22 ("TLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #15788: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/23 ("TLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #15789: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/24 ("TLS", 770, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #15790: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/25 ("TLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #15791: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/26 ("TLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #15792: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/27 ("TLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #15793: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/28 ("TLS", 770, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #15794: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/29 ("TLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #15795: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/30 ("TLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #15796: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/31 ("TLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #15797: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/32 ("TLS", 771, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #15798: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/33 ("TLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #15799: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/34 ("TLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #15800: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/35 ("TLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #15801: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/36 ("TLS", 771, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #15802: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/37 ("TLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #15803: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/38 ("TLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #15804: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/39 ("TLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #15805: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/40 ("TLS", 771, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #15806: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/41 ("TLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #15807: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/42 ("TLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #15808: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/43 ("TLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #15809: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/44 ("TLS", 771, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #15810: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/45 ("TLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #15811: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/46 ("TLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #15812: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/47 ("TLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #15813: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/0 ("TLS", 769, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #15814: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/1 ("TLS", 769, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #15815: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/2 ("TLS", 769, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #15816: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/3 ("TLS", 769, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #15817: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/4 ("TLS", 769, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #15818: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/5 ("TLS", 769, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #15819: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/6 ("TLS", 769, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #15820: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/7 ("TLS", 769, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #15821: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/8 ("TLS", 769, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #15822: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/9 ("TLS", 769, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #15823: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/10 ("TLS", 769, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #15824: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/11 ("TLS", 769, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #15825: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/12 ("TLS", 769, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #15826: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/13 ("TLS", 769, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #15827: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/14 ("TLS", 769, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #15828: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/15 ("TLS", 769, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #15829: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/16 ("TLS", 770, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #15830: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/17 ("TLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #15831: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/18 ("TLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #15832: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/19 ("TLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #15833: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/20 ("TLS", 770, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #15834: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/21 ("TLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #15835: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/22 ("TLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #15836: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/23 ("TLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #15837: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/24 ("TLS", 770, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #15838: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/25 ("TLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #15839: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/26 ("TLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #15840: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/27 ("TLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #15841: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/28 ("TLS", 770, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #15842: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/29 ("TLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #15843: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/30 ("TLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #15844: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/31 ("TLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #15845: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/32 ("TLS", 771, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #15846: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/33 ("TLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #15847: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/34 ("TLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #15848: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/35 ("TLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #15849: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/36 ("TLS", 771, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #15850: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/37 ("TLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #15851: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/38 ("TLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #15852: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/39 ("TLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #15853: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/40 ("TLS", 771, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #15854: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/41 ("TLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #15855: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/42 ("TLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #15856: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/43 ("TLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #15857: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/44 ("TLS", 771, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #15858: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/45 ("TLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #15859: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/46 ("TLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #15860: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/47 ("TLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #15861: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/0 ("TLS", 769, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #15862: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/1 ("TLS", 769, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #15863: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/2 ("TLS", 769, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #15864: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/3 ("TLS", 769, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #15865: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/4 ("TLS", 769, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #15866: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/5 ("TLS", 769, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #15867: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/6 ("TLS", 769, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #15868: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/7 ("TLS", 769, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #15869: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/8 ("TLS", 769, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #15870: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/9 ("TLS", 769, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #15871: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/10 ("TLS", 769, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #15872: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/11 ("TLS", 769, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #15873: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/12 ("TLS", 769, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #15874: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/13 ("TLS", 769, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #15875: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/14 ("TLS", 769, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #15876: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/15 ("TLS", 769, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #15877: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/16 ("TLS", 770, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #15878: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/17 ("TLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #15879: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/18 ("TLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #15880: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/19 ("TLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #15881: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/20 ("TLS", 770, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #15882: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/21 ("TLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #15883: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/22 ("TLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #15884: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/23 ("TLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #15885: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/24 ("TLS", 770, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #15886: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/25 ("TLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #15887: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/26 ("TLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #15888: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/27 ("TLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #15889: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/28 ("TLS", 770, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #15890: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/29 ("TLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #15891: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/30 ("TLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #15892: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/31 ("TLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #15893: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/32 ("TLS", 771, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #15894: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/33 ("TLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #15895: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/34 ("TLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #15896: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/35 ("TLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #15897: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/36 ("TLS", 771, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #15898: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/37 ("TLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #15899: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/38 ("TLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #15900: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/39 ("TLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #15901: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/40 ("TLS", 771, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #15902: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/41 ("TLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #15903: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/42 ("TLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #15904: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/43 ("TLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #15905: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/44 ("TLS", 771, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #15906: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/45 ("TLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #15907: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/46 ("TLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #15908: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/47 ("TLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #15909: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/0 ("TLS", 769, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #15910: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/1 ("TLS", 769, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #15911: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/2 ("TLS", 769, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #15912: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/3 ("TLS", 769, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #15913: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/4 ("TLS", 769, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #15914: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/5 ("TLS", 769, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #15915: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/6 ("TLS", 769, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #15916: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/7 ("TLS", 769, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #15917: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/8 ("TLS", 769, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #15918: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/9 ("TLS", 769, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #15919: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/10 ("TLS", 769, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #15920: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/11 ("TLS", 769, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #15921: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/12 ("TLS", 769, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #15922: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/13 ("TLS", 769, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #15923: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/14 ("TLS", 769, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #15924: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/15 ("TLS", 769, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #15925: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/16 ("TLS", 770, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #15926: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/17 ("TLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #15927: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/18 ("TLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #15928: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/19 ("TLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #15929: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/20 ("TLS", 770, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #15930: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/21 ("TLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #15931: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/22 ("TLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #15932: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/23 ("TLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #15933: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/24 ("TLS", 770, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #15934: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/25 ("TLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #15935: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/26 ("TLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #15936: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/27 ("TLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #15937: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/28 ("TLS", 770, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #15938: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/29 ("TLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #15939: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/30 ("TLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #15940: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/31 ("TLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #15941: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/32 ("TLS", 771, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #15942: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/33 ("TLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #15943: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/34 ("TLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #15944: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/35 ("TLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #15945: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/36 ("TLS", 771, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #15946: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/37 ("TLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #15947: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/38 ("TLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #15948: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/39 ("TLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #15949: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/40 ("TLS", 771, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #15950: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/41 ("TLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #15951: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/42 ("TLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #15952: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/43 ("TLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #15953: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/44 ("TLS", 771, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #15954: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/45 ("TLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #15955: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/46 ("TLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #15956: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/47 ("TLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #15957: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/0 ("DTLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #15958: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/1 ("DTLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #15959: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/2 ("DTLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #15960: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/3 ("DTLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #15961: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/4 ("DTLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #15962: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/5 ("DTLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #15963: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/6 ("DTLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #15964: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/7 ("DTLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #15965: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/8 ("DTLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #15966: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/9 ("DTLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #15967: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/10 ("DTLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #15968: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/11 ("DTLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #15969: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/12 ("DTLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #15970: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/13 ("DTLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #15971: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/14 ("DTLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #15972: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/15 ("DTLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #15973: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/16 ("DTLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #15974: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/17 ("DTLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #15975: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/18 ("DTLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #15976: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/19 ("DTLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #15977: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/20 ("DTLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #15978: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/21 ("DTLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #15979: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/22 ("DTLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #15980: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/23 ("DTLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #15981: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/0 ("DTLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #15982: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/1 ("DTLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #15983: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/2 ("DTLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #15984: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/3 ("DTLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #15985: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/4 ("DTLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #15986: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/5 ("DTLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #15987: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/6 ("DTLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #15988: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/7 ("DTLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #15989: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/8 ("DTLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #15990: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/9 ("DTLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #15991: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/10 ("DTLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #15992: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/11 ("DTLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #15993: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/12 ("DTLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #15994: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/13 ("DTLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #15995: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/14 ("DTLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #15996: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/15 ("DTLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #15997: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/16 ("DTLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #15998: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/17 ("DTLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #15999: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/18 ("DTLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #16000: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/19 ("DTLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #16001: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/20 ("DTLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #16002: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/21 ("DTLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #16003: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/22 ("DTLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #16004: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/23 ("DTLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #16005: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/0 ("DTLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #16006: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/1 ("DTLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #16007: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/2 ("DTLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #16008: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/3 ("DTLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #16009: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/4 ("DTLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #16010: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/5 ("DTLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #16011: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/6 ("DTLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #16012: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/7 ("DTLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #16013: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/8 ("DTLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #16014: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/9 ("DTLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #16015: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/10 ("DTLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #16016: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/11 ("DTLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #16017: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/12 ("DTLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #16018: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/13 ("DTLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #16019: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/14 ("DTLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #16020: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/15 ("DTLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #16021: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/16 ("DTLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #16022: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/17 ("DTLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #16023: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/18 ("DTLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #16024: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/19 ("DTLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #16025: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/20 ("DTLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #16026: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/21 ("DTLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #16027: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/22 ("DTLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #16028: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/23 ("DTLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #16029: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/0 ("DTLS", 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #16030: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/1 ("DTLS", 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #16031: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/2 ("DTLS", 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #16032: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/3 ("DTLS", 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #16033: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/4 ("DTLS", 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #16034: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/5 ("DTLS", 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #16035: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/6 ("DTLS", 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #16036: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/7 ("DTLS", 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #16037: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/8 ("DTLS", 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #16038: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/9 ("DTLS", 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #16039: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/10 ("DTLS", 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #16040: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/11 ("DTLS", 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #16041: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/12 ("DTLS", 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #16042: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/13 ("DTLS", 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #16043: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/14 ("DTLS", 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #16044: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/15 ("DTLS", 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #16045: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/16 ("DTLS", 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #16046: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/17 ("DTLS", 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #16047: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/18 ("DTLS", 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #16048: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/19 ("DTLS", 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #16049: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/20 ("DTLS", 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #16050: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/21 ("DTLS", 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #16051: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/22 ("DTLS", 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #16052: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/23 ("DTLS", 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #16053: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/0 TLS 1.0, TLS_ECDHE_RSA_WITH_NULL_SHA, name = "NULL", key size = 0' - PASSED ssl_gtest.sh: #16054: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/1 TLS 1.0, TLS_RSA_WITH_RC4_128_SHA, name = "RC4", key size = 128' - PASSED ssl_gtest.sh: #16055: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/2 TLS 1.0, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, name = "3DES-EDE-CBC", key size = 168' - PASSED ssl_gtest.sh: #16056: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/3 TLS 1.0, TLS_RSA_WITH_AES_128_CBC_SHA, name = "AES-128", key size = 128' - PASSED ssl_gtest.sh: #16057: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/4 TLS 1.2, TLS_RSA_WITH_AES_256_CBC_SHA256, name = "AES-256", key size = 256' - PASSED ssl_gtest.sh: #16058: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/5 TLS 1.2, TLS_RSA_WITH_AES_128_GCM_SHA256, name = "AES-128-GCM", key size = 128' - PASSED ssl_gtest.sh: #16059: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/6 TLS 1.2, TLS_RSA_WITH_AES_256_GCM_SHA384, name = "AES-256-GCM", key size = 256' - PASSED ssl_gtest.sh: #16060: 'DamageYStream/TlsDamageDHYTest: DamageServerY/0 ("TLS", 769, 0, true)' - PASSED ssl_gtest.sh: #16061: 'DamageYStream/TlsDamageDHYTest: DamageServerY/1 ("TLS", 769, 0, false)' - PASSED ssl_gtest.sh: #16062: 'DamageYStream/TlsDamageDHYTest: DamageServerY/2 ("TLS", 769, 1, true)' - PASSED ssl_gtest.sh: #16063: 'DamageYStream/TlsDamageDHYTest: DamageServerY/3 ("TLS", 769, 1, false)' - PASSED ssl_gtest.sh: #16064: 'DamageYStream/TlsDamageDHYTest: DamageServerY/4 ("TLS", 769, 2, true)' - PASSED ssl_gtest.sh: #16065: 'DamageYStream/TlsDamageDHYTest: DamageServerY/5 ("TLS", 769, 2, false)' - PASSED ssl_gtest.sh: #16066: 'DamageYStream/TlsDamageDHYTest: DamageServerY/6 ("TLS", 769, 3, true)' - PASSED ssl_gtest.sh: #16067: 'DamageYStream/TlsDamageDHYTest: DamageServerY/7 ("TLS", 769, 3, false)' - PASSED ssl_gtest.sh: #16068: 'DamageYStream/TlsDamageDHYTest: DamageServerY/8 ("TLS", 769, 4, true)' - PASSED ssl_gtest.sh: #16069: 'DamageYStream/TlsDamageDHYTest: DamageServerY/9 ("TLS", 769, 4, false)' - PASSED ssl_gtest.sh: #16070: 'DamageYStream/TlsDamageDHYTest: DamageServerY/10 ("TLS", 769, 5, true)' - PASSED ssl_gtest.sh: #16071: 'DamageYStream/TlsDamageDHYTest: DamageServerY/11 ("TLS", 769, 5, false)' - PASSED ssl_gtest.sh: #16072: 'DamageYStream/TlsDamageDHYTest: DamageServerY/12 ("TLS", 770, 0, true)' - PASSED ssl_gtest.sh: #16073: 'DamageYStream/TlsDamageDHYTest: DamageServerY/13 ("TLS", 770, 0, false)' - PASSED ssl_gtest.sh: #16074: 'DamageYStream/TlsDamageDHYTest: DamageServerY/14 ("TLS", 770, 1, true)' - PASSED ssl_gtest.sh: #16075: 'DamageYStream/TlsDamageDHYTest: DamageServerY/15 ("TLS", 770, 1, false)' - PASSED ssl_gtest.sh: #16076: 'DamageYStream/TlsDamageDHYTest: DamageServerY/16 ("TLS", 770, 2, true)' - PASSED ssl_gtest.sh: #16077: 'DamageYStream/TlsDamageDHYTest: DamageServerY/17 ("TLS", 770, 2, false)' - PASSED ssl_gtest.sh: #16078: 'DamageYStream/TlsDamageDHYTest: DamageServerY/18 ("TLS", 770, 3, true)' - PASSED ssl_gtest.sh: #16079: 'DamageYStream/TlsDamageDHYTest: DamageServerY/19 ("TLS", 770, 3, false)' - PASSED ssl_gtest.sh: #16080: 'DamageYStream/TlsDamageDHYTest: DamageServerY/20 ("TLS", 770, 4, true)' - PASSED ssl_gtest.sh: #16081: 'DamageYStream/TlsDamageDHYTest: DamageServerY/21 ("TLS", 770, 4, false)' - PASSED ssl_gtest.sh: #16082: 'DamageYStream/TlsDamageDHYTest: DamageServerY/22 ("TLS", 770, 5, true)' - PASSED ssl_gtest.sh: #16083: 'DamageYStream/TlsDamageDHYTest: DamageServerY/23 ("TLS", 770, 5, false)' - PASSED ssl_gtest.sh: #16084: 'DamageYStream/TlsDamageDHYTest: DamageServerY/24 ("TLS", 771, 0, true)' - PASSED ssl_gtest.sh: #16085: 'DamageYStream/TlsDamageDHYTest: DamageServerY/25 ("TLS", 771, 0, false)' - PASSED ssl_gtest.sh: #16086: 'DamageYStream/TlsDamageDHYTest: DamageServerY/26 ("TLS", 771, 1, true)' - PASSED ssl_gtest.sh: #16087: 'DamageYStream/TlsDamageDHYTest: DamageServerY/27 ("TLS", 771, 1, false)' - PASSED ssl_gtest.sh: #16088: 'DamageYStream/TlsDamageDHYTest: DamageServerY/28 ("TLS", 771, 2, true)' - PASSED ssl_gtest.sh: #16089: 'DamageYStream/TlsDamageDHYTest: DamageServerY/29 ("TLS", 771, 2, false)' - PASSED ssl_gtest.sh: #16090: 'DamageYStream/TlsDamageDHYTest: DamageServerY/30 ("TLS", 771, 3, true)' - PASSED ssl_gtest.sh: #16091: 'DamageYStream/TlsDamageDHYTest: DamageServerY/31 ("TLS", 771, 3, false)' - PASSED ssl_gtest.sh: #16092: 'DamageYStream/TlsDamageDHYTest: DamageServerY/32 ("TLS", 771, 4, true)' - PASSED ssl_gtest.sh: #16093: 'DamageYStream/TlsDamageDHYTest: DamageServerY/33 ("TLS", 771, 4, false)' - PASSED ssl_gtest.sh: #16094: 'DamageYStream/TlsDamageDHYTest: DamageServerY/34 ("TLS", 771, 5, true)' - PASSED ssl_gtest.sh: #16095: 'DamageYStream/TlsDamageDHYTest: DamageServerY/35 ("TLS", 771, 5, false)' - PASSED ssl_gtest.sh: #16096: 'DamageYStream/TlsDamageDHYTest: DamageClientY/0 ("TLS", 769, 0, true)' - PASSED ssl_gtest.sh: #16097: 'DamageYStream/TlsDamageDHYTest: DamageClientY/1 ("TLS", 769, 0, false)' - PASSED ssl_gtest.sh: #16098: 'DamageYStream/TlsDamageDHYTest: DamageClientY/2 ("TLS", 769, 1, true)' - PASSED ssl_gtest.sh: #16099: 'DamageYStream/TlsDamageDHYTest: DamageClientY/3 ("TLS", 769, 1, false)' - PASSED ssl_gtest.sh: #16100: 'DamageYStream/TlsDamageDHYTest: DamageClientY/4 ("TLS", 769, 2, true)' - PASSED ssl_gtest.sh: #16101: 'DamageYStream/TlsDamageDHYTest: DamageClientY/5 ("TLS", 769, 2, false)' - PASSED ssl_gtest.sh: #16102: 'DamageYStream/TlsDamageDHYTest: DamageClientY/6 ("TLS", 769, 3, true)' - PASSED ssl_gtest.sh: #16103: 'DamageYStream/TlsDamageDHYTest: DamageClientY/7 ("TLS", 769, 3, false)' - PASSED ssl_gtest.sh: #16104: 'DamageYStream/TlsDamageDHYTest: DamageClientY/8 ("TLS", 769, 4, true)' - PASSED ssl_gtest.sh: #16105: 'DamageYStream/TlsDamageDHYTest: DamageClientY/9 ("TLS", 769, 4, false)' - PASSED ssl_gtest.sh: #16106: 'DamageYStream/TlsDamageDHYTest: DamageClientY/10 ("TLS", 769, 5, true)' - PASSED ssl_gtest.sh: #16107: 'DamageYStream/TlsDamageDHYTest: DamageClientY/11 ("TLS", 769, 5, false)' - PASSED ssl_gtest.sh: #16108: 'DamageYStream/TlsDamageDHYTest: DamageClientY/12 ("TLS", 770, 0, true)' - PASSED ssl_gtest.sh: #16109: 'DamageYStream/TlsDamageDHYTest: DamageClientY/13 ("TLS", 770, 0, false)' - PASSED ssl_gtest.sh: #16110: 'DamageYStream/TlsDamageDHYTest: DamageClientY/14 ("TLS", 770, 1, true)' - PASSED ssl_gtest.sh: #16111: 'DamageYStream/TlsDamageDHYTest: DamageClientY/15 ("TLS", 770, 1, false)' - PASSED ssl_gtest.sh: #16112: 'DamageYStream/TlsDamageDHYTest: DamageClientY/16 ("TLS", 770, 2, true)' - PASSED ssl_gtest.sh: #16113: 'DamageYStream/TlsDamageDHYTest: DamageClientY/17 ("TLS", 770, 2, false)' - PASSED ssl_gtest.sh: #16114: 'DamageYStream/TlsDamageDHYTest: DamageClientY/18 ("TLS", 770, 3, true)' - PASSED ssl_gtest.sh: #16115: 'DamageYStream/TlsDamageDHYTest: DamageClientY/19 ("TLS", 770, 3, false)' - PASSED ssl_gtest.sh: #16116: 'DamageYStream/TlsDamageDHYTest: DamageClientY/20 ("TLS", 770, 4, true)' - PASSED ssl_gtest.sh: #16117: 'DamageYStream/TlsDamageDHYTest: DamageClientY/21 ("TLS", 770, 4, false)' - PASSED ssl_gtest.sh: #16118: 'DamageYStream/TlsDamageDHYTest: DamageClientY/22 ("TLS", 770, 5, true)' - PASSED ssl_gtest.sh: #16119: 'DamageYStream/TlsDamageDHYTest: DamageClientY/23 ("TLS", 770, 5, false)' - PASSED ssl_gtest.sh: #16120: 'DamageYStream/TlsDamageDHYTest: DamageClientY/24 ("TLS", 771, 0, true)' - PASSED ssl_gtest.sh: #16121: 'DamageYStream/TlsDamageDHYTest: DamageClientY/25 ("TLS", 771, 0, false)' - PASSED ssl_gtest.sh: #16122: 'DamageYStream/TlsDamageDHYTest: DamageClientY/26 ("TLS", 771, 1, true)' - PASSED ssl_gtest.sh: #16123: 'DamageYStream/TlsDamageDHYTest: DamageClientY/27 ("TLS", 771, 1, false)' - PASSED ssl_gtest.sh: #16124: 'DamageYStream/TlsDamageDHYTest: DamageClientY/28 ("TLS", 771, 2, true)' - PASSED ssl_gtest.sh: #16125: 'DamageYStream/TlsDamageDHYTest: DamageClientY/29 ("TLS", 771, 2, false)' - PASSED ssl_gtest.sh: #16126: 'DamageYStream/TlsDamageDHYTest: DamageClientY/30 ("TLS", 771, 3, true)' - PASSED ssl_gtest.sh: #16127: 'DamageYStream/TlsDamageDHYTest: DamageClientY/31 ("TLS", 771, 3, false)' - PASSED ssl_gtest.sh: #16128: 'DamageYStream/TlsDamageDHYTest: DamageClientY/32 ("TLS", 771, 4, true)' - PASSED ssl_gtest.sh: #16129: 'DamageYStream/TlsDamageDHYTest: DamageClientY/33 ("TLS", 771, 4, false)' - PASSED ssl_gtest.sh: #16130: 'DamageYStream/TlsDamageDHYTest: DamageClientY/34 ("TLS", 771, 5, true)' - PASSED ssl_gtest.sh: #16131: 'DamageYStream/TlsDamageDHYTest: DamageClientY/35 ("TLS", 771, 5, false)' - PASSED ssl_gtest.sh: #16132: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/0 ("DTLS", 770, 0, true)' - PASSED ssl_gtest.sh: #16133: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/1 ("DTLS", 770, 0, false)' - PASSED ssl_gtest.sh: #16134: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/2 ("DTLS", 770, 1, true)' - PASSED ssl_gtest.sh: #16135: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/3 ("DTLS", 770, 1, false)' - PASSED ssl_gtest.sh: #16136: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/4 ("DTLS", 770, 2, true)' - PASSED ssl_gtest.sh: #16137: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/5 ("DTLS", 770, 2, false)' - PASSED ssl_gtest.sh: #16138: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/6 ("DTLS", 770, 3, true)' - PASSED ssl_gtest.sh: #16139: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/7 ("DTLS", 770, 3, false)' - PASSED ssl_gtest.sh: #16140: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/8 ("DTLS", 770, 4, true)' - PASSED ssl_gtest.sh: #16141: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/9 ("DTLS", 770, 4, false)' - PASSED ssl_gtest.sh: #16142: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/10 ("DTLS", 770, 5, true)' - PASSED ssl_gtest.sh: #16143: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/11 ("DTLS", 770, 5, false)' - PASSED ssl_gtest.sh: #16144: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/12 ("DTLS", 771, 0, true)' - PASSED ssl_gtest.sh: #16145: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/13 ("DTLS", 771, 0, false)' - PASSED ssl_gtest.sh: #16146: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/14 ("DTLS", 771, 1, true)' - PASSED ssl_gtest.sh: #16147: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/15 ("DTLS", 771, 1, false)' - PASSED ssl_gtest.sh: #16148: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/16 ("DTLS", 771, 2, true)' - PASSED ssl_gtest.sh: #16149: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/17 ("DTLS", 771, 2, false)' - PASSED ssl_gtest.sh: #16150: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/18 ("DTLS", 771, 3, true)' - PASSED ssl_gtest.sh: #16151: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/19 ("DTLS", 771, 3, false)' - PASSED ssl_gtest.sh: #16152: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/20 ("DTLS", 771, 4, true)' - PASSED ssl_gtest.sh: #16153: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/21 ("DTLS", 771, 4, false)' - PASSED ssl_gtest.sh: #16154: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/22 ("DTLS", 771, 5, true)' - PASSED ssl_gtest.sh: #16155: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/23 ("DTLS", 771, 5, false)' - PASSED ssl_gtest.sh: #16156: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/0 ("DTLS", 770, 0, true)' - PASSED ssl_gtest.sh: #16157: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/1 ("DTLS", 770, 0, false)' - PASSED ssl_gtest.sh: #16158: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/2 ("DTLS", 770, 1, true)' - PASSED ssl_gtest.sh: #16159: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/3 ("DTLS", 770, 1, false)' - PASSED ssl_gtest.sh: #16160: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/4 ("DTLS", 770, 2, true)' - PASSED ssl_gtest.sh: #16161: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/5 ("DTLS", 770, 2, false)' - PASSED ssl_gtest.sh: #16162: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/6 ("DTLS", 770, 3, true)' - PASSED ssl_gtest.sh: #16163: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/7 ("DTLS", 770, 3, false)' - PASSED ssl_gtest.sh: #16164: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/8 ("DTLS", 770, 4, true)' - PASSED ssl_gtest.sh: #16165: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/9 ("DTLS", 770, 4, false)' - PASSED ssl_gtest.sh: #16166: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/10 ("DTLS", 770, 5, true)' - PASSED ssl_gtest.sh: #16167: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/11 ("DTLS", 770, 5, false)' - PASSED ssl_gtest.sh: #16168: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/12 ("DTLS", 771, 0, true)' - PASSED ssl_gtest.sh: #16169: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/13 ("DTLS", 771, 0, false)' - PASSED ssl_gtest.sh: #16170: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/14 ("DTLS", 771, 1, true)' - PASSED ssl_gtest.sh: #16171: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/15 ("DTLS", 771, 1, false)' - PASSED ssl_gtest.sh: #16172: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/16 ("DTLS", 771, 2, true)' - PASSED ssl_gtest.sh: #16173: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/17 ("DTLS", 771, 2, false)' - PASSED ssl_gtest.sh: #16174: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/18 ("DTLS", 771, 3, true)' - PASSED ssl_gtest.sh: #16175: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/19 ("DTLS", 771, 3, false)' - PASSED ssl_gtest.sh: #16176: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/20 ("DTLS", 771, 4, true)' - PASSED ssl_gtest.sh: #16177: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/21 ("DTLS", 771, 4, false)' - PASSED ssl_gtest.sh: #16178: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/22 ("DTLS", 771, 5, true)' - PASSED ssl_gtest.sh: #16179: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/23 ("DTLS", 771, 5, false)' - PASSED ssl_gtest.sh: #16180: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/0 ("TLS", 771)' - PASSED ssl_gtest.sh: #16181: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/1 ("TLS", 770)' - PASSED ssl_gtest.sh: #16182: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/2 ("DTLS", 771)' - PASSED ssl_gtest.sh: #16183: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/3 ("DTLS", 770)' - PASSED ssl_gtest.sh: #16184: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/0 ("TLS", 771)' - PASSED ssl_gtest.sh: #16185: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/1 ("TLS", 770)' - PASSED ssl_gtest.sh: #16186: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/2 ("DTLS", 771)' - PASSED ssl_gtest.sh: #16187: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/3 ("DTLS", 770)' - PASSED ssl_gtest.sh: #16188: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/0 ("TLS", 771)' - PASSED ssl_gtest.sh: #16189: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/1 ("TLS", 770)' - PASSED ssl_gtest.sh: #16190: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/2 ("DTLS", 771)' - PASSED ssl_gtest.sh: #16191: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/3 ("DTLS", 770)' - PASSED ssl_gtest.sh: #16192: 'TlsPadding/TlsPaddingTest: Correct/0 (1, true)' - PASSED ssl_gtest.sh: #16193: 'TlsPadding/TlsPaddingTest: Correct/1 (1, false)' - PASSED ssl_gtest.sh: #16194: 'TlsPadding/TlsPaddingTest: Correct/2 (19, true)' - PASSED ssl_gtest.sh: #16195: 'TlsPadding/TlsPaddingTest: Correct/3 (19, false)' - PASSED ssl_gtest.sh: #16196: 'TlsPadding/TlsPaddingTest: Correct/4 (20, true)' - PASSED ssl_gtest.sh: #16197: 'TlsPadding/TlsPaddingTest: Correct/5 (20, false)' - PASSED ssl_gtest.sh: #16198: 'TlsPadding/TlsPaddingTest: Correct/6 (30, true)' - PASSED ssl_gtest.sh: #16199: 'TlsPadding/TlsPaddingTest: Correct/7 (30, false)' - PASSED ssl_gtest.sh: #16200: 'TlsPadding/TlsPaddingTest: Correct/8 (31, true)' - PASSED ssl_gtest.sh: #16201: 'TlsPadding/TlsPaddingTest: Correct/9 (31, false)' - PASSED ssl_gtest.sh: #16202: 'TlsPadding/TlsPaddingTest: Correct/10 (32, true)' - PASSED ssl_gtest.sh: #16203: 'TlsPadding/TlsPaddingTest: Correct/11 (32, false)' - PASSED ssl_gtest.sh: #16204: 'TlsPadding/TlsPaddingTest: Correct/12 (36, true)' - PASSED ssl_gtest.sh: #16205: 'TlsPadding/TlsPaddingTest: Correct/13 (36, false)' - PASSED ssl_gtest.sh: #16206: 'TlsPadding/TlsPaddingTest: Correct/14 (256, true)' - PASSED ssl_gtest.sh: #16207: 'TlsPadding/TlsPaddingTest: Correct/15 (256, false)' - PASSED ssl_gtest.sh: #16208: 'TlsPadding/TlsPaddingTest: Correct/16 (257, true)' - PASSED ssl_gtest.sh: #16209: 'TlsPadding/TlsPaddingTest: Correct/17 (257, false)' - PASSED ssl_gtest.sh: #16210: 'TlsPadding/TlsPaddingTest: Correct/18 (287, true)' - PASSED ssl_gtest.sh: #16211: 'TlsPadding/TlsPaddingTest: Correct/19 (287, false)' - PASSED ssl_gtest.sh: #16212: 'TlsPadding/TlsPaddingTest: Correct/20 (288, true)' - PASSED ssl_gtest.sh: #16213: 'TlsPadding/TlsPaddingTest: Correct/21 (288, false)' - PASSED ssl_gtest.sh: #16214: 'TlsPadding/TlsPaddingTest: PadTooLong/0 (1, true)' - PASSED ssl_gtest.sh: #16215: 'TlsPadding/TlsPaddingTest: PadTooLong/1 (1, false)' - PASSED ssl_gtest.sh: #16216: 'TlsPadding/TlsPaddingTest: PadTooLong/2 (19, true)' - PASSED ssl_gtest.sh: #16217: 'TlsPadding/TlsPaddingTest: PadTooLong/3 (19, false)' - PASSED ssl_gtest.sh: #16218: 'TlsPadding/TlsPaddingTest: PadTooLong/4 (20, true)' - PASSED ssl_gtest.sh: #16219: 'TlsPadding/TlsPaddingTest: PadTooLong/5 (20, false)' - PASSED ssl_gtest.sh: #16220: 'TlsPadding/TlsPaddingTest: PadTooLong/6 (30, true)' - PASSED ssl_gtest.sh: #16221: 'TlsPadding/TlsPaddingTest: PadTooLong/7 (30, false)' - PASSED ssl_gtest.sh: #16222: 'TlsPadding/TlsPaddingTest: PadTooLong/8 (31, true)' - PASSED ssl_gtest.sh: #16223: 'TlsPadding/TlsPaddingTest: PadTooLong/9 (31, false)' - PASSED ssl_gtest.sh: #16224: 'TlsPadding/TlsPaddingTest: PadTooLong/10 (32, true)' - PASSED ssl_gtest.sh: #16225: 'TlsPadding/TlsPaddingTest: PadTooLong/11 (32, false)' - PASSED ssl_gtest.sh: #16226: 'TlsPadding/TlsPaddingTest: PadTooLong/12 (36, true)' - PASSED ssl_gtest.sh: #16227: 'TlsPadding/TlsPaddingTest: PadTooLong/13 (36, false)' - PASSED ssl_gtest.sh: #16228: 'TlsPadding/TlsPaddingTest: PadTooLong/14 (256, true)' - PASSED ssl_gtest.sh: #16229: 'TlsPadding/TlsPaddingTest: PadTooLong/15 (256, false)' - PASSED ssl_gtest.sh: #16230: 'TlsPadding/TlsPaddingTest: PadTooLong/16 (257, true)' - PASSED ssl_gtest.sh: #16231: 'TlsPadding/TlsPaddingTest: PadTooLong/17 (257, false)' - PASSED ssl_gtest.sh: #16232: 'TlsPadding/TlsPaddingTest: PadTooLong/18 (287, true)' - PASSED ssl_gtest.sh: #16233: 'TlsPadding/TlsPaddingTest: PadTooLong/19 (287, false)' - PASSED ssl_gtest.sh: #16234: 'TlsPadding/TlsPaddingTest: PadTooLong/20 (288, true)' - PASSED ssl_gtest.sh: #16235: 'TlsPadding/TlsPaddingTest: PadTooLong/21 (288, false)' - PASSED ssl_gtest.sh: #16236: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/0 (1, true)' - PASSED ssl_gtest.sh: #16237: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/1 (1, false)' - PASSED ssl_gtest.sh: #16238: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/2 (19, true)' - PASSED ssl_gtest.sh: #16239: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/3 (19, false)' - PASSED ssl_gtest.sh: #16240: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/4 (20, true)' - PASSED ssl_gtest.sh: #16241: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/5 (20, false)' - PASSED ssl_gtest.sh: #16242: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/6 (30, true)' - PASSED ssl_gtest.sh: #16243: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/7 (30, false)' - PASSED ssl_gtest.sh: #16244: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/8 (31, true)' - PASSED ssl_gtest.sh: #16245: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/9 (31, false)' - PASSED ssl_gtest.sh: #16246: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/10 (32, true)' - PASSED ssl_gtest.sh: #16247: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/11 (32, false)' - PASSED ssl_gtest.sh: #16248: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/12 (36, true)' - PASSED ssl_gtest.sh: #16249: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/13 (36, false)' - PASSED ssl_gtest.sh: #16250: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/14 (256, true)' - PASSED ssl_gtest.sh: #16251: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/15 (256, false)' - PASSED ssl_gtest.sh: #16252: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/16 (257, true)' - PASSED ssl_gtest.sh: #16253: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/17 (257, false)' - PASSED ssl_gtest.sh: #16254: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/18 (287, true)' - PASSED ssl_gtest.sh: #16255: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/19 (287, false)' - PASSED ssl_gtest.sh: #16256: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/20 (288, true)' - PASSED ssl_gtest.sh: #16257: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/21 (288, false)' - PASSED ssl_gtest.sh: #16258: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/0 (1, true)' - PASSED ssl_gtest.sh: #16259: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/1 (1, false)' - PASSED ssl_gtest.sh: #16260: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/2 (19, true)' - PASSED ssl_gtest.sh: #16261: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/3 (19, false)' - PASSED ssl_gtest.sh: #16262: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/4 (20, true)' - PASSED ssl_gtest.sh: #16263: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/5 (20, false)' - PASSED ssl_gtest.sh: #16264: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/6 (30, true)' - PASSED ssl_gtest.sh: #16265: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/7 (30, false)' - PASSED ssl_gtest.sh: #16266: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/8 (31, true)' - PASSED ssl_gtest.sh: #16267: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/9 (31, false)' - PASSED ssl_gtest.sh: #16268: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/10 (32, true)' - PASSED ssl_gtest.sh: #16269: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/11 (32, false)' - PASSED ssl_gtest.sh: #16270: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/12 (36, true)' - PASSED ssl_gtest.sh: #16271: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/13 (36, false)' - PASSED ssl_gtest.sh: #16272: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/14 (256, true)' - PASSED ssl_gtest.sh: #16273: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/15 (256, false)' - PASSED ssl_gtest.sh: #16274: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/16 (257, true)' - PASSED ssl_gtest.sh: #16275: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/17 (257, false)' - PASSED ssl_gtest.sh: #16276: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/18 (287, true)' - PASSED ssl_gtest.sh: #16277: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/19 (287, false)' - PASSED ssl_gtest.sh: #16278: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/20 (288, true)' - PASSED ssl_gtest.sh: #16279: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/21 (288, false)' - PASSED ssl_gtest.sh: #16280: 'SkipTls10/TlsSkipTest: SkipCertificateRsa/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #16281: 'SkipTls10/TlsSkipTest: SkipCertificateDhe/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #16282: 'SkipTls10/TlsSkipTest: SkipCertificateEcdhe/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #16283: 'SkipTls10/TlsSkipTest: SkipCertificateEcdsa/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #16284: 'SkipTls10/TlsSkipTest: SkipServerKeyExchange/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #16285: 'SkipTls10/TlsSkipTest: SkipServerKeyExchangeEcdsa/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #16286: 'SkipTls10/TlsSkipTest: SkipCertAndKeyExch/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #16287: 'SkipTls10/TlsSkipTest: SkipCertAndKeyExchEcdsa/0 ("TLS", 769)' - PASSED ssl_gtest.sh: #16288: 'SkipVariants/TlsSkipTest: SkipCertificateRsa/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #16289: 'SkipVariants/TlsSkipTest: SkipCertificateRsa/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #16290: 'SkipVariants/TlsSkipTest: SkipCertificateRsa/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #16291: 'SkipVariants/TlsSkipTest: SkipCertificateRsa/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #16292: 'SkipVariants/TlsSkipTest: SkipCertificateDhe/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #16293: 'SkipVariants/TlsSkipTest: SkipCertificateDhe/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #16294: 'SkipVariants/TlsSkipTest: SkipCertificateDhe/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #16295: 'SkipVariants/TlsSkipTest: SkipCertificateDhe/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #16296: 'SkipVariants/TlsSkipTest: SkipCertificateEcdhe/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #16297: 'SkipVariants/TlsSkipTest: SkipCertificateEcdhe/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #16298: 'SkipVariants/TlsSkipTest: SkipCertificateEcdhe/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #16299: 'SkipVariants/TlsSkipTest: SkipCertificateEcdhe/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #16300: 'SkipVariants/TlsSkipTest: SkipCertificateEcdsa/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #16301: 'SkipVariants/TlsSkipTest: SkipCertificateEcdsa/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #16302: 'SkipVariants/TlsSkipTest: SkipCertificateEcdsa/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #16303: 'SkipVariants/TlsSkipTest: SkipCertificateEcdsa/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #16304: 'SkipVariants/TlsSkipTest: SkipServerKeyExchange/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #16305: 'SkipVariants/TlsSkipTest: SkipServerKeyExchange/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #16306: 'SkipVariants/TlsSkipTest: SkipServerKeyExchange/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #16307: 'SkipVariants/TlsSkipTest: SkipServerKeyExchange/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #16308: 'SkipVariants/TlsSkipTest: SkipServerKeyExchangeEcdsa/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #16309: 'SkipVariants/TlsSkipTest: SkipServerKeyExchangeEcdsa/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #16310: 'SkipVariants/TlsSkipTest: SkipServerKeyExchangeEcdsa/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #16311: 'SkipVariants/TlsSkipTest: SkipServerKeyExchangeEcdsa/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #16312: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExch/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #16313: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExch/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #16314: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExch/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #16315: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExch/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #16316: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExchEcdsa/0 ("TLS", 770)' - PASSED ssl_gtest.sh: #16317: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExchEcdsa/1 ("TLS", 771)' - PASSED ssl_gtest.sh: #16318: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExchEcdsa/2 ("DTLS", 770)' - PASSED ssl_gtest.sh: #16319: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExchEcdsa/3 ("DTLS", 771)' - PASSED ssl_gtest.sh: #16320: 'AllHashFuncs/TlsHkdfTest: HkdfNullNull/0 4' - PASSED ssl_gtest.sh: #16321: 'AllHashFuncs/TlsHkdfTest: HkdfNullNull/1 5' - PASSED ssl_gtest.sh: #16322: 'AllHashFuncs/TlsHkdfTest: HkdfKey1Only/0 4' - PASSED ssl_gtest.sh: #16323: 'AllHashFuncs/TlsHkdfTest: HkdfKey1Only/1 5' - PASSED ssl_gtest.sh: #16324: 'AllHashFuncs/TlsHkdfTest: HkdfKey2Only/0 4' - PASSED ssl_gtest.sh: #16325: 'AllHashFuncs/TlsHkdfTest: HkdfKey2Only/1 5' - PASSED ssl_gtest.sh: #16326: 'AllHashFuncs/TlsHkdfTest: HkdfKey1Key2/0 4' - PASSED ssl_gtest.sh: #16327: 'AllHashFuncs/TlsHkdfTest: HkdfKey1Key2/1 5' - PASSED ssl_gtest.sh: #16328: 'AllHashFuncs/TlsHkdfTest: HkdfExpandLabel/0 4' - PASSED ssl_gtest.sh: #16329: 'AllHashFuncs/TlsHkdfTest: HkdfExpandLabel/1 5' - PASSED TIMESTAMP ssl_gtests END: Fri Mar 31 21:11:16 UTC 2017 SUMMARY: ======== NSS variables: -------------- HOST=localhost DOMSUF=localdomain BUILD_OPT=1 USE_X32= USE_64= NSS_CYCLES="" NSS_TESTS="libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec gtests ssl_gtests" NSS_SSL_TESTS="crl fips_normal normal_fips iopr policy" NSS_SSL_RUN="cov auth stapling stress" NSS_AIA_PATH= NSS_AIA_HTTP= NSS_AIA_OCSP= IOPR_HOSTADDR_LIST= PKITS_DATA= Tests summary: -------------- Passed: 13667 Failed: 2662 Failed with core: 0 ASan failures: 0 Unknown status: 0 RPM build errors: error: Bad exit status from /var/tmp/rpm-tmp.68ygkW (%check) Bad exit status from /var/tmp/rpm-tmp.68ygkW (%check) Child return code was: 1 EXCEPTION: [Error()] Traceback (most recent call last): File "/usr/lib/python2.7/site-packages/mockbuild/trace_decorator.py", line 88, in trace result = func(*args, **kw) File "/usr/lib/python2.7/site-packages/mockbuild/util.py", line 547, in do raise exception.Error("Command failed. See logs for output.\n # %s" % (command,), child.returncode) Error: Command failed. See logs for output. # bash --login -c /usr/bin/rpmbuild -bb --target armv7hl --nodeps /builddir/build/SPECS/nss.spec